I've successfully generated a standard android/meterpreter/reverse-tcp payload and manually injected it into an apk. It works, but the session dies often and then it only start anew once the infected app is launched again. Is there a way to keep a session alive and automatica ...more
I've successfully generated a standard android/meterpreter/reverse-tcp payload and manually injected it into an apk. It works, but only as long as the infected app is running. How can I keep the backdoor running in the background?
I've successfully generated a standard android/meterpreter/reverse-tcp payload and manually injected it into an apk. It works, but only as long as the app is running. How can I start the backdoor on the next reboot?
I've successfully generated a standard android/meterpreter/reverse-tcp payload and manually injected it into an apk. It works, but it also get detected by the OS (Android 7.0) as a virus. Any tips on how to avoid this? Anyone know what exactly trigger the detection?