{"id":8427,"date":"2023-01-11T12:28:28","date_gmt":"2023-01-11T12:28:28","guid":{"rendered":"https:\/\/reconcybersecurity.com\/?p=8427"},"modified":"2023-04-16T09:13:27","modified_gmt":"2023-04-16T09:13:27","slug":"gaining-access-to-any-android-phone-globally-recon-cyber-security-cyber-security","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/gaining-access-to-any-android-phone-globally-recon-cyber-security-cyber-security\/","title":{"rendered":"Gaining Access To Any Android Phone Globally | RECON CYBER SECURITY | Cyber Security"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color has-medium-font-size\">Greetings fellow <a href=\"https:\/\/reconcybersecurity.com\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">Hackers<\/mark><\/strong><\/a>! We will now embark on a journey to learn the method of hacking any <a href=\"https:\/\/reconcybersecurity.com\/how-to-make-ransomware-for-android-n4h\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">Android Phone<\/mark><\/strong><\/a> from anywhere in the world via the web. It may sound unoriginal as there are tons of other blogs talking about the same, however, the exclusive advantage of this blog is that we are about to use a \u201c<strong>ngrok server<\/strong>\u201d, which essentially serves as a bridge, to access the reverse shell through the web. Hence, the first step would be to initiate the ngrok server.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">I have initiated an <strong><a href=\"https:\/\/reconcybersecurity.com\/make-backdoor-in-android-using-metasploit-hacking-2022-n4h\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">NGROK SERVER<\/mark><\/a><\/strong> with the port number &#8220;<strong>4444<\/strong>&#8220;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/1-3.png\" alt=\"\" class=\"wp-image-8430\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/2-4.png\" alt=\"\" class=\"wp-image-8431\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Now, it&#8217;s an ideal opportunity to assemble a payload for android gadgets. The document expansion will be &#8220;<a href=\"https:\/\/reconcybersecurity.com\/how-to-get-remote-access-of-any-smartphone-hacking-2022-n4h\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-purple-color\">.apk<\/mark><\/strong><\/a>&#8221; and we will use &#8220;<a href=\"https:\/\/reconcybersecurity.com\/ctf-challenge-course\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">Msfvenom<\/mark><\/strong><\/a>&#8221; to create any kind of payload.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/3-2.png\" alt=\"\" class=\"wp-image-8432\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/4-1.png\" alt=\"\" class=\"wp-image-8433\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To make the app authentic, and not a counterfeit or malicious application, we need to supply a certificate to the app through the utilization of \u201c<strong>Keytool<\/strong>\u201d, \u201c<strong>Jarsigner<\/strong>\u201d, and \u201c<strong>Zipalign<\/strong>\u201d, instead of using the ngrok server for LHOST and LPORT.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/5-1.png\" alt=\"\" class=\"wp-image-8434\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/6-1.png\" alt=\"\" class=\"wp-image-8435\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Subsequently, we need to employ a &#8220;<em>Jarsigner<\/em>&#8221; to sign Java Archive (JAR) files and guarantee the signatures and veracity of the signed JAR files.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/7-1.png\" alt=\"\" class=\"wp-image-8436\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/8-2.png\" alt=\"\" class=\"wp-image-8449\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/9-1.png\" alt=\"\" class=\"wp-image-8438\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/10-1.png\" alt=\"\" class=\"wp-image-8439\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Now, to achieve optimization for Android application (<strong>.apk<\/strong>) files, we must utilize the archive alignment tool known as Zipalign.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/11.png\" alt=\"\" class=\"wp-image-8440\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/12-1.png\" alt=\"\" class=\"wp-image-8450\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Send the malicious file to the victim by any available method, and get them to download it, that way you can achieve your desired goals. Subsequently, initiate Metasploit by running the command \u201c<a href=\"https:\/\/reconcybersecurity.com\/ctf-challenge-course\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-purple-color\">msfconsole<\/mark><\/strong><\/a>\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/13.png\" alt=\"\" class=\"wp-image-8442\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/14.png\" alt=\"\" class=\"wp-image-8443\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Once the victim clicks on the app, you will receive an inbound connection from the Android device.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/15.png\" alt=\"\" class=\"wp-image-8444\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Once the reverse connection has been established, we will be able to access and manipulate a variety of data, including phone calls, texts, contact lists, and more. To view system information, the command to use is &#8220;<em>sysinfo<\/em>&#8220;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/16.png\" alt=\"\" class=\"wp-image-8445\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Now you can use the command \u201c<em>dump_calllog<\/em>\u201c and \u201c<em>dump_sms<\/em>\u201c.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/17.png\" alt=\"\" class=\"wp-image-8446\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">It has been saved to your system so let\u2019s access the system<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/18.png\" alt=\"\" class=\"wp-image-8447\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">This is SMS\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/19.png\" alt=\"\" class=\"wp-image-8448\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">That is the end of the day, and we hope you enjoyed the reading.<\/p>\n","protected":false},"excerpt":{"rendered":"Greetings fellow Hackers! We will now embark on a journey to learn the method of hacking any Android&hellip;\n","protected":false},"author":1,"featured_media":10761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,55],"tags":[240,90,56,311,57],"class_list":{"0":"post-8427","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"category-hacking-tools","9":"tag-cyber-security","10":"tag-how-to-use-metasploit","11":"tag-phishing-tool","12":"tag-recon-cyber-security","13":"tag-social-media-hacking"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=8427"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8427\/revisions"}],"predecessor-version":[{"id":10578,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8427\/revisions\/10578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10761"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=8427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=8427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=8427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}