Skip to main content

⚙ HOW TO CRACK ANY ANDROID APP,GAME OR ANYTHING BEEN IS A THIRD PARTY APP

Hacking Any Android Device Using AndroRAT App Binder

Usually any Android Device can be hacked using Metasploit Meterpreter attack but many people are not aware of that process as it is not user friendly. But using a simple tool called AndroRAT (Android Remote Administration Tool) it is possible for anyone to hack any Android device. By successfully running this tool one can retrieve following information from target Android device.

  • Get contacts (and all theirs informations)
  • Do vibrate the phone
  • Get call logs
  • Open an URL in the default browser
  • Get all messages
  • Send a text message
  • Location by GPS/Network
  • Do a toast
  • Monitoring received messages in live
  • Streaming video (for activity based client only)
  • Monitoring phone state in live (call received, call sent, call missed..)
  • Stream sound from microphone (or other sources..)
  • Take a picture from the camera

You can do almost anything with this tool. All you need to do is to install a simple application on target Android device. This application is generated by AndroRAT tool which further can be binded(joined) with any android application for stealth(Anonymity). Once you have installed the deploy package(.apk) on Android device you can control the device anonymously through a user-friendly GUI.

Things you'll need: 

  • AndroRAT (Android Remote Administration Tool), download here.
  • (Please Turn off Anti-virus and Windows defender, this zip file is not virus but the anti-virus alerts it as virus because it is a Hacking Software). 
    • Router Port Forwarder (Only if you are using a wireless router), download from here.
    • An Android device to test the deploy package.
    • A good internet connection.
    • Basic computer knowledge.
    • A bit of patience.

      Prerequisites(for wireless router users):

      • Download the Router Port Forwarder tool from the above link.
      • Install it on you PC and open it.
    • The software automatically detects your router model number and displays it.


    • Now in the "Port forwarding" tab click "Add".


    • In the next window enter the name of the port as you like, leave the protocol as tcp, enter the port you would like to open (Ex. 8080,1234,4444...).
    • And finally the internal ip address.
    • To know your internal IP address open Start > Run, and then enter ncpa.cpl, this opens active network connections.(you must be connected to the internet)
    • Right click on the connected network and click status and then click details.
    • In the details windows check the Ipv4 address, it should be something like 192.168.XX.XX.


    • Note the Ip address for further use. This is your internal ip address.
    Note: You should check your internal ip only when you are connected to the internet.

    Procedure to create a deploy package:

    • Download the AndroRAT Zip and install it.
    • Download any Android application like Temple run, Subway Surfers with which you would like to bind the hacking application.
    • Open the extracted folder and then run the application AndroRat Binder.
    • It should look like the below screenshot.
    • Now in the Ip box enter your internal ip address which you have noted in the prerequisites.(If you don't know your ip address read prerequisites from step 7.)
    • In the second box enter the port which you have opened in port forwarder tool (only wireless router users, other can enter the port whatever they like).
    • In the third box, browse and select the target application with which you would like to bind the hacking application.
      • Now hit 'Go' and wait for the AndroRat to build the deploy apk.
      • Once the process completes you will find the result application in the same AndroRat folder.
      • Now Install it one any Android device and open it.(Note that the device should have an active internet connection)

       Steps to control the Target Android Device:

