Kali is one kind of Linux, a program used by hackers and security specialists. It is a very popular and indispensable thing. I will not describe the pros and cons, but immediately get down to business:
Step 1: Open the terminal
Of course, to get started, start Kali and open the terminal.
Step 2: Install the necessary libraries
To run these Android virtual devices on 64-bit Debian operating systems (e.g. Kali), we need to install some key libraries that are not enabled by default. Fortunately, all of them are in the Kali repository.
kali > apt-get install lib32stdc++6 lib32ncurses5 lib32zl
Installing these three libraries is enough to work with, now we can begin to install the Android Software Developer Kit (SDK).
Step 3: Install the Android SDK
From your browser go to the site “Android KFOR” and download the Android SDK installer. Make sure you have downloaded the Linux kit. You can download and install options for Windows or Mac and then test these virtual devices in Kali, but this will be a more complex option. Let’s go the easy way and install everything in Kali.
Once you have downloaded it, you can extract it using the GUI archiving tool in Kali, or using the command line.
Step 4: Browse through the tool catalog
Next we need to go to the tools directory of the SDK.
kali > cd / android-pentest-framework / sdk / tools
After we are in the tools directory, we can launch the Android application. Just type in
kali > /android
When you do that, the SDK manager will open the GUI like it was above. Now we will download two versions of the Android operating system to practice our hacking smartphone, Android 4.3 and Android 2.2. Make sure you find them among this list, click on the box next to them and click on “install XX packs”. This will force the SDK to boot these operating systems into your Kali.
Step 5: Android Virtual Device Manager
After we downloaded all the packages, now we need to build our virtual Android devices, or AVDs. From the SDK shown above, select – > tools; AVDs Management which will open the interface like below from the Android Virtual Device Manager.
Click on the “Create” button, which will open such an interface below. Create two Android virtual devices, one for Android 4.3 and one for Android 2.2. I just called my devices “Android 4.3” and “Android 2.2” and I recommend you do the same.
Select your Nexus 4 device and the corresponding target (API 18 for Android 4.3 and API 8 for Android 2.2) and ” Dynamic Hardware Skin. The rest of the settings you should leave the default, except for adding 100 MiB SD cards.
Step 6: running the Android virtual device
After creating two Android virtual devices, Android Virtual Device Manager should look like this with two devices.
Select one of the virtual devices and click on “Start”.
This will launch the Android emulator that creates your virtual Android device. Be patient, it may take some time. When it is finished, you should be met by virtual smartphone on your Kali Desktop!
Step 7: Install the smartphone Pentest Framwork
The next step is to install the Smartphone Pentest Framework. You can use git clone to download it to
kali > git clone https://github.com/georgiaw/Smartphone-Pentest-Framework.git
Step 8: Running Apache
As you need a web server and a MySQL database, go ahead and start both services.
kali > service apache2 startkali > service mysql start
Step 9: Configuration change.
Like almost all Linux applications, the Smartphone Pentest Framework is configured using a configuration text file. First you need to go to a directory with a subdirectory of the framework console.
kali > CD / root / Smartphone-Pentest-Framework / frameworkconsole
Then open the configuration file in any text editor. In this case, I used Leafpad
kali > leafpad config
We will need to edit IPADDRESS variable and SHELLIPADDRESS variable to reflect the actual IP address of your Kali system (you can find it by entering “ifconfig”).
Step 10: Run the platform
Now we are ready to launch the Smartphone Pentest Framework. Just type in
kali > ./framework.py
And this should open the Framework menu, as shown below.
Finish! Now we’re ready to start hacking smartphones!