Full Undetectable Android Payload (RAT) Tool

 Hey guys, the article is going to be interesting because in this tutorial we will present you such a (RAT) remote administration tool with the help of which you can easily control someone else’s android smartphone. We think it does not require any other tools that’s why you can control this through third party applications such as termux etc.

Lets install this tool 🙂 !!

Installation

As we have already told you that you can control this tool from android application but in our case we we’ll choose kali linux operating system. Now first of all we will download this tool using git command from github and then go to the directory. We already have the “pip” tool installed, hence we will execute the last command to setup it successfully.

If you are stuck somewhere, you can use the help command to check for missing arguments or attributes.

Generate APK

Now we will try our first and try to create the payload using the following command. But change “-i” and “-p” according to yourself.

Share

As you can see our payload is successfully created without any errors, as well as we take the help of python file service to share our payload with the victim.

Payload Installation

Now everything is done from the attacking side and as soon as the victim opens the payload they will look like the image below. But it’s an truely undetectable payload.

It’s time to take control of the victim smartphone and for this purposes we have to execute the following command. But change “-i” and “-p” according to you.

Remote Shell

As you can see that we have successfully connected to the victim smartphone. But if you have no idea how to control the victim’s smartphone then use the help command.

Device Info

You can check the information of the victim android device by executing the following command.

Camera List

The following command will ask you from which camera you want to take a picture from the victim’s phone.

As you can see the picture has been successfully clicked from the victim’s phone without her knowledge.

SMS

Similarly you can get all the SMS stored on the victim’s phone by executing the following command.

The results are in front of you.

Sim Details

As a most useful feature for forensic investigator, through this facilities we can dump the complete details related to the SIM card.

IP and Mac Address

As you can see that we got the IP and MAC address of the victim phone.

Audio

We started audio some time ago and now we execute the follow command to stop the audio recording.

As you can see we have listened to the victim in about 3:34 minutes.

Call Logs

This is the most useful feature of this tool, through which we can get all previous call log details from the victim phone.

Done 🙂 !! You can go to that location and open all the received files.

Post a Comment

أحدث أقدم