Skip to content

Latest commit

 

History

History
73 lines (46 loc) · 1.64 KB

README.md

File metadata and controls

73 lines (46 loc) · 1.64 KB

About ADBBrute

ADBBrute was written to bruteforce access to any Android device with ADB enabled.

Usage

Print the help to get all necessary information

$ python3 ADBBrute.py -h
usage: ADBBrute.py [-h] [--device DEVICE] [--type TYPE]

Android LockScreen Bruteforce

optional arguments:
  -h, --help       show this help message and exit
  --device DEVICE  Specify the device to bruteforce
  --type TYPE      Type of bruteforce (gui / locksettings

Without argument, all connected devices will be displayed:

$ python3 ADBBrute.py
[x] Please specify the device to bruteforce (--device)
 - 192.168.57.109:5555

Finally, you need to specify the supported bruteforce methods:

  • gui
  • locksettings

Once specified, you just have to wait few time to get your Android PIN:

$ python3 ADBBrute.py --device 192.168.57.109:5555 --type gui
[x] Getting information on 192.168.57.109:5555 - vbox86p (Samsung Galaxy S8)
Try 1234
Try 1111
Try 0000
PIN identified: 0000

Enable USB-Debugging

Via GUI:

Go to Settings > About phone and press on build number 7 times to enable developper mode.

Once enabled, go to Settings > Developer options and enable USB debugging

Via ADB:

adb shell settings put global development_settings_enabled 1
adb shell setprop persist.service.adb.enable 1

Author

Régis SENET (rsenet)

Contributing

Bug reports and pull requests are welcome on GitHub.

License

The project is available as open source under the terms of the GPLv3