🔓 Complete Guide to AndroRAT: Hack Android Devices Over LAN & Internet Using Python - Educational Purposes Only
⚠️ Disclaimer: This tutorial is intended for educational and ethical hacking purposes only. Unauthorized access to devices is illegal. Use this tool only in a controlled environment or with explicit permission.
📌 What is AndroRAT?
AndroRAT (Android Remote Administration Tool) is a powerful open-source tool that allows you to remotely access and control Android devices. It is commonly used by cybersecurity learners and ethical hackers to understand how remote access works on Android.
AndroRAT is written in Python and works by creating a malicious APK file that, when installed on a target device, gives the attacker full control via a remote shell.
🎯 Features of AndroRAT
AndroRAT offers an impressive range of features once connected to a victim's phone:
-
Access call logs, SMS, contacts
-
Capture camera photos or record audio/video
-
Track GPS location in real-time
-
Send fake messages or toasts
-
Even reboot the phone remotely!
Let’s walk through how to install, build the APK, and use these features—step by step.
🔧 Step-by-Step Installation of AndroRAT
🛠️ Build the Malicious APK
To generate a custom APK (Remote Access Trojan):
✅ Replace 10.0.0.6 with your actual local IP address. This creates a payload APK (rat.apk) that connects back to your server.
🌐 Serve the APK via HTTP
To make the APK downloadable from another device on the local network:
Now open the browser on the victim's device and visit:
Install the APK manually (ensure "Unknown Sources" is allowed).
💻 Start the Shell & Connect to the Victim
Once the victim installs and opens the RAT APK, connect to the session:
You now have a command-line shell connected to the Android phone.
📋 AndroRAT Command List Explained
Use the following commands to control the Android device:
| Command | Description |
|---|---|
deviceInfo | Displays model, Android version, etc. |
camList | Lists available cameras |
camera | Takes a photo using front/back camera |
recordMic | Records audio via microphone |
recordVideo | Records a short video |
getSMS inbox | Shows inbox SMS messages |
getSMS sent | Shows sent messages |
getCalllogs | Displays recent call logs |
getSimDetails | Shows SIM and carrier info |
getContacts | Dumps full contacts list |
getLocation | Tracks real-time GPS location |
getClipsData | Retrieves clipboard data |
getOperator | Shows network operator |
toast <msg> | Displays a fake message popup on screen |
reboot | Forces the device to restart |
You can perform these operations live through the AndroRAT shell.
🌍 Connect Over the Internet Using Ngrok
To control the Android device from anywhere in the world, use Ngrok to tunnel your server:
✅ This creates a globally accessible APK. Ngrok handles the port forwarding, so the connection works across NAT or firewalls.
🔗 How to Connect Mobile Over Internet
-
Install
devil.apkon the target Android device. -
Run
python3 androRAT.py --shelland wait for connection. -
Ngrok will handle incoming connections over the internet.
-
The device now appears in your shell, ready for commands.
🎥 Watch Full Demo on YouTube
📺 I have created a step-by-step video tutorial on this setup, showing every step in action—from installation to full mobile control.
Learn Mobile Hacking with AndroRAT – Guide for Ethical Hackers & Analysts
👉 https://youtu.be/fPXGDpnB3AQ
AndroRAT Mobile Hacking Prevention Techniques
1. ✅ Avoid Unknown APKs and Suspicious Downloads
Do not install apps from unofficial sources or unknown websites. AndroRAT usually spreads via fake or repacked APK files.
🔐 Tip: Enable "Google Play Protect" and disable "Install from Unknown Sources" in your phone settings.
2. 🔄 Keep Your Android OS and Apps Updated
Regular system updates patch critical vulnerabilities. Hackers often exploit outdated Android versions using RATs like AndroRAT.
3. 🛡️ Use a Trusted Mobile Security App
Install a reputable antivirus app (like Bitdefender, Kaspersky, or Malwarebytes) to detect and block RATs or Trojan-infected apps in real-time.
4. 📱 Check App Permissions Carefully
AndroRAT requires access to sensitive features like camera, microphone, contacts, and messages.
👀 Tip: Regularly review app permissions and revoke anything suspicious from Settings → Apps → Permissions.
5. 🌐 Be Cautious on Public Wi-Fi Networks
Avoid accessing sensitive data or downloading files on open/public Wi-Fi, as attackers can deploy remote tools like AndroRAT using MITM techniques.
6. 🔥 Reset or Reflash if Compromised
If you suspect infection, back up important data and perform a factory reset or reflash the ROM to fully wipe out persistent RAT infections.
Please like, share, and subscribe to my channel: Learncybersecurity BD
Created by: Engr. Md. Jashim Uddin
Comments
Post a Comment