Author Topic: msfvenom Android payload  (Read 1601 times)

0 Members and 1 Guest are viewing this topic.

Offline creme

  • NULL
  • Posts: 1
  • Cookies: -1
    • View Profile
msfvenom Android payload
« on: October 19, 2015, 07:41:45 pm »
Hello guys.

I just got into the world of hacking and I have some questions for you about the smfvenom and the payload we use.
First of all in some cases the webcam_snap command gives me a fail.

Code: [Select]
meterpreter > webcam_snap
[*] Starting...
[*] Stopped
[-] webcam_start: Operation failed: 1

This could be because of other apps using the camera? I tried with ps to see all the listed processes but they are so many and most of them I don't know exactly what they do.

Another issue i face is that when I (the victim) restart my phone the payload is like deleted.

Code: [Select]
meterpreter >
[*] 192.XXX.X.X - Meterpreter session 1 closed.  Reason: Died

 And even if I try to launch the application again there is no session on meterpreter.  When a session dies means simply it's impossible to connect back again?

Thank you in advance.


Offline hcac

  • Serf
  • *
  • Posts: 25
  • Cookies: 4
    • View Profile
Re: msfvenom Android payload
« Reply #1 on: October 23, 2015, 09:33:07 am »
AFