Hack Android Device By Sending FAKE SMS | Kali Linux

Social Engineering sometimes doesn’t work for all.

Do you agree with it? When I was a noob, I tried a lot of things to trape people but none of them worked! The heading I have given is not a click bait, it is the solution for the problems newbie attackers face.

But you can’t exactly hack an android phone with an SMS but you can make a webpage that has auto-download enabled. Because maximum people do not download payloads manually. That is the biggest problem.

Here I am going to use a tool called Venom which is basically a Metasploit Shellcode generator/compiler script. It was mainly created to test for different purposes. It depends on you how you use it. The tool uses Apache2 web server to deliver payloads using a fake web page. You just need to send a tricky SMS so that the victim clicks the link. The payload will be downloaded automatically to the victim’s system.

I don’t recommend you to hack someone’s system with his/her permission which is completely illegal. Make use of this information for educational purpose only so that you can protect yourself against these attacks.

Let’s get into the installation manual.

Configure Venom in Kali Linux

Fire up your Kali Linux Machine, open up the terminal, change the directory to the Desktop and clone Venom from Github.

cd Desktop/

git clone https://github.com/r00t-3xp10it/venom.git

Now change the directory to the venom folder and again change the directory to the aux folder which is inside the venom folder. Here you will see a script named with setup.sh . If you are a root user, you must take permission to run this shell script. Don’t worry, just follow the commands.

cd venom/

cd aux/

chmod +x setup.sh


The script will set up the tool and install all the requirements to run the tool properly. Now go back to the main folder( cd … ) and run the venom.sh script.


The tool stated successfully. Here you see we can create payloads for all popular platforms such as Windows, Android, Ios. But I will stick with Android because I want to test it for Android. So I will select No 4 .

Here I have entered the option Agent No 1 and now it showing a popup to enter the local host IP. If you want to hack over WAN, you can use port forwarding in your router or if you don’t have a router you can take Ngrok tool in use. Which is a great tool for port forwarding and it is completely free.

Now it’s asking for the port number. I have entered my port number and in the third popup, it is asking the name I want to give to the payload.

After completing the generating process of the payload, the tool asking me how I want to deliver the payload to the victim. Here I have selected the Apache2 Malicious web server.


Now it automatically starting the Metasploit MultiHandler.

Sending the Link to a victim with a Tricky SMS

The web server is running on the local host so I can open the web page using my local IP(ex: But we can’t send a naked IP address to a victim. He will find it suspicious. We must mask it. You can take bit.ly service in use. The paid service also offers you to create a custom URL.

Now you need to find an online fake SMS service. I have found a website calledSMSGang. I can send text anonymously with a fake name from the website.


As I have prepared a tricky SMS, you can apply your own trick to make it look more genuine. It depends on you.

Check out the popular commands you can use to control the compromised device after starting the Met\asploit listener.

Popular Metasploit commands

  1. shell- Interact with a Shell

  2. sysinfo- To check system information

  3. webcame_ list- Shows the list of connected webcams

  4. webcam_snap- To take a Webcam snapshot

  5. record_mic -d 20- To record mic. Also phone conversation

  6. check_root- To check the device root status

  7. dump_calllog- To retrieve call log

8 dump_contacts- To retrieve contacts

  1. geolocate- To locate the device

10 send_sms- To send an SMS

  1. sms_dump- To download all SMS as a text file

  2. run- To run any service(set the location of the service after the command).


  • Social Engineering completely depends on how you trick people. These tools only help a little to make your trick look more genuine. Venom is a great tool if you use it in the right way.

I loved the tool. What’s your opinion about it? what trick are you gonna use? tell others in the comment box below. We get inspiration to produce more tutorials like this when you leave a comment.


Thanks :slight_smile: I’ll try it :wink:


saved for try out

What a great lesson leader !!! So nice

Pin cods are not free

How ever its great

What? U said hack but you just ended by downloading payload, it needs to be installed too

Added to my bookmarks :slightly_smiling_face:

Thank You! 0101 for you


this on aws ec2,

1 Like

any solution for this/?

i think it was “sudo ./setup.sh” there is no sudo sh… i think

try, bash setup.sh :slightly_smiling_face:

I tried all the ways bro…



I tried all the ways bro…

1 Like

JUST RUN : bash setup.sh

Excellent tutorial @TheJoker
Checkout your appreciation message

I cannot open the apk on the url . As soon as a session is getting created it dies what can be done

thank you so much

need to add few more points how to use ngrok server in this. i tried but failed every time.