تطبيقات

How to Bind Payload To Any APK — Android Backdoor Tutorial



This video shows you how to bind your generated payload to any original APK file, effectively creating a backdoor.
i.e: This video shows you how to create a backdoor on android

Required packages: lib32stdc++6 lib32ncurses5 lib32z1
ApkTool: https://ibotpeaches.github.io/Apktool/
Ruby script: http://pastebin.com/uh0hRWR7

This is meant for educational purposes only and should not be attempted on devices you don’t own.

Music provided by OLSO (https://soundcloud.com/olso_music/)

Smash that like button lads, subscribe to not miss out.

Arcanecfg
apk

السابق
تطبيق ممنوع من النشر يبحث عنه الجميع بدون كود تفعيل للمشاهدة القنوات
التالي
ألعاب السيارات أطفال – العاب اندرويد – Games Cars GT

49 تعليق

أضف تعليقا

  1. Installed it on the phone but session doesn’t start

  2. Yac Ine قال:

    what if the user update the app what's gonna happen ???

  3. There is no backdoor. Apk is created in my case… Why to do? Pls help me.

  4. i got an error
    unable to find hook point
    how can i fix it?

  5. Staszka قال:

    if you dont have d2j-apk-sign
    apt-get update && apt-get install dex2jar

  6. successfully created and installed on my own phone within local host but can't exploit because my payload is not connecting with my system so….!!!
    as i type exploit and press enter this happens:
    expected behviour:
    msf exploit(handler) > exploit
    * Sending stage (69089 bytes) to 10.151.208.112
    * Meterpreter session 1 opened (192.168.43.128:3344 -> 10.151.208.112:45654) at 2017-10-19 23:42:26 +0700
    * Sending stage (69089 bytes) to 192.168.43.
    my current situation:
    msf exploit(handler) > exploit
    [*] Exploit running as background job 0.

    [*] Started reverse TCP handler on 192.168.0.100:4444
    msf exploit(handler) >
    please tell me solution…!

  7. this is great, I use this method and ngrok to use outside LAN and it works awesome, great video

  8. this lib not work – lib32stdc++6 lib32ncurses5 lib32z1

    my terminal show this :

    [email protected]:~# apt-get install lib32stdc++6 lib32ncurses5 lib32z1
    Reading package lists… Done
    Building dependency tree
    Reading state information… Done
    E: Unable to locate package lib32stdc++6
    E: Couldn't find any package by regex 'lib32stdc++6'
    E: Unable to locate package lib32ncurses5
    E: Unable to locate package lib32z1

  9. bro i have stuck in unable to locate hook point plss tell how to paas that anyone

  10. What about using metasploit autopwn browser exploits? Would that be more easy to do?

  11. saurav s قال:

    bro icant find these libraries…..how to get that…files….is there any way….

  12. unable to locate lib32stdc++6 lib32ncurses5 lib32z1 (none running kali linux))

  13. bro Infected Apk is not getting installed but original is properly installed

  14. berukhim1 قال:

    Could not decode attr value, using undecoded value instead: ns=android, name=gravity, value=0x00000011

  15. Tato Juice قال:

    I tried the same thing on windows and put the apktool on c:/windows/ but its not working

  16. on which android version u tested it ?? bcz my meterpreter usually die android 6.0 and 7.0 .with ver below it work fine

  17. Bro error in msfconsole

  18. Jig Saw قال:

    PLEASE REPLY:
    Hey man awesome vid but i've got questions:
    1)Let's say my victim launched the app and then uninstall it later, will this disable my listener or the payload has already been installed on the device the minute he launched it?
    2) Once the victim has launched and quit the game, will i be still able to use to control the device or he must be in the game?

  19. "bash: d2j-apk-sign: command not found" please help

  20. You dont know how to zoom cuz?

  21. m m قال:

    Lecture des listes de paquets… Fait
    Construction de l'arbre des dépendances
    Lecture des informations d'état… Fait
    E: Impossible de trouver le paquet lib32stdc++6
    E: Impossible de trouver de paquet correspondant à l'expression rationnelle « lib32stdc++6 »
    E: Impossible de trouver le paquet lib32ncurses5
    E: Impossible de trouver le paquet lib32z1

  22. Life قال:

    will you be ablt to start the sessoin back up or do you have to make a new apk file every time

  23. is it works with droidjack server

  24. bash: apk-embed-payload.rb: command not found
    getting error while creating payload please help me

  25. will that apk file wil help us to gain acces to the target when ever we want ? till the apk file is with target we cangain the acces on them ??

  26. saeed ra قال:

    how to delete sms victim's phone ??

  27. d2j command not working what should I do tell please

  28. bro this telling no apktool pls help

  29. bro how to install metasploit on Kali Linux for android plz make a tutorial….

  30. Facing this error
    [*] Decompiling payload APK..
    Input file (/payload) was not found or was not readable.
    apk-embed-payload.rb:189:in `initialize': No such file or directory @ rb_sysopen – original/AndroidManifest.xml (Errno::ENOENT)
    from apk-embed-payload.rb:189:in `open'
    from apk-embed-payload.rb:189:in `<main>'

  31. Tom Sawyer قال:

    Do android has to have allow installation from unknown sources checked?

  32. why is signing the apk file important?

  33. bro level of your VIDEO = legend

  34. دوستان سلام
    کسایی که با نصب لایبراری های فوق مشکل دارن باید به جای دستور
    sudo apt-get install lib32stdc++6 lib32ncurses5 lib32z1
    دستور زیر رو بنویسن تا مشکل حل بشه
    sudo apt-get install libstdc++6:i386 libncurses5:i386 libz1:i386

  35. Mohit قال:

    can i use window to bind payload any android

  36. is it possible to hide your app from the device launcher so the user cannot uninstall it, i googled it a bit and i found you can remove some code from the android manifest which is : <intent-filter >
    <action android:name="android.intent.action.MAIN" />
    <category android:name="android.intent.category.LAUNCHER" />
    </intent-filter

    is this correct ? ik the app can still be visible if they go to search for all installed apps but what i need is just so it doesnt show on the launcher itself hope this is possible.

  37. B. GangsTa قال:

    what are the benefits of you using backdoor hack?

  38. Hey the video isn't clear can i get a word document on the same step by step

  39. what happen if the victim uninstall flappy bird apk? still backdored or not?

  40. Kouki قال:

    hey arcane do you still have a link to download your most recent turbo?

  41. Alon levi قال:

    Ruby file does not work at all nonsense

  42. Foxenite قال:

    aye hmu with that turbo for instagram pls

  43. how do I hack into Android camera or massage files for other devices

  44. I_D_K قال:

    I can't install lib32stdc++6, lib32ncurses5 and lib32z1
    "E: Unable to locate package" What I have do?

اترك تعليقاً