guri Posted September 1, 2019 Share Posted September 1, 2019 exploitiong android device nothing is happening after startied reverse tcp handler on 192.xxx.xx.x:4444 Link to comment Share on other sites More sharing options...
theUNK0WN Posted September 6, 2019 Share Posted September 6, 2019 Got to have an executed payload that's listening for connections on port '4444' in order to get a reverse shell on tcp. Link to comment Share on other sites More sharing options...
Francezu Posted September 30, 2019 Share Posted September 30, 2019 Try set up your router to forward port 4444. I hope you gonna make it! Link to comment Share on other sites More sharing options...
theUNK0WN Posted October 4, 2019 Share Posted October 4, 2019 On 9/30/2019 at 12:28 PM, Francezu said: Try set up your router to forward port 4444. There's no need to forward any ports if the target is on the same network as the attacker ..... Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.