Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/heet9022/android-hacking
A short tutorial on android hacking using Kali Linux
https://github.com/heet9022/android-hacking
android-hacking guide hacking kali tutorial
Last synced: 6 days ago
JSON representation
A short tutorial on android hacking using Kali Linux
- Host: GitHub
- URL: https://github.com/heet9022/android-hacking
- Owner: heet9022
- Created: 2020-03-31T21:20:58.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2024-03-20T01:21:25.000Z (11 months ago)
- Last Synced: 2024-12-12T14:22:50.925Z (2 months ago)
- Topics: android-hacking, guide, hacking, kali, tutorial
- Homepage:
- Size: 34.6 MB
- Stars: 47
- Watchers: 3
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
![Banner image](asset.png)
# Guide To Hacking Android Applications using Kali Linux Tools## Introduction
This project demonstrates how to hack mobile phones using Kali Linux tools. It allows spying on any mobile device and obtaining various details such as installed applications, geolocation, contacts, and even performing mischievous actions like playing random music files. The main technique is to create a payload using the Kali Linux terminal and send it to the victim's mobile phone. After the installation of the payload app, it sends all the data of the victim's mobile phone, granting remote access to the Android device.## Installation
1. Install the pentesting tool lPhantom Evasion
- `git clone https://github.com/oddcod3/Phantom-Evasion`
- `python3 phantom-evasion.py --setup`
2. Download [ngrok](https://ngrok.com/download)## Process
### Payload Generation
1. Launch Phantom-Evasion in interactive mode using the command `python3 phantom-evasion.py`.
2. Choose the Android modules.
3. Use MSFvenom for generating the payload and save it as an APK file.
4. Set up a listener to the Metasploit framework for Android using the default `Android/meterpreter/reverse_tcp` payload.
5. Insert the LHOST (Local Host IP) and LocalPort which will be established in the Ngrok session.### Signing the APK
Android devices only install signed APK files. Sign the APK file manually in Kali Linux using:
- Keytool (Pre-installed)
- jar signer (Pre-installed)
- zipalign (Included in Phantom Evasion)Set the name of the generated APK file to something enticing, for example: "PUBG-mod," to increase the chances of the victim installing the app.
### Metasploit Setup
1. Use the Kali Linux tool Metasploit by entering the `msfconsole` command.
2. Use `multi/handler` and set the payload as `android/meterpreter/reverse_tcp`.
3. Set the LHOST (IP address of the hacking PC) and LPORT (typically 4444).
4. Set `ExitOnSession` to `false` to continue searching and creating sessions with the APK without restarting the hacking process.## Potential Attacks
- Get the system information of the Android device on which the payload APK is installed.
- Get details of the installed apps on the phone.
- Get any application on the victim's mobile to run and open its main activity.
- Get detailed information about the call log of the victim's mobile.
- Maliciously play audio files on the victim's Android device.## Warning
How to protect your android phone from such attacks?
- Don't allow downloading apps from cloud websites that ask for many unnecessary permissions.
- Don't install apps with unknown resources enabled.
- Use antivirus software on mobile devices to monitor activity.
- Always confirm the source of files before downloading.