All you will need is a simple computer connected to the Internet, equipped with a free penetration-testing system called Metasploit. This can run in either Windows or Linux, but for this tutorial we will use a Linux variant geared especially for penetration - Kali Linux.
Then, of course, you will need a target Android smartphone. Before starting, you will need to know the IP Address of the attacking device (i.e., your computer), as well as its connection receiving port.
As a prerequisite, you need to be able to create a tampered APK that has the attacker’s IP and receiving port in the source code’s const-strings. If you can, this is best done with an app that activates on the phone’s startup, so you can have a persistent backdoor.
STEP BY STEP
No comments:
Post a Comment