The issue regarding searched threads returning 404s has been fixed. My apologies. - NekoElf
The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
is there a working payload for android 4.x devices in msf??
filter_list
|
|
Ten Years of Service
Posts: 180
Threads: 29
is there a working payload for android 4.x devices in msf?? 10-23-2017, 03:27 PM
#1
Trying to get a reverse connection using msf venom on android 4.x.
The apk i have generated crashes after sending initial connection to the listener.
any ideas?
•
Twelve Years of Service
Posts: 2,376
Threads: 227
RE: is there a working payload for android 4.x devices in msf?? 10-23-2017, 04:49 PM
#2
(10-23-2017, 03:27 PM)Num5kull Wrote: Trying to get a reverse connection using msf venom on android 4.x.
The apk i have generated crashes after sending initial connection to the listener.
any ideas?
If you have adb, you can try attaching a usb debug session to get a stack trace. You might also find that in the syslog.
If you can provide a stack trace and the source code I can help you figure out what's going on.
Usuallly with network application crashes, they're in socket code that doesn't have proper error handling. My guess is you're writing data to a socket that's not open (tcp), or you don't have permission to send data (udp)
Ten Years of Service
Posts: 180
Threads: 29
RE: is there a working payload for android 4.x devices in msf?? 10-24-2017, 02:56 PM
#3
Ill check it out soon and give a log cat dump. All the android exploits are for android 5+ so the payload os prob for android 5+ aswell, l8rz
•
Ten Years of Service
Posts: 180
Threads: 29
RE: is there a working payload for android 4.x devices in msf?? 12-09-2017, 10:12 PM
#4
Just got back to this, setup a logcat dump on the device and a machine to connect back to....
it turned out i forgot to set the payload on the listener; so was getting android app error out.
After adding set payload android/meterpreter/reverse_tcp to my method the reverse connection worked perfectly.
Hope this helps
![Biggrin Biggrin](https://sinister.ly/images/smilies/set/biggrin.png)
N
•
Users browsing this thread: 1 Guest(s)