In this article we will learn about How to hack an android phone.
As we know this period of time mobile has taken over computers an desktops. Because they enable he user to access email, browse the internet, navigate via GPS and stores, calendar, passwords, etc.
A mobile device allows us to communicate between people to people with the help of radio frequencies. It is used to do many works as well as multimedia sharing, send messages, emails, internet access, etc.
According to the App Annie reports the mobile app market produced 82 billion dollar in gross yearly sales in 2019, and this amount is expected to increase to 143 billion dollar by 2020. By 2021, gross yearly income is expected to hit 190 billion dollar.
Juniper Research analysts forecast a 2 trillion dollar market for payments and transactions done through mobile banking applications by 2024.
As mobile has provided technological advances by having the option to sending messages, email and have the feature of download applications , hackers misuse these for malicious purposes like sending malformed apk files or click attack entitle to attract victims to attractive links using which attackers get access to control to victim/target system partially or completely for his/her personal benefits.
1) SMS forwarding
3) Malicious Website clicking
4) Malicious apps downloading
2) Bluetooth hacking
1) Use ‘msfconsole’ in the terminal to open the Metasploit framework in Kali Linux.
2) Look for the different sets of exploits using the command ‘show exploits’ and find the useful exploit for Android Phone.
3) Use ‘exploit meterpreter reverse TCP’ to connect and set localhost and local port i.e. attacker IP and port. This will help in the generation of an apk extension file. (Refer to the image below).
4. Set the payload and set all values of LHOST and LPORT and exploit this payload so as to gain a meterpreter connection whenever the victim connects to the android mobile phone .
5) Install Android x86 in VMware for mobile simulation.
6) Start the Apache service in the attacker profile and manipulate the victim to access, open and install your shared file.
7) As the installation is complete, the meterpreter connection is established and the attacker gains access to the victim’s mobile system giving her/him access to all dump files, call history, messages, and even all personal data from the victim’s hack phone by mobile hacking.
8. With different kinds of hacking access modes, the attacker can manipulate and spoof calls and messages from the victim’s hack phone. They can even access the victim’s hack phone camera without their knowledge by hacking your Android Mobile Phone.
Before installing any apk, or tapping on any link, think about it.
DISCLAIMER: This Article is for EDUCATIONAL PURPOSE only. Don't use the given information for illegal activities. Your are the only responsible for your actions!