I'm trying to get into the world of android-cybersecurity. I've programmed my first payload with msf venom and put it into an apk of an app I've developed. After exploiting in metasploit I can say that It'works, but It's far from being at least useful. When I closed my application the meterpreter session dies (and I can understand the causes) but I'm here to ask if anyone can explain how can I avoid this disconnection when I exit the app. Unfortunately I don't have any ideas and like I said I'm new to cybersecurity (But not to android programming) so when you'll try to explain try also to be as clear as possible. Thanks for any help you can give me :)
Forum Thread: How to avoid session dieing when exiting infected app
- Hot
- Active
-
Forum Thread: Hack Instagram Account Using BruteForce 203 Replies
4 min ago -
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 161 Replies
2 hrs ago -
Forum Thread: How to Edit Some Specific Part of an Apk File 1 Replies
2 hrs ago -
Forum Thread: I Need Help in Hacking a Gmail Account. 26 Replies
4 hrs ago -
Forum Thread: Kali linux command error. Kindly help 1 Replies
22 hrs ago -
Forum Thread: When to Use Reverse Shell and Bind Shell? 5 Replies
2 days ago -
Forum Thread: Fluxion Not Working 6 Replies
2 days ago -
Forum Thread: Hacking Stream (LIVE) 10 Replies
3 days ago -
Forum Thread: Blind SQL Injection 6 Replies
3 days ago -
Forum Thread: Can C Programming Help Me for Hacking or Pen Testing. 10 Replies
1 wk ago -
Forum Thread: I Want to Hack in to My Friends System Through his wifi router i am controlling 7 Replies
1 wk ago -
Forum Thread: How to Use the Exploits Found in Vega Scan 3 Replies
1 wk ago -
Forum Thread: Can I Send a File to a Computer Using Ip Address 5 Replies
2 wks ago -
Forum Thread: How to Use NGROK in a Reverse_Tcp Attack? 20 Replies
2 wks ago -
Forum Thread: Problem with Hacking Webserver with Armitage 11 Replies
2 wks ago -
Forum Thread: Metasploit - Embedding an Android Payload into a PDF? 7 Replies
2 wks ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 35 Replies
2 wks ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 43 Replies
2 wks ago -
Forum Thread: Metasploit Use Domain Name as RHOST 4 Replies
2 wks ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 4 Replies
2 wks ago
-
How To: Automate Remote SSH Control of Computers with Expect Scripts
-
How To: Hack Android Using Kali (Remotely)
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Dox Anyone
-
How To: Create a Persistent Back Door in Android Using Kali Linux:
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
Hack Like a Pro: How to Crack Passwords, Part 4 (Creating a Custom Wordlist with Crunch)
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
How To: Crack Password-Protected ZIP Files, PDFs & More with Zydra
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Manually Exploit EternalBlue on Windows Server Using MS17-010 Python Exploit
Be the First to Respond
Share Your Thoughts