0% found this document useful (0 votes)
1K views

L3 Mon

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

L3 Mon

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

“L3MON,” A CLOUD-BASED REMOTE

ANDROID MANAGEMENT SUITE


SAMARATHIBAN.R, SUPRAJA.G, SURESH.R, VASANTHAKUMAR.J
SRM VALLIAMMAI ENGINEERING COLLEGE

ABSTRACT: The following paper demonstrates how web based interface and execute our commands
to use “L3MON,” a cloud-based remote android on targeted devices.
management suite. L3MON is a cloud-based remote
Android management suite that will run on the Kali
Linux operating system. Kali Linux (formerly known
as Back Track Linux) is an open-source, Debian based
II.FEATURES
Linux distribution aimed at advanced Penetration
Testing and Security Auditing. Kali Linux contains  GPS Logging
several hundred tools targeted towards various  Microphone Recording
information security tasks, such as Penetration Testing,  View Contacts
Security Research, Computer Forensics and Reverse  SMS Logs
Engineering. Kali Linux is a multiplatform solution,  Send SMS
accessible and freely available to information security  Call Logs
professionals and hobbyists. If we are currently using  View Installed Apps
windows or Mac OS, we can use virtual machine  View Stub Permissions
which runs like individual computers with individual  Live Clipboard Logging
operating systems and applications, they have the  Live Notification Logging
advantage of remaining completely independent of one  View WiFi Networks (logs previously seen)
another and the physical host machine L3MON  File Explorer & Downloader
Android Management Suite is written in Node JS. If  Command Queuing
seen, it is a type of Android management tool that  Built In APK Builder
generates a completely undetectable payload for the
android.
III. PREREQUISITIES
KEYWORDS: L3MON, CLOUD, RAT, NODEJS,
VMWARE, KALI-LINUX.  Java Runtime Environment 8
o See installation for OS specifics
I. INTRODUCTION
 Virtual Machine
L3MON is a cloud-based remote Android  Kali Linux OS
management suite, powered by Node.js Built
as a side project, L3MON is a remote Android IV.PROCESS
management suite, we can use it to gain access on
any android smartphone. In easy words this is a 1. Install JRE 8 (We cannot stress this
Android RAT (Remote Administrative Tool). enough use java 1.8.0 ANY issues that
don`t use this will be closed without a
response)
In today's detailed tutorial we learn how to install
& configure L3MON on our Kali Linux  Debian, Ubuntu, Etc
system and use it.  sudo apt-get install
openjdk-8-jre
Using L3MON we can make an Android APK  Fedora, Oracle, Red Hat, etc
 su -c "yum install java-
payload and send it to android device and after
1.8.0-openjdk"
installing it on android device we can gain the
 Windows
access of Android device via L3MON's web based  Install java jdk-8u301-
interface, we can send commands from the easy linux-x64.tar.gz
4. Tool Installation - Download the entire
tool from github with git command, go to
the directory and then its server directory
and execute the “npm” command.
git clone
2. Install Dependencies – NodeJs. As we https://github.com/D3VL/L3MO.git
know that the entire project is coded in
cd L3MON
nodejs, so we have to install nodejs in our
system in order to operate it. In addition, cd server
we have to install NPM package manager
to publish Nodejs projects. npm install

apt install nodejs npm

5. After executing the command you will get


an error which we have highlighted which
you need to execute to fix the issues.

3. Install PM2 - Basically pm2 allows us to


npm audit fix
handle application deployments and keep
applications alive forever. So you need to
install it by using the following command.

npm install pm2 -g

6. Now start and daemonize the application


by using the following command.
pm2 start index.js nano maindb.json

11. BOOT -Everything is done and now we


need to restart all the servers again.

7. Make pm2 auto-boot at server restart by


using the following command.

pm2 startup
12. In just one attempt we have successfully
configured this tool on our localhost. Just
use the following location, execute it on
our browser, enter the username “admin”
and password “12345″ and that’s it you
will redirect to the admin panel.
8. We followed all the above instructions to
check if it worked. Everything is fine, So
we need to shut it down again to do some
required configuration in the server.
pm2 stop index

13. APK Building - Without wasting time, just


9. We need to change the password to MD5 go to the APK Builder section and give the
hash encryption and put it in the localhost IP address and enter the port
configuration file to secure the admin according to you.
panel. You can change the password
according to the command below.

echo -n “Your Password” |


md5sum

10. Now here you can keep the username and


password as per your choice but only add
MD5 hash value to the password. 14. It only takes 10 to 20 seconds to create
android trojan. Once the payload is
created, just download it and share it to the
victim as per you. will phone.

15. FUD Payload - It is very important


whether the payload is detectable or not ?
But in this case our payload is completely
undetectable as you can see in the image
below. 18. GPS Information - You can track the exact
location of the victim mobile.

19. Contact Info - It has dumped all saved


contacts on the victim mobile.

16. Once the victim has installed it and then


you will get full access to the android
phone. As you can see in the image below,
we have got more information about the
victim’s phone such as his IP address,
device name and more.

17. Once you get all these options to manage


the victim enter the manage button, you
20. Call Logs - You can see recent and already installed into the victim’s mobile.
previous calls on the victim’s mobile.

21. SMS Manager - Through this facility you 24. File Explorer - The main feature came at
can view all the messages as well as send the end from where you can control the
the message to another person through the entire file manager of the victim mobile.
victim mobile.

22. WIFI Manager - You can get the details of


the previously connected wifi network.
IV. CONCLUSIONS

Changes in terminology have been mostly


ineffective—what's needed is a change in mind-
set. Hackers are just people with innovative spirits
and an in-depth knowledge of technology.
Hackers aren't necessarily criminals, though as
long as crime has the potential to pay, there will
always be some criminals who are hackers.
There's nothing wrong with the hacker knowledge
itself, despite its potential applications.
23. Installed Applications - You can also
monitor what kind of applications are
Like it or not, vulnerabilities exist in the software
and networks that the world depends on from day
to day. It's simply an inevitable result of the fast
pace of software development. New software
REFERENCES
 Secnhack
Security and Hacking Blog
 Kali linux.in
 Oracle.com
 Oreilly.com
 Github.com
 d3vl.com

You might also like