Mobile Platform Hacking (WAN) Through Google Cloud Shell

 Mobile Platform Hacking (WAN) Through Google Cloud Shell

Hey Folks, in this tutorial we are going to discuss about another topic related to google cloud shell. Let’s talk straight away ðŸ™‚ !! As you know that to access any android device, we need to take meterpreter session through the kali Linux operating system or any other. But suppose you are going to roam somewhere outside, where you only have an internet connection and you have to access an android device then what would you do in that case. Wait 🙂 !! In this tutorial we will show you that how we can access any android device over the wan network without having kali linux machine through the google cloud shell.

Lets take a look ðŸ™‚ !!

As we know that “Cloud Shell service provides us command-line to access cloud resources directly from browser“. You can visit from here. Cloud shell interface looks like the image below after login.

We have to configure the metasploit framework for this purposes using the following command. First we execute the curl command to download the script, allow the executable to “msfinstall” and execute it via the bash command and that’s it our Metasploit Framework has successfully configured.

ApkTool

Lets download the dependencies one by one and first we will download the leading tool called “apktool“. it will compile and decompile the apk files.

Zipalign

Zipalign is an archive tool that provides important optimization to Android application files but make sure it must only be performed before the APK file has been signed.

Jarsigner

JAR Signing and Verification Tool use to sign JAR files and time stamp the signature. we use Java JDK 8 by default, but after executing the following command it will give us two options in which we have to select Java JDK 11.

Donwload Apk

It is not difficult to download any application through the wget command, just you have to enter the URL of the APK file after the “N” parameter. If you do not understand then you can use the same application using the following command.

Ngrok

We will need a public IP address that we can get from the ngrok service. Use the wget command to download it and unzip it after downloading is done.

Now it is up to you which port you have chosen. After selecting the port, combine it with the following command and execute it. In our case we select the port 4444. But after execute the command you will be get the public IP and Port, where in the highlight text the public IP and public port have combine with own. Keep the port with you and copy the require text.

Paste on another terminal and execute it with ping command,. After do it you will be get the public IP address which you can use to take meterpreter session over the wan network. Now you have both public IP address and Port.

Create Payload

It’s time to inject the malicious payload into an original application file. Just copy the command below, modify according to yourself and execute it.

Relax 🙂 !! You do not need to do much because you can download your payload from here and share it through WhatsApp or any other services.

This is only the last stage in which we have to start a multi-handler to catch the meterpreter session.

WOW 🙂 !! Its’s really amazing and as you can see that through cloud services we have taken the meterpreter session of the victim smartphone over the wan network (remotely) even without any operating system.

Suraj Virus

comprehensive information on Ethical Hacking Tutorial, Computer science, Cloud Computer, Programming Languages ,Networking Computer Forensics ...

Post a Comment

Previous Post Next Post