Battle smartphone. How to transform your Android device into ‘hackerphone’ with Termux and Kali



In science fiction motion pictures, programmers use cell phones to think twice about safeguarded networks. Of not long ago, it was only a dream, yet presently this dream turns into a reality. In this article, I will make sense of how for changing your telephone into a strong hacking device.

BEFORE YOU START

Above all else, you want root honors. Any other way, a few elements of the introduced utilities will not be accessible or may glitch. This is particularly real for Android 10 and up.


The honor acceleration technique is remarkable for each cell phone model and Android adaptation. I utilize an oldie-goodie Samsung World S6 (SM-G920F) with Android 7.0 Nougat; this operating system incorporates an exceptional device giving clients to acquire root rights. Assuming your telephone model, as well as operating system rendition, are unique, I propose looking on the web for guidance relevant to your gadget.


I'm additionally going to utilize Termux, a simple to-utilize and strong terminal that upholds many highlights of the Linux climate. Termux permits to execute orders in the appropriate climate and save time and exertion on designing this climate.


Furthermore, I suggest introducing the tsu utility that allows the capacity to execute orders for the benefit of root. In the event that, for reasons unknown, it doesn't chip away at your gadget, check this GitHub storehouse for the content that gives sudo to Termux. Note that Termux needs root honors all along to perform required activities.

Information:

Significant: on the off chance that you use Magisk as the root strategy (really awful, there is no option for most of the current gadgets), make a point to permit pull access for Termux in the settings and add Termux to exemptions for Magisk Stow away.

Additionally, I emphatically prescribe refreshing the rundown of bundles as you do with work area adaptations of Kali.

$ apt-get update

Kali NetHunter

On the off chance that your gadget is upheld by Kali NetHunter, utilize this stage. Kali Linux engineers made it explicitly for Android telephones. NetHunter incorporates numerous valuable projects from the work area variant of Kali. The pictures are accessible on the authority site. Generally, this tool compartment is more remarkable than the Termux-based one.

INSTALLING METASPLOIT

As you are very much aware, Metasploit Structure is an instrument intended to make takes advantage of and execute them on remote objective machines.

You just need two orders to introduce Metasploit Structure (MSF) on Android 7 and up:

  • pkg install unstable-repo 
  • pkg install Metasploit
To introduce MSF on Android 5.x.x-6.x.x, utilize the accompanying orders:

  • curl -LO https://github.com/termux/termux-packages/files/3995119/metasploit_5.0.65-1_all.deb.gz 
  • gunzip metasploit_5.0.65-1_all.deb.gz
  • dpkg -i metasploit_5.0.65-1_all.deb
  • apt -f install

Warning

Never update MSF manually by editing $PREFIX/opt/metasploit: this may cause problems with dependencies.

To ensure that everything works appropriately, I run Metasploit:

  • msfconsole
As may be obvious, 2014 adventures are currently available to you.

Introducing NGROK

Ngrok is a cross-platform utility intended to make secure passages from openly open focuses to neighborhood network administrations. What's more, ngrok catches traffic and saves it in logs for resulting examination.

Before proceeding, ensure that your telephone is associated with the Web (for example Portable Information is on) and Versatile Area of interest is dynamic.

As a matter of some importance, update the bundles and introduce Python 2:

  • pkg update && pkg upgrade && pkg install python2
Then, you need to enroll a ngrok account.

After the enrollment, you will be moved to your record page where you need to find and duplicate your AuthToken as displayed on the screen capture underneath.
Then download ngrok for Linux frameworks with the ARM engineering.

Go to Termux and find the catalog containing the downloaded ngrok file, for example:
  • cd /sdcard/Downloads

Type ls |grep ngrok to make sure that the archive is there. Then unpack it:

  •  unzip ngrok-stable-linux-arm.zip
From that point onward, enter ls |grep ngrok and check whether the ngrok executable document has shown up. In the event that it's not there, go to the catalog containing it before making the following stage:
  • cd ngrok-stable-linux-arm
also, move the executable document to the Termux home catalog:
  •  mv -v ngrok /$HOME

Actually, take a look at the new document area and go to that envelope utilizing the disc and ls orders.

Presently you need to set the banner that makes the record executable:

  • chmod +x ngrok

and run it for the first time:

  • ./ngrok
Recall the AuthToken you have duplicated before? Glue it into the order beneath so that ngrok realizes who utilizes it:
  •  ./ngrok authtoken <token>

Then launch the server:

  •  ./ngrok http 80

You will see the Ngrok screen like the one shown below.

Terrific! Now you are ready to attack any target!

Introducing SQLMAP

As per its true site, sqlmap is an open-source entrance testing apparatus that mechanizes the location and abuse of SQL infusion imperfections and takeover of data set servers.

The establishment is pretty much as simple as a piece of cake. You can either introduce the steady form (1.4.3) or the most up-to-date one (1.4.5.34). To introduce variant 1.4.3, enter:

  • pkg install sqlmap

To run the utility, type the command:

  • sqlmap -u <URL>
To present the latest variation that is as yet being created, clone the authority sqlmap project on GitHub:
  • git clone https://github.com/sqlmapproject/sqlmap.git

Then go to the folder containing sqlmap:

  • cd sqlmap
Utilizing python2, run sqlmap with a similar obligatory boundary:
  • python2 sqlmap.py -u <URL>

Presently your cell phone can get to the greater part of all information bases present on the Web! Utilize this incredible asset in a shrewd and moral manner; any other way, you might cross paths with the law!

Comments