guri Posted September 1, 2019 Share Posted September 1, 2019 exploitiong android device nothing is happening after startied reverse tcp handler on 192.xxx.xx.x:4444 Quote Link to post Share on other sites
theUNK0WN Posted September 6, 2019 Share Posted September 6, 2019 Got to have an executed payload that's listening for connections on port '4444' in order to get a reverse shell on tcp. Quote Link to post Share on other sites
Francezu Posted September 30, 2019 Share Posted September 30, 2019 Try set up your router to forward port 4444. I hope you gonna make it! Quote Link to post Share on other sites
theUNK0WN Posted October 4, 2019 Share Posted October 4, 2019 (edited) On 9/30/2019 at 12:28 PM, Francezu said: Try set up your router to forward port 4444. There's no need to forward any ports if the target is on the same network as the attacker ..... Edited October 4, 2019 by theUNK0WN Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.