rapid7 / meterpreter

THIS REPO IS OBSOLETE. USE https://github.com/rapid7/metasploit-payloads INSTEAD
Other
325 stars 144 forks source link

the payload don not work #194

Closed aw12sds closed 6 years ago

aw12sds commented 6 years ago

i use stagefright expolit,set option,but have no session

192.168.1.101 stagefright_mp4_tx3g_64bit - 192.168.1.101:7664 - Requested / - Unknown user-agent: "Mozilla/5.0 (Linux; Android 4.4.2; SCH-I679 Build/JLS36C) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36"

timwr commented 6 years ago

Your device is not supported. @jduck perhaps you can provide some information about how someone can support a new device?

aw12sds commented 6 years ago

no,i run a vm android--nox,and i download app stagefright detector,it show i have the vuls,

2017-08-31 13:22 GMT+08:00 Tim notifications@github.com:

Your device is not supported. @jduck https://github.com/jduck perhaps you can provide some information about how someone can support a new device?

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/meterpreter/issues/194#issuecomment-326192791, or mute the thread https://github.com/notifications/unsubscribe-auth/AZSDWKTwq89hXpkYFubpb7OwUDJh0i3Rks5sdkMPgaJpZM4PITVc .

aw12sds commented 6 years ago

i use payload linux/armle/meterpreter/reverse_tcp,when i exploit,it show [] Exploit running as background job 0. msf exploit(stagefright_mp4_tx3g_64bit) > [] Started reverse TCP handler on 192.168.1.101:4444 [] Using URL: http://192.168.1.101:8080/ [] Server started.

when brower logging in,it show [-] 192.168.1.101 stagefright_mp4_tx3g_64bit - 192.168.1.101:7664 - Requested / - Unknown user-agent: "Mozilla/5.0 (Linux; Android 4.4.2; SCH-I679 Build/JLS36C) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36"

but i have no session

2017-08-31 13:27 GMT+08:00 ggr gr aw12dwc1@gmail.com:

no,i run a vm android--nox,and i download app stagefright detector,it show i have the vuls,

2017-08-31 13:22 GMT+08:00 Tim notifications@github.com:

Your device is not supported. @jduck https://github.com/jduck perhaps you can provide some information about how someone can support a new device?

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/meterpreter/issues/194#issuecomment-326192791, or mute the thread https://github.com/notifications/unsubscribe-auth/AZSDWKTwq89hXpkYFubpb7OwUDJh0i3Rks5sdkMPgaJpZM4PITVc .

aw12sds commented 6 years ago

can u help me?

2017-08-31 13:29 GMT+08:00 ggr gr aw12dwc1@gmail.com:

i use payload linux/armle/meterpreter/reverse_tcp,when i exploit,it show [] Exploit running as background job 0. msf exploit(stagefright_mp4_tx3g_64bit) > [] Started reverse TCP handler on 192.168.1.101:4444 [] Using URL: http://192.168.1.101:8080/ [] Server started.

when brower logging in,it show [-] 192.168.1.101 stagefright_mp4_tx3g_64bit - 192.168.1.101:7664 - Requested / - Unknown user-agent: "Mozilla/5.0 (Linux; Android 4.4.2; SCH-I679 Build/JLS36C) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36"

but i have no session

2017-08-31 13:27 GMT+08:00 ggr gr aw12dwc1@gmail.com:

no,i run a vm android--nox,and i download app stagefright detector,it show i have the vuls,

2017-08-31 13:22 GMT+08:00 Tim notifications@github.com:

Your device is not supported. @jduck https://github.com/jduck perhaps you can provide some information about how someone can support a new device?

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/meterpreter/issues/194#issuecomment-326192791, or mute the thread https://github.com/notifications/unsubscribe-auth/AZSDWKTwq89hXpkYFubpb7OwUDJh0i3Rks5sdkMPgaJpZM4PITVc .

timwr commented 6 years ago

Your device is vulnerable, but not supported by the exploit. This list of supported devices is here: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb#L83 You would need to find the offsets for that device.

aw12sds commented 6 years ago

i see the device is Samsung,is other brand can not hacked?

2017-08-31 13:37 GMT+08:00 Tim notifications@github.com:

Your device is vulnerable, but not supported by the exploit. This list of supported devices is here: https://github.com/rapid7/metasploit-framework/blob/ master/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb#L83 You would need to find the offsets for that device.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/meterpreter/issues/194#issuecomment-326194800, or mute the thread https://github.com/notifications/unsubscribe-auth/AZSDWNMZzYMMlyHi24flYkvjjVhzB7yiks5sdkaygaJpZM4PITVc .

aw12sds commented 6 years ago

but the app stagefright detector can detect the vuls,it show me i have stagefright vuls

2017-08-31 13:44 GMT+08:00 ggr gr aw12dwc1@gmail.com:

i see the device is Samsung,is other brand can not hacked?

2017-08-31 13:37 GMT+08:00 Tim notifications@github.com:

Your device is vulnerable, but not supported by the exploit. This list of supported devices is here: https://github.com/rapid7/metasploit-framework/blob/master/ modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb#L83 You would need to find the offsets for that device.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/meterpreter/issues/194#issuecomment-326194800, or mute the thread https://github.com/notifications/unsubscribe-auth/AZSDWNMZzYMMlyHi24flYkvjjVhzB7yiks5sdkaygaJpZM4PITVc .

aw12sds commented 6 years ago

Closed?what meaning?

2017-08-31 14:00 GMT+08:00 Tim notifications@github.com:

Closed #194 https://github.com/rapid7/meterpreter/issues/194.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/meterpreter/issues/194#event-1228896076, or mute the thread https://github.com/notifications/unsubscribe-auth/AZSDWGJXu6-2ExnlpGTH5cJ3tw2z46Trks5sdkwAgaJpZM4PITVc .

timwr commented 6 years ago

"I see the device is Samsung, is other brand can not hacked?" No, one samsung device is already supported, just not yours. Your device is vulnerable but not supported, hope that makes sense. "Closed?what meaning?" This isn't the best place for help! Try the forums or IRC

aw12sds commented 6 years ago

what channel of irc?

2017-08-31 15:40 GMT+08:00 Tim notifications@github.com:

"I see the device is Samsung, is other brand can not hacked?" No, one samsung device is already supported, just not yours. Your device is vulnerable but not supported, hope that makes sense. "Closed?what meaning?" This isn't the best place for help! Try the forums or IRC

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/meterpreter/issues/194#issuecomment-326216316, or mute the thread https://github.com/notifications/unsubscribe-auth/AZSDWO3exmwRJ4Skb5m57I3j49fwDHagks5sdmNhgaJpZM4PITVc .