How To Send Free Spoofing Sms To Any Mobile Number Using Metasploit

How To Send Free Spoofing Sms To Any Mobile Number Using Metasploit

STEP 1

In your terminal type in
       
         diago@Diago-Dpoison:~$ sudo service postgresql start
        [sudo] password for diago:

         Starting PostgreSQL 12 database server: main.

         diago@Diago-Dpoison:~$ sudo service ssh start
         Starting OpenBSD Secure Shell server: sshd.

         diago@Diago-Dpoison:~$ msfconsole

         msf5 > search auxiliary/client/sms/send_text

         msf5 > use auxiliary/client/sms/send_text
              auxiliary(client/sms/send_text

         msf5 > auxiliary(client/sms/send_text) > show options

   Module options (auxiliary/client/sms/send_text):

   Name          Current Setting  Required  Description
   ----          ---------------  --------  -----------
   CELLNUMBERS                    yes       The phone numbers to send to
   SMSCARRIER                        yes       The targeted SMS service provider (Accepted: alltel, 
                              att,boost, cricket,verizon,virgin, tmobile,google)
   SMSMESSAGE                       yes       The text message to send
   SMSSUBJECT                         no        The text subject
   SMTPADDRESS                     yes       The SMTP server to use to send the text messages
   SMTPFROM                            no        The FROM field for SMTP
   SMTPPASSWORD                   yes       The SMTP password to use to send the text messages
   SMTPPORT      25                   yes       The SMTP port to use to send the text messages
   SMTPUSERNAME                   yes       The SMTP account to use to send the text messages

msf5 auxiliary(client/sms/send_text) > set CELLNUMBERS +60146277084
CELLNUMBERS => +60146277084
msf5 auxiliary(client/sms/send_text) > set SMSCARRIER google
SMSCARRIER => google
msf5 auxiliary(client/sms/send_text) > set SMSMESSAGE hiii
SMSMESSAGE => hiii
msf5 auxiliary(client/sms/send_text) > set SMSSUBJECT sexyy
SMSSUBJECT => sexyy
msf5 auxiliary(client/sms/send_text) > set SMTPADDRESS smtp.amanara.my
SMTPADDRESS => smtp.amanara.my
msf5 auxiliary(client/sms/send_text) > set SMTPPASSWORD Mydef0rm@
SMTPPASSWORD => Mydef0rm@
msf5 auxiliary(client/sms/send_text) > set SMTPPORT 465
SMTPPORT => 465
msf5 auxiliary(client/sms/send_text) > set SMTPUSERNAME srahmanovie@amanara.my
SMTPUSERNAME => srahmanovie@amanara.my
msf5 auxiliary(client/sms/send_text) > show info

       Name: SMS Client
     Module: auxiliary/client/sms/send_text
    License: Metasploit Framework License (BSD)
       Rank: Normal

Provided by:
  sinn3r

Check supported:
  No

Basic options:
  Name          Current Setting         Required  Description
  ----          ---------------         --------  -----------
  CELLNUMBERS   +60146277084            yes       The phone numbers to send to
  SMSCARRIER    google                  yes       The targeted SMS service provider (Accepted: alltel, att, boost, cricket, tmobile, verizon, virgin, google)
  SMSMESSAGE    hiii                    yes       The text message to send
  SMSSUBJECT    sexyy                   no        The text subject
  SMTPADDRESS   smtp.amanara.my         yes       The SMTP server to use to send the text messages
  SMTPFROM                              no        The FROM field for SMTP
  SMTPPASSWORD  Mydef0rm@               yes       The SMTP password to use to send the text messages
  SMTPPORT      465                     yes       The SMTP port to use to send the text messages
  SMTPUSERNAME  srahmanovie@amanara.my  yes       The SMTP account to use to send the text messages

Description:
  This module sends a text message to multiple phones of the same
  carrier. You can use it to send a malicious link to phones. Please
  note that you do not use this module to send a media file
  (attachment). In order to send a media file, please use
  auxiliary/client/mms/send_mms instead.

msf5 auxiliary(client/sms/send_text) > exploit -j

[*] Sending text (4 bytes) to 1 number(s)...
[-] Auxiliary failed: SocketError getaddrinfo: Name or service not known
[-] Call stack:
[-]   /opt/metasploit-framework/embedded/lib/ruby/2.6.0/net/smtp.rb:539:in `initialize'
[-]   /opt/metasploit-framework/embedded/lib/ruby/2.6.0/net/smtp.rb:539:in `open'
[-]   /opt/metasploit-framework/embedded/lib/ruby/2.6.0/net/smtp.rb:539:in `tcp_socket'
[-]   /opt/metasploit-framework/embedded/lib/ruby/2.6.0/net/smtp.rb:549:in `block in do_start'
[-]   /opt/metasploit-framework/embedded/lib/ruby/2.6.0/timeout.rb:93:in `block in timeout'
[-]   /opt/metasploit-framework/embedded/lib/ruby/2.6.0/timeout.rb:103:in `timeout'
[-]   /opt/metasploit-framework/embedded/lib/ruby/2.6.0/net/smtp.rb:548:in `do_start'
[-]   /opt/metasploit-framework/embedded/lib/ruby/2.6.0/net/smtp.rb:518:in `start'
[-]   /opt/metasploit-framework/embedded/framework/lib/rex/proto/sms/client.rb:54:in `send_text_to_phones'
[-]   /opt/metasploit-framework/embedded/framework/lib/msf/core/auxiliary/sms.rb:62:in `send_text'
[-]   /opt/metasploit-framework/embedded/framework/modules/auxiliary/client/sms/send_text.rb:28:in `run'
[*] Auxiliary module execution completed

msf5 auxiliary(client/sms/send_text) >

Comments

Popular posts from this blog

How to DDOS an IP using HOIC