rapid7 / metasploit-payloads

Unified repository for different Metasploit Framework payloads
Other
1.75k stars 673 forks source link

Meterpreter does not detect a reverse connection from the payload even after executing the payload on the target android #691

Closed R5x1x1 closed 5 months ago

R5x1x1 commented 11 months ago

When i use the meterpreter and when i just reach to the active the payload apk file and starting it on my phone and give it Permissions the meterpreter doesn't reverse any information and the multi/handler still waiting the device for connecting Knowing that I but the port 4444 and 8888 and 8080 and use my Linux on virtual box

tactipus commented 11 months ago

Hi! Would you provide more info on how to reproduce the problem on my mind? TYIA!

Morsmalleo commented 10 months ago

When i use the meterpreter and when i just reach to the active the payload apk file and starting it on my phone and give it Permissions the meterpreter doesn't reverse any information and the multi/handler still waiting the device for connecting Knowing that I but the port 4444 and 8888 and 8080 and use my Linux on virtual box

Make sure your network settings for your Linux Virtual Machine in VirtualBox is set to Bridged Adapter otherwise meterpreter connection won't work from VM's.