
Then we need to setup me meterpreter session through msfconsole. Once you have the payload created with original APK file you can move to mobile phones through File transfer or any other ways. It uses obfuscation methods to include payloads also it appends a digital signature. Once it has done all we need to select the Meterpreter to use, here we have selected reverse_tcp.Īnd then you need to select the tool to be used in APK creation.ĪPK build in process, it decompiles the original APK to insert payloads and then recompile the application. In the mean, we should have download any popular Android application file APK and then need to enter the path of the file.

In this Kali Linux Tutorial, we go on backdooring with original APK file like, so we need to select option 5 here. Once installation completed you will be provided with the list of options to create a payload. Installation would take 10 to 15 minutes, during the process it checks for missing components if anything missing it will automatically download and install it.Īlso Read Bypass an Anti Virus Detection with Encrypted Payloads using VENOM Tool Then we need to provide execute permission and run setup.sh Once this command executed it would clone and stored under TheFatRat. You can download this Android RAT tool TheFatRaT from Github Gaining access to Targeted Android Phone – Android RAT (TheFatRat )


TheFatRat is a simple Android RAT tool to build a backdoor and post exploitation attacks like browser attack.
