Implementation of Metasploit Framework on Android Platform in a Single Network
DOI:
https://doi.org/10.58905/saga.v4i1.608Keywords:
Metasploit, Android, Penetration Testing, Backdoor, PayloadAbstract
This study discusses the implementation of the Metasploit Framework on the Android platform within a single network. The objective of this research is to analyze the vulnerability of Android devices to backdoor attacks using penetration testing tools. The payload in the form of an APK file was created using msfvenom and tested on Android devices within a local network. The results showed successful exploitation, including access to SMS, call logs, and device location. This study highlights the need for security awareness among Android users and the importance of preventive measures.
References
N. A. Pandusaputri, R. B. Ramadhan Mokodompit, and E. P. Simangunsong, “KENYAMANAN PENGGUNA IOS DAN ANDROID DI KALANGAN GENERASI Z.,” J. Syntax Lit., vol. 9, no. 5, 2024, Accessed: Jul. 29, 2025. [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=25410849&AN=177805927&h=uksAeuWpjxLKL48E9O%2Fto7SdL8xkVBLco0X5X%2FEOyRvwH5Jruu%2BuqgaDJKekD2JdsFvYpsQDvNgIDykjqXhRGg%3D%3D&crl=c
F. F. Navintino, M. F. Fahreza, and E. Rilvani, “Literature Review: Comparison of Security Systems in Android and iOS Applications,” STORAGE J. Ilm. Tek. Dan Ilmu Komput., vol. 4, no. 1, pp. 22–28, 2025.
R. Vice, N. C. Simaremare, and S. Manalu, “The Development of Cybercrime: Its Impact on National Security and Resilience and Its Prevention,” Mimb. KEADILAN J. Ilmu Huk., pp. 71–83, 2024.
S. Alhidamkara, S. Somantri, and I. L. Kharisma, “Security Analysis and Exploitation of Android 13 Kernel Using Metasploit Reverse_Tcp,” Kesatria J. Penerapan Sist. Inf. Komput. Dan Manaj., vol. 5, no. 3, pp. 845–856, 2024.
A. S. Mubarak, M. N. Insirat, and M. N. Lutfiya, “Ransomware: Evolution, Classification, Attack Phase, Detection and Prevention,” in Proceedings of the National Seminar on Electrical Engineering, Information Systems, and Informatics Engineering (SNESTIK), 2024, pp. 1–6. Accessed: Jul. 29, 2025. [Online]. Available: https://ejurnal.itats.ac.id/snestik/article/view/5588
M. R. A. Fitra, A. A. S. Effendi, S. A. Priscilia, and D. Kiswanto, “PENETRATION TESTING USING HYDRA AND METASPLOIT ON THE SECURE SHELL PROTOCOL,” JATI J. Mhs. Tek. Inform., vol. 9, no. 1, pp. 1017–1024, 2025.
S. Alhidamkara, S. Somantri, and I. L. Kharisma, “Security Analysis and Exploitation of Android 13 Kernel Using Metasploit Reverse_Tcp,” Kesatria J. Penerapan Sist. Inf. Komput. Dan Manaj., vol. 5, no. 3, pp. 845–856, 2024.
M. F. Aska, D. P. Putra, and C. J. M. Sinambela, “Effective Strategies for Cybersecurity Implementation in the Digital Age,” J. Inform. Inf. Secur., vol. 5, no. 2, pp. 187–200, 2024.
H. SETIAWAN, “VISUALIZATION OF METASPLOIT TROJAN ATTACKS ON ANDROID USING THE K-MEANS METHOD”, Accessed: Jul. 31, 2025. [Online]. Available: https://repository.unsri.ac.id/146546/1/RAMA_56201_09011182025004_0003047905_01_front_ref.pdf
T. H. F. NUGROHO, “CONGESTION CONTROL OPTIMIZATION IN SOFTWARE-DEFINED NETWORKS (SDN) BASED ON REINFORCEMENT LEARNING,” Accessed: Jul. 29, 2025. [Online]. Available: https://digilib.itb.ac.id/assets/files/2025/MjMyMjIwNzYgVHJpIEhlbmRhcnRvIEZOIERyYWZ0IFRlc2lzIEZpbmFsIC0gVHJpIEhlbmRhcnRvIEZhamFyIE51Z3JvaG8gKDEpLnBkZg.pdf
F. Y. Pratiwi and F. R. D. Miarsa, “The Urgency of Public Education in Countering Personal Data Misuse,” RIGGS J. Artif. Intell. Digit. Bus., vol. 4, no. 2, pp. 1342–1349, 2025.
H. W. Putra and I. G. L. P. E. Prismana, “Application of the Murder Collaborative Learning Model in Improving the Learning Competence of Basic Programming Subjects for Vocational School Students Based on PjBL Case Study: Smks Semen Gresik,” IT-Edu J. Inf. Technol. Educ., vol. 10, no. 02, pp. 55–67, 2025.
W. Darmawan and T. Aprilia, “Analysis of Metasploit Framework ‘msfvenom’ Backdoor Trojan and Fully Undetected (FUD) Trojan,” Techno Com, vol. 23, no. 1, 2024, Accessed: Jul. 29, 2025. [Online]. Available: https://core.ac.uk/download/pdf/604543777.pdf
S. Alhidamkara, S. Somantri, and I. L. Kharisma, “Security Analysis and Exploitation of Android 13 Kernel Using Metasploit Reverse_Tcp,” Kesatria J. Penerapan Sist. Inf. Komput. Dan Manaj., vol. 5, no. 3, pp. 845–856, 2024.
G. P. I. Fanani, M. A. Mu'min, and N. Tristanti, "Analysis and Testing of Website Vulnerabilities Using OWASP ZAP," J. Res. Syst. and Inf. Tech., vol. 3, no. 1, pp. 36–50, 2025.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Muhammad Fitra Gemilang, Arif Senja Fitrani, Mochamad Alfan Rosid, S Sumarno

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.









