June 17, 2018 | Views: 10673

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

In this post, we are discussing a very intersting topic: payload.

So what is a PAYLOAD??

What can be done using it??

Well, a payload can be considered to be somewhat similar to a virus. A payload is a set of malicious codes that carry crucial information that can be used to hack any device beyond limits that you can’t imagine.

For example, if we are trying to hack any Android device, then with the help of a payload, we can hack software as well as hardware (e.g., If we hack any Android device, then we can access the camera as well as the microphone of that device!!).

Payload works on the principle of reverse engineering, in the sense that we normally hack any device by finding its vulnerability, and then we attack the device. But in this case, the payload itself becomes the vulnerability of the victim’s device!!

Generally, a payload refers to a set of codes which a hacker designs according to his/her requirements. Then with the help of social engineering (including deceptive links, fake sites, etc.), the payload is sent to the victim’s device or is embedded within an application (probably a legitimate application) that the victim downloads. The victim does not have any idea about the payload sent by the hacker, as the payload dosen’t show signs of its presence directly to the victim. Now the victim grants the application permission that is required for it to be installed. Once the application with the embedded payload is installed by the victim, the device gets hacked!!! Now, the hacker has the permission to access the victim’s device, and the embedded payload sends information to the hacker, as it is connected to hacker’s PC as well. For example, you can click on photos using the camera, access the microphone, and many more things.

Testing a Payload

The payload is made using the Kali Linux operating system; you can develop your own payload and save it as an .apk file and send it to a test target or victim.


Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
1 Comment
  1. Great overall explanation of payload! Very easy to read and to the point.

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?