rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.11k stars 13.96k forks source link

No session opened , Keeps constant on ( Started reverse TCP handler on 192.168.x.xx:4444) #14434

Closed jayakumar23 closed 3 years ago

jayakumar23 commented 3 years ago

Important Notes 1- The goal is to penetration test on the victim's Android phone via payload

2- Victim's phone = Is my phone (I'm testing myself)

3- I use port 4444

Create a payload using TheFatRat

PicsArt_11-26-05 48 29

When i install a payload i created using fatrat nothing was happen im struggling for past 2 day anyone one plzz help me

h00die commented 3 years ago

did you open the payload after installing it? also, w/o knowing how the payload was generated (options, etc) it's hard to help.

jayakumar23 commented 3 years ago

did you open the payload after installing it? also, w/o knowing how the payload was generated (options, etc) it's hard to help.

Yes im open the payload but nothing happen in there

h00die commented 3 years ago

w/o knowing how the payload was generated (options, etc) it's hard to help.

jayakumar23 commented 3 years ago

IMG_20201127_120438 PicsArt_11-27-12 00 46

Payload created using Fatra

Screenshot 2020-11-27 00:38:59

Backdooring orginal apk

PicsArt_11-27-12 01 35 PicsArt_11-27-12 02 19 Screenshot 2020-11-27 00:49:22

When i run the msfconsole

PicsArt_11-27-12 03 24

w/o knowing how the payload was generated (options, etc) it's hard to help.

jayakumar23 commented 3 years ago

w/o knowing how the payload was generated (options, etc) it's hard to help.

Screenshot_2020-11-27-11-35-52-39

Apk install in my Mobile and open it but nothing happen

bcoles commented 3 years ago

It looks like you're running Metasploit inside a NATed virtual machine with an IP address in the 192.168.x.x range.

The NAT environment is shared between the host operating system and the virtual machines. You phone will not be on this network unless it is connected via a wireless connection to an access point inside the NATed environment.

You will need to change the virtual machine network adapter from NAT to Bridged. You will then need to regenerate the payload with the correct IP address for the bridged interface.

jayakumar23 commented 3 years ago

It looks like you're running Metasploit inside a NATed virtual machine with an IP address in the 192.168.x.x range.

The NAT environment is shared between the host operating system and the virtual machines. You phone will not be on this network unless it is connected via a wireless connection to an access point inside the NATed environment.

You will need to change the virtual machine network adapter from NAT to Bridged. You will then need to regenerate the payload with the correct IP address for the bridged interface.

I'm can't understand what should i need to do plz help me iam struggling for past 5 days

bcoles commented 3 years ago

image

jayakumar23 commented 3 years ago

It looks like you're running Metasploit inside a NATed virtual machine with an IP address in the 192.168.x.x range.

The NAT environment is shared between the host operating system and the virtual machines. You phone will not be on this network unless it is connected via a wireless connection to an access point inside the NATed environment.

You will need to change the virtual machine network adapter from NAT to Bridged. You will then need to regenerate the payload with the correct IP address for the bridged interface.

IMG_20201127_175607

By using bridged i have created a new payload using a correct ip

IMG_20201127_175537

When i run the msfconsole still nothing happen ..

I have installed a new payload into my mobile and opened but no session are open plz help me sir

bcoles commented 3 years ago

Make sure the android device can access 192.168.1.2. You could test connecting to 192.168.1.2:4444 with a web browser on the device.

By using bridged i have created a new payload using a correct ip

Make sure you're using the correct IP address and port. Your previous screenshots show you were using port 8080 for the payload, but now you're using 4444 for the listener.

This issue is most likely with your setup.

The Metasploit issue tracker is for tracking issues with Metasploit.

Perhaps someone on IRC or Slack can help you out with your question:

jayakumar23 commented 3 years ago

Make sure the android device can access 192.168.1.2. You could test connecting to 192.168.1.2:4444 with a web browser on the device.

By using bridged i have created a new payload using a correct ip

Make sure you're using the correct IP address and port. Your previous screenshots show you were using port 8080 for the payload, but now you're using 4444 for the listener.

This issue is most likely with your setup.

The Metasploit issue tracker is for tracking issues with Metasploit.

Perhaps someone on IRC or Slack can help you out with your question:

Sorry for disturbing you but what Port i need to use and how to find my port

bcoles commented 3 years ago

what Port i need to use and how to find my port

The lport you set when creating the payload must be the same as the lport you use for multi/handler.

jayakumar23 commented 3 years ago

what Port i need to use and how to find my port

The lport you set when creating the payload must be the same as the lport you use

what Port i need to use and how to find my port

The lport you set when creating the payload must be the same as the lport you use for multi/handler.

I have used a same lport but iam not connect to the device

timwr commented 3 years ago

@jayakumar23 this appears to be a networking problem rather than a bug in metasploit. I would suggest you first practice by hosting a simple website (you can use python -m SimpleHTTPServer to host a website from the command line) and ensure you can access it on your Android device. You can also try with ping. Some routers/wifi networks don't allow hosts to access each other and are isolated. If you need more help you can ping me on slack and I'll try walk you through it.

Yadhu009 commented 2 years ago

The thing is my android phone is not connecting to my payload ipadress when i search ip in webbrowser how can i solve that

bcoles commented 2 years ago

The thing is my android phone is not connecting to my payload ipadress when i search ip in webbrowser how can i solve that

Ensure you're using the correct IP address. Ensure the Android device can route network traffic to the web server hosting the payload. Ensure the web server is running on an accessible network interface and is not blocked by firewall rules.

Tushar1144 commented 2 years ago

Important Notes 1- The goal is to penetration test on the victim's Android phone via payload

2- Victim's phone = Is my phone (I'm testing myself)

3- I use port 4444

Create a payload using TheFatRat

PicsArt_11-26-05 48 29

When i install a payload i created using fatrat nothing was happen im struggling for past 2 day anyone one plzz help me

That same problem produced on my Kali machine Can you help me

bcoles commented 2 years ago

That same problem produced on my Kali machine Can you help me

This issue was closed two years ago. There is insufficient information to reproduce the issue which was extremely vague and lacked technical details.

The original issue appeared to be user error. Multiple solutions were proposed in this thread.

Tushar1144 commented 2 years ago

After I googled it I found that metasploit requires at least 4gb of ram. Later when I made virtual box ram 4 GB then metasploit started working fine.

GeovannyManga commented 11 months ago

Hola, justo me paso lo mismo del muchacho de las primeras preguntas de este sitio, pero en mi caso tengo wsl kali linux, como puedo hacer que se conecte a red normal en lugar de NAT?

w2tchm3n commented 1 month ago

the same happen to me, i don't know how to fix that i have tried everything !

VIKRAMXXHH commented 1 month ago

pls help i also face this problem

GeovannyManga commented 1 month ago

Al pareceer el problema se debe a que lo tenemos en maquinas virtuales y asi no permite ponerlo como red normal, solo se puede hacer mediante la instalacion del sistema operativo nativo y no maquina virutal, esa es la informacion que tengo, quiza si sea posible pero de momento no veo la forma