same URL into the browser in that network. In this way, we can access all
the information that is being sent to the server.
d) Packing
After aligning the exploit into an app, you need to repackage it so that the
apk looks perfectly normal. There is maybe a small marginal change in the
size of the apk. To get undetected by the antiviruses you may use additional
security options that can spoof the phone security.
You can use the following command to package the apk and exploit:
root @ example : pack location seems.ap k
After packaging the app, you should find a smart social engineering
technique to send it to the victim's system. You can use an email with a rar
file to send it to the phone. And when the victim successfully installs the
application on his phone the app starts running in the background and will
send all of the required data to the Metasploit server.
That's it about the exploit and its implementation using the Metasploit
interface console. In the next chapter, we will give a brief introduction
about the network sniffing tool known as wire shark and end this chapter.