Jump to content

Recommended Posts

NOTE : THIS IS COMPLETELY FOR EDUCATIONAL PURPOSES AND I AM NOT TRYING TO HACK ANY DEVICE RIGHT NOW TO CREATE PROBLEM FOR SOMEONE .THE PHONE I AM TRYING TO EXPLOIT IS MY OWN SECOND DEVICE.

I'm working with metasploit on TERMUX.

So, My meterpreter session is open . I am able to access the SDCARD of the phone I am trying to exploit, but everytime I need to exploit the device, one needs to tap the app icon everytime for my meterpreter session to start. I want to create my payload persistent . So that, I don't have to wait for the user of the device to tap the icon again .

So , I successfully created a bash file through "nano" which is named "syslogs.sh" and is placed in my sdcard. It works completely fine ; It contacts the device for my meterpreter session to start after a delay of every 20 seconds.

So, I want to upload my syslogs.sh file from my SDCARD to sdcard of the device which I'm trying to exploit ; but it's just not happening!.

I am getting an error like this >>>>> [-] 4 : Operation failed: 1

You can refer this image here . you can see here that I've also tried adding backslashes but it didn't seem to work. The location of my file is absolutely fine

If someone wants to exactly know what I'm trying to implement they can check this . 

I've honestly tried searching for solutions , I've seen previous solutions and posted my question on subreddits, stackoverflow, github but I'm not getting anything . I am really positive that you can guys can help me.

I would highly appreciate ANY KIND OF SUGGESTION .

 I am absolutely new to this forum so if I've posted something wrong or I'm at a wrong place you can always let me know and I'll delete this post.

Hoping for your replies.

Link to post
Share on other sites

It looks like the metasploit team have labelled your issue as a bug so if I were you I'd hang on till they work out a fix for it.

Link to post
Share on other sites
4 minutes ago, digininja said:

Sorry, you labelled it as a bug, not them

Yeah that's me... LOL . I mean I didn't wanna label it as a bug.. It was my first time posting a question on github so I messed it up ..

Link to post
Share on other sites

HERE IS WHAT I TRIED

Is there a way to check for stack trace or log files? I tried to find them..but i was unsuccessful

typed "pwd" to know my current location and it was

/data/user/0/com.metasploit.stage/files

Then I went to this location by using "cd" and searched for files.. but I got nothing!

I am open to suggestions! tell me if i did something wrong

Link to post
Share on other sites

Looking at that, they don't have a second parameter on the upload command, just the file that they want to upload. Did you try that?

Link to post
Share on other sites
Posted (edited)

I guess I found the solution now the file wasn't getting uploaded because I was trying to exploit a device having an "android version 6" I tried it in a device with android version 9 and it worked. So maybe metasploit does not support some versions of android.

 

I appreciate all your efforts to help me solve this issue

 

BUT I STILL THINK THAT THIS THREAD SHOULD NOT BE CLOSED BECAUSE IT'S PRETTY ASTOUNDING A FILE TRANSFER USING UPLOAD COMMMAND IS NOT GETTING EXECUTED IN METASPLOIT . 

AND THE PHONE THAT I AM TRYING TO EXPLOIT IS IN ANDROID VERSION 6

Edited by Hacky13
Link to post
Share on other sites
  • 1 month later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...