Jump to content

Search the Community

Showing results for tags 'meterpreter linux android shell reverse_tcp'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 2 results

  1. NOTE : THIS IS COMPLETELY FOR EDUCATIONAL PURPOSES AND I AM NOT TRYING TO HACK ANY DEVICE RIGHT NOW TO CREATE PROBLEM FOR SOMEONE .THE PHONE I AM TRYING TO EXPLOIT IS MY OWN SECOND DEVICE. I'm working with metasploit on TERMUX. So, My meterpreter session is open . I am able to access the SDCARD of the phone I am trying to exploit, but everytime I need to exploit the device, one needs to tap the app icon everytime for my meterpreter session to start. I want to create my payload persistent . So that, I don't have to wait for the user of the device to tap the icon again . So , I successfully created a bash file through "nano" which is named "syslogs.sh" and is placed in my sdcard. It works completely fine ; It contacts the device for my meterpreter session to start after a delay of every 20 seconds. So, I want to upload my syslogs.sh file from my SDCARD to sdcard of the device which I'm trying to exploit ; but it's just not happening!. I am getting an error like this >>>>> [-] 4 : Operation failed: 1 You can refer this image here . you can see here that I've also tried adding backslashes but it didn't seem to work. The location of my file is absolutely fine . If someone wants to exactly know what I'm trying to implement they can check this . I've honestly tried searching for solutions , I've seen previous solutions and posted my question on subreddits, stackoverflow, github but I'm not getting anything . I am really positive that you can guys can help me. I would highly appreciate ANY KIND OF SUGGESTION . I am absolutely new to this forum so if I've posted something wrong or I'm at a wrong place you can always let me know and I'll delete this post. Hoping for your replies.
  2. hey guys ive been exploiting my OWN !!! tablet and phone recently my phone is running marshmellow 6.0.1 the tablet uhmm ...kit kat ? something lol 4.4 i think lol ok ive created a payload with msfvenom and made the .apk payload and u have to accept the permisions and install and open the payload to run the binary right ?? ok what i want to know is just like in windows u can create shellcode and drop it into the cmd or drop it into a jpg file and it just runs your binary no questions asked lol is there any way to run somekind of shellcode "like" payload on android so i can send the payload via sms or email ect ... so when the user clicks on it it just runs the binary ? so basically what i would like is to embed a payload for android into a jpg /jpeg/png it has to be a picture i know about the pdf deal i want to do this with a picture ...if ive been unclear in any way feel free to ask i will try my best to explain better of what i want thanks in advance i cant wait to hear all your feed back good or bad i accept it all ty ....and special thanks to the whole hak5 community for just being here u all are great who else would i be able to ask questions like this to lmao
×
×
  • Create New...