Description: in this tutorial we use an android tool in metasploit to get and android device to return some valuable data to us.
Tags: metasploit , android ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
what type of info would be included in that privacy info file??? I am guessing basic stuff such as phone and name...