How does msfvenom generate such a powerful payload despite being so small in file size? #17692
Unanswered
Morsmalleo
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Pretty simple question, how does msfvenom generate such a powerful APK payload despite being so small in size?
Please Read
metasploit APK payloads contains only 4 files as seen in the screenshot below of the Java files belonging to This section of the Rapid7/metasploit-payloads repo...

...yet the payload is actually quite powerful due to the extensive amount of things we can do after a reverse connection is received, despite the payload being so small and despite the fact that there are only 4 files here, I would like to know how this is possible if anyone knows?
I've noticed that

Proguard
plays a role inminifying
the APK payload size according to the screenshot below of theProguard.cfg
file in This section of the metasploit-payloads repo, but that just obfuscates/minifies what's already there (i.e the Java files pictured above).I've done quite a lot of homework on this through searching code in the metasploit-payloads repo, but I couldn't find anything.
Any answers on this would be great, I'm trying to achieve similar results with a payload of my own (i.e minimal files, powerful/large results)
Beta Was this translation helpful? Give feedback.
All reactions