Hey guys, the article is going to be interesting because in this tutorial we will present you such a (RAT) remote administration tool with the help of which you can easily control someone else’s android smartphone. We think it does not require any other tools that’s why you can control this through third party applications such as termux etc.
Lets install this tool !!
Installation
As we have already told you that you can control this tool from android application but in our case we we’ll choose kali linux operating system. Now first of all we will download this tool using git command from github and then go to the directory. We already have the “pip” tool installed, hence we will execute the last command to setup it successfully.

If you are stuck somewhere, you can use the help command to check for missing arguments or attributes.

Generate APK
Now we will try our first and try to create the payload using the following command. But change “-i” and “-p” according to yourself.

Share
As you can see our payload is successfully created without any errors, as well as we take the help of python file service to share our payload with the victim.

Payload Installation
Now everything is done from the attacking side and as soon as the victim opens the payload they will look like the image below. But it’s an truely undetectable payload.

It’s time to take control of the victim smartphone and for this purposes we have to execute the following command. But change “-i” and “-p” according to you.

Remote Shell
As you can see that we have successfully connected to the victim smartphone. But if you have no idea how to control the victim’s smartphone then use the help command.

Device Info
You can check the information of the victim android device by executing the following command.

Camera List
The following command will ask you from which camera you want to take a picture from the victim’s phone.

As you can see the picture has been successfully clicked from the victim’s phone without her knowledge.

SMS
Similarly you can get all the SMS stored on the victim’s phone by executing the following command.

The results are in front of you.

Sim Details
As a most useful feature for forensic investigator, through this facilities we can dump the complete details related to the SIM card.

IP and Mac Address
As you can see that we got the IP and MAC address of the victim phone.

Audio
We started audio some time ago and now we execute the follow command to stop the audio recording.

As you can see we have listened to the victim in about 3:34 minutes.

Call Logs
This is the most useful feature of this tool, through which we can get all previous call log details from the victim phone.

Done !! You can go to that location and open all the received files.

إرسال تعليق