Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/payload/android/meterpreter/injection.md
Views: 11786
You can inject the Android Meterpreter into an existing APK using msfvenom. This will allow you to impersonate an existing application, which may make it easier to convince your victim to install the APK.
Vulnerable Application
It should be possible to inject Meterpreter into any APK, however some applications have complex resource structures which may not work with apktool
. Additionally some applications have security measures that prevent the application from working as expected once it has been modified.
Finding APKs
There are many websites that provide standalone APK that can be downloaded, e.g: APKPure, APKMirror, RAW APK. You can also build a simple application yourself with Android Studio.
Additionally you can pull APKs from a device connected via ADB:
Requirements
APK Injection (as opposed to generating a single APK payload) requires a few tools to be present on your command line already:
Apktool - Used for rebuilding the APK
keytool - To create and extract signing certificates
jarsigner - To re-sign the APK
Installing these tools (if they are not installed already) will depend on your OS. Apktool can be installed manually or automatically (e.g brew install apktool
). keytool and jarsigner can be installed by installing the appropriate JDK.
Verification Steps
Next, start an Android device. Upload the APK, and execute it, as you would with a normal Android meterpreter APK.