Android/Metasploit - Keep a session alive

Feb 20, 2018 07:28 PM

I've successfully generated a standard android/meterpreter/reverse-tcp payload and manually injected it into an apk. It works, but the session dies often and then it only start anew once the infected app is launched again.

Is there a way to keep a session alive and automatically start a new one should the previous die?

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!