      • Once you have successfully installed the result apk that was generated by AndroRat, you can control the victim's Android device through a well designed GUI.
      • In the AndroRat folder, again open the AndroRat folder.
      • In that folder you will find a java application named "AndroRat".
      • When you open it for the first time, allow the firewall exception for the application.
      • Now click server at the top and enter the port which you have opened before.
      • Save it and restart the application. Now the application starts listening to the new port.
      • In this application you will find the list of connected devices.
      • Double click the device you would like to access and you see a window with full built-in controls
        • Now hit 'Go' and wait for the AndroRat to build the deploy apk.
        • Once the process completes you will find the result application in the same AndroRat folder.
        • Now Install it one any Android device and open it.(Note that the device should have an active internet connection)
    •  Steps to control the Target Android Device:
        • Once you have successfully installed the result apk that was generated by AndroRat, you can control the victim's Android device through a well designed GUI.
        • In the AndroRat folder, again open the AndroRat folder.
        • In that folder you will find a java application named "AndroRat".
        • When you open it for the first time, allow the firewall exception for the application.
        • Now click server at the top and enter the port which you have opened before.
        • Save it and restart the application. Now the application starts listening to the new port.
        • In this application you will find the list of connected devices.
        • Double click the device you would like to access and you see a window with full built-in controls.



    • Note that the target device is listed as long as he is connected to the internet and is using the deploy application created by AndroRat.
    • Note: 
      • If the application does not work and no devices are listed in the AndroRat application, try building just the Hacking application instead of binding it other application.
      • For the users who are using wireless routers, port forwarding is a must.
      • Before trying it on others devices try it on your own Android first.
      • Turn off the Anti-virus before extracting the AndroRat zip which you have downloaded.
      • If possible turn off Firewall too.
      • Make sure you have a Good internet connection.
      • Happy Hacking!!
      Disclaimer: Controlling others Android Mobile without their permission is illegal. This post is for educational purpose only and never try to misuse it. To prevent these kind of hacks, make sure you read all the app permissions before you install any application.

    Comments

    Popular posts from this blog

    How to send Anonymous Mails

    Is there something serious you wish to say to someone without being known? Then, you're in the right place to learn how to send anonymous mail to somebody. Also, the good news is that sending anonymous mail is not one of the illegal things in the world. In my day-to-day activities, I send bulk anonymous mails to people worldwide. Sometimes, I make use of self-destructible email senders which means the mail recipients can  reply to my mail; talk less of knowing my identity. Sending anonymous email is a good way to disclose your mind and hide your identity without being traced. A lot of secret agencies and hackers need it to stay on top of their game. You're human and you deserve bro know how this secret is take place and the need to practice it. Before then, let's highlight some of  the relevant reasons why it's necessary to send anonymous mail to somebody. Whistle Blowing You can't whistle blow in an organization or a country without...

    How to become a hacker [Complete tutorial for beginners]

    Hackers are amazing! "This is what you read every time you go online. When you see the movies, their activities make you wow. In his article, your dreams on how to become a hacker in 15 minutes will be made a reality. For a start, you can start, you can start by knowing how to hack someone's password. To engage yourself in some illegal hustles l, then you really need to learn the art of hacking. The hacking you know today started in the 1970s when Dennis Ritchie invented the "C" programming language. However, the term originated at Massachusetts institute of Technology, a private research University in Cambridge, Massachusetts, in the 1960s. Note:  By hacker, I'm not referring to script kids who use ready-made software to run minor hacking tasks. I understand that becoming a hacker is tough, but every elite hacker today started somewhere. At some point, you would feel like giving up. The point you feel like giving up my s the point where you're about...

    The two main steps in making scale drawing

    Scale drawings show an image either reduced or enlarged in size. The change between the original and the scaled drawing is generally represented by two numbers separated by a colon, like 10:1 (read as “ten to one”). The difference between the ratio numbers represents the factor by which the scaled image is enlarged or reduced. So for a 10:1 scale ratio, a 1 inch (2.5 cm) drawing will be 10 inches (25 cm) in real life. Method  1  of 2: Adjusting Image Size by Hand 1 Measure the object you’ll be scaling.  For images that are irregularly shaped, measuring with a ruler or tape measure can be difficult. In these cases, outline the perimeter with a piece of string, then measure the length of the string to find the perimeter. For rough scaling of simple 2-D objects, you can probably get by with only measuring the width and height of the object. [1] It’ll be helpful when you start drawing the scaled image if the perimeter is broken up into segments,...