Hack Android with an Injected Malicious Application.

Where to begin with, hmmm…

Here we are using Kali Linux 2020 distribution with updated tools and Evil-Droid is downloaded from GitHub and installed as requested.

So, What is Android?

Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Android is developed by a consortium of developers known as the Open Handset Alliance, with the main contributor and commercial marketer being Google. Initially developed by Android Inc., which Google bought in 2005, Android was unveiled in 2007, with the first commercial Android device launched in September 2008. The current stable version is Android 10, released on September 3, 2019. The core Android source code is known as Android Open Source Project (AOSP), which is primarily licensed under the Apache License. This has allowed variants of Android to be developed on a range of other electronics, such as game consoles, digital cameras, PCs and others, each with a specialized user interface. Some well known derivatives include Android TV for televisions and Wear OS for wearable, both developed by Google.

Whats Next?

  1. You need to launch the Evil Droid script after getting it from GitHub,(Clone or Zip). It will auto check the missing dependencies and install them easily and automatically

Failed to verify signed artifacts[Fixed]

What is reverse_tcp ?

Firewalls work on the principle of blocking incoming connections. So basically any incoming connection to a host behind the firewall is blocked by the firewall. However return traffic for the connection initiated by the device will be permitted.

  • When your browser initiates a connection to google.com, we call it as forward connection. The connection goes from client(browser) to server(google.com).
  • When server wants to initiate the connection to client (it is very rare though!), we call it as reverse connection.
  • Most of the forward connection to servers are firewalled. So you just cannot initiate a connection, even if you compromise the server.
  • But most of the firewalls, allows connection initiated by the server to the external world.
  • So compromise the remote server and ask it to initiate the connection with your system. Then you issue commands to the remote server.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store