Samsung S7 is connected to Pixel as HID device (keyboard) that tries to brute force lock screen PIN (PoC) and then download, install and launch Metasploit payload
How to prevent such scenario
1) Charge you smartphone using you own adapter when possible
2) Don't use trivial PIN or password lock screen protection
3) Use mobile security software that will detect Metasploit payload
Tutorial & link to HID script: github.com/androidmalware/android_hid
- Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force PoC ( Download)
- Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force PoC ( Download)
- Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force | Dark Typer Official ( Download)
- Hacking into Android in 32 seconds // HID attack // Metasploit // PIN brute force. ( Download)
- How to unlock PIN protected Android device using ADB and HID method | Brute force | Rubber Ducky ( Download)
- Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force PoC ( Download)
- Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force PoC ( Download)
- Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force PoC Android #ethical ( Download)
- Hacking into Android in 32 seconds - HID attack - Metasploit - PIN brute force poc ( Download)
- Hacking into Android in 32 seconds HID attack Metasploit PIN brute force PoC 1080p ( Download)
- Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force PoC #pavanbuddhu ( Download)
- Hacking into Android in 32 seconds | HID attack | Metaspolit | PIN brute force PoC ( Download)
- Hacking/bypassing android lockscreen ( Download)
- Hacking Android phone lock using Linux and ADB ( Download)
- Hacking into Android in 32 seconds | HID attack | Metasploit | PIN brute force PoC #viral ( Download)