This website is for help in searching information on the internet if you face so many difficulties to search on the Internet then ask us for search help we are here to help you and save your time on the internet.

How Hackers Remotely Control Any phone!? check if your phone is already hacked now!

How Hackers Remotely Control Any phone!? check if your phone is already hacked now!

This is not remotely hacking and takes control of any android devices this is more of remotely managing all these devices by being able to access their location their storage their file the text messages and everything.

okay but if you're looking to hack into a device remotely and take control of it this can be one possible way if you use social engineering attacks and one of those common methods is where a hacker actually sells away used devices for you and once you buy it okay because they already have the application installed inside their phone they will be able to see everything that you're doing all your photos or your files or your passwords what websites you're going into that's part of using social engineering to be coupled with this attack method okay.

So big Disclaimer for this post: 

Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.

What is L3mon and how to Use L3mon

L3MON Builds off and utilizes several open-source software, Without these, L3MON Wouldn't be what it is!

  • Inspiration for the project and the basic building blocks for the Android App are based off AhMyth
  • express
  • node-GeoIP
  • lowdb
  • socket.io
  • Open Street Map
  • Leaflet

L3mon installation process

  1. Install JRE 8 (We cannot stress this enough USE java 1.8.0 ANY issues that don't use this will be closed WITHOUT a response)
  2. Install NodeJS Instructions Here (If you can't figure this out, you shouldn't really be using this)
  3. install PM2
  4. Download and Extract the latest release from HERE
  5. In the extracted folder, run these commands
  6. Stop L3MON pm2 stop index
  7. in your browser navigate to HTTP://<SERVER IP>:22533

1) Install JRE 8 (We cannot stress this enough USE java 1.8.0 ANY issues that don't use this will be closed WITHOUT a response)

  • Debian, Ubuntu, Etc ( Sudo apt-get install OpenJDK-8-JRE )
  • Fedora, Oracle, Red Hat, etc ( su -c "yum install java-1.8.0-OpenJDK" )
  • Windows ( Click HERE for downloads )

2) Install NodeJS Instructions Here (If you can't figure this out, you shouldn't really be using this)

3) install PM2

  • npm install pm2 -g

4) Download and Extract the latest release from HERE

5) In the extracted folder, run these commands

  • npm install <- install dependencies
  • pm2 start index.js <-- start the script
  • pm2 startup <- to run L3MON on startup
  • Set a Username & Password

6) Stop L3MON pm2 stop index

  • Open maindb.json in a text editor
  • under admin i) set the username as plain text ii) set the password as a LOWERCASE MD5 hash
  • save the file
  • run pm2 restart all

7) in your browser navigate to HTTP://<SERVER IP>:22533

Features of L3mon

  • GPS Logging
  • Microphone Recording
  • View Contacts
  • SMS Logs
  • Send SMS
  • Call Logs
  • View Installed Apps
  • View Stub Permissions
  • Live Clipboard Logging
  • Live Notification Logging
  • View WiFi Networks (logs previously seen)
  • File Explorer & Downloader
  • Command Queuing
  • Built-In APK Builder

How Hackers Remotely Control Any phone!? check if your phone is already hacked now!

This is not remotely hacking and takes control of any android devices this is more of remotely managing all these devices by being able to access their location their storage their file the text messages and everything.

okay but if you're looking to hack into a device remotely and take control of it this can be one possible way if you use social engineering attacks and one of those common methods is where a hacker actually sells away used devices for you and once you buy it okay because they already have the application installed inside their phone they will be able to see everything that you're doing all your photos or your files or your passwords what websites you're going into that's part of using social engineering to be coupled with this attack method okay.

Post a Comment

This website is for help in searching for information on the internet if you face so many difficulties searching on the Internet then ask us for search help we are here to help you and save your time on the internet. If you face a Complex search then know this website is for you each and every time we are available for you for free. If you like to get total information about your search then ask us we give you it personally.

Previous Post Next Post