How to Set Up and Use Android Spyware for Educational Purposes

Sep 16, 2023 | Programming

Welcome to the fascinating world of Android Spyware! In this guide, we will explore how to set up and utilize an educational tool designed for command control and web GUI, built around the Metasploit framework. Let’s dive into the details!

Table of Contents

About the Project

This educational tool leverages the power of the Metasploit framework within a Dockerized Kali Linux environment. With it, you can simulate many actions that can be performed on an Android device, provided the device is on the same Local Area Network (LAN).

Disclaimer

This software is intended for educational purposes only. Using it for unauthorized access to real devices is illegal. Always use the software responsibly and at your own risk. The author disclaims any responsibility for your usage of this tool.

Built With

Features

Here are some exciting features this tool offers:

  • Dump System Info
  • Live Webcam Stream
  • Microphone Recording (Android 9.0 only)
  • Dump Messages and Call Logs
  • Run Shell Commands
  • Install/Uninstall Apps
  • Supported ADB Functions (like Wi-Fi info, screen recording, etc.)

Getting Started

Follow these steps to get the project up and running:

Prerequisites

Installation

  1. Install ADB via Chocolatey:
  2. choco install adb --version=1.0.392
  3. Create a project directory and download the Docker Compose file:
  4. curl https://raw.githubusercontent.com/CanciuCostin/android-spyware/master/docker/docker-compose.yml -o docker-compose.yml
  5. Download required Docker images:
  6. docker-compose pull

Deployment

  1. Start the ADB server:
  2. adb server
  3. Optional: Set your Google Maps API Key in the Docker Compose file.
  4. Start the container:
  5. docker-compose up
  6. Access the application in the browser via http://localhost/admin.

Debugging Issues

If you encounter issues, here are some troubleshooting tips:

  • Ensure you generated the APK with the correct machine IP.
  • Check if your local firewall is blocking connections on ports 2222, 3333, 4444.
  • Test Docker container connectivity using this URL.
  • Restart the ADB server if connection issues persist:
  • adb kill-server
    adb server

For more insights, updates, or to collaborate on AI development projects, stay connected with fxis.ai.

Build

To build the Rails server:

git clone https://github.com/CanciuCostin/android-spyware.git
cd android-spyware
gem install bundler:2.1.4
bundle
npm install -g yarn
yarn install --check-files

Set the following environment variables:

ANDROIDSPYWARE_DATABASE_HOST=localhost
ADB_HOST=localhost
RAILS_HOST=127.0.0.1

Run the server:

rails server

If you’re using a local PostgreSQL database, remember to initialize it as needed.

Roadmap

  • Implement Instructions page
  • Add option for persistence script to maintain connection after reboot
  • Public IP handler integration for tracking devices outside of LAN

License

This project is distributed under the MIT License. Please refer to the LICENSE file for more information.

Contact

If you have any questions or need further assistance, please reach out to: costin.canciu@gmail.com

At fxis.ai, we believe that such advancements are crucial for the future of AI, as they enable more comprehensive and effective solutions. Our team is continually exploring new methodologies to push the envelope in artificial intelligence, ensuring that our clients benefit from the latest technological innovations.

Stay Informed with the Newest F(x) Insights and Blogs

Tech News and Blog Highlights, Straight to Your Inbox