Hello Null Byte Community,
so i have recently discovered the amazing potential that the android version of meterpreter posesses. Major Vendors for AV dont detect the application which we created with msfvenom/msfvenom and on top of that dont even trigger once the file is executed and the session is opened on our attacker machine. As if that wasnt stunning enough, i am speaking of the raw payload, a.k.a. no encryption what so ever.
There is a major drawbacks to that however, i hope you have some solutions for that:
The migrate option is missing on android. So heres my issue with that, in case you didnt knew yet: The processes we usally exploit are not stable enough in order to keep meterpreter up, resulting in sudden closure of your session. Thats why migrating to other processes is usally a good idea if you dont want to install a backdoor or script that will reopen your session again immediately.
To sum my question up again: How can i ensure my android meterpreter session doesnt die due to an unstable process it is running on?
Also, since this is my first post here i would like to know if this is the appropriate type of question to ask here, i would appreciate it :)