guri Posted September 1, 2019 Share Posted September 1, 2019 exploitiong android device nothing is happening after startied reverse tcp handler on 192.xxx.xx.x:4444 Quote Link to comment Share on other sites More sharing options...
theUNK0WN Posted September 6, 2019 Share Posted September 6, 2019 Got to have an executed payload that's listening for connections on port '4444' in order to get a reverse shell on tcp. Quote Link to comment Share on other sites More sharing options...
Francezu Posted September 30, 2019 Share Posted September 30, 2019 Try set up your router to forward port 4444. I hope you gonna make it! Quote Link to comment Share on other sites More sharing options...
theUNK0WN Posted October 4, 2019 Share Posted October 4, 2019 (edited) On 9/30/2019 at 12:28 PM, Francezu said: Try set up your router to forward port 4444. There's no need to forward any ports if the target is on the same network as the attacker ..... Edited October 4, 2019 by theUNK0WN Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.