Automatic backdooring apk with meterpreter (PoC)
apk place within "apkbinder" directory, named app-debug.apk
Kali-Rolling:
python 2.7.x libraries: os re shutil zipfile tempfile argparse
metasploit
apktool 2.0
dex2jar
apkbinder.py - APK automatic backdooring script
permisos.xml - Permission of meterpreter
list_apk.txt - dependence of mass-trojanizer module
usage: apkbinder.py [-h] -l LHOST [-p LPORT] [-m]
Backdooring APK with meterpreter
optional arguments:
-h, --help show this help message and exit
-l LHOST, --lhost LHOST
LHOST select local host
-p LPORT, --lport LPORT
LPORT select local port
-m, --mas-trojanizer Massive trojanization module, you need edit file:
list_apk.txt
- mass-trojanizer -> module for massive trojanization, need list of ubications apk in list_apk.txt (you can use the command:
locate *.apk > list_apk.txt
to search apk files and saves paths in file)
script based by https://github.com/nodoraiz/AndroidAnalysis/blob/master/modify.py (nodoraiz)
create multiple sessions, but only one has privileges
vay3t & 4c1d0_b1n4r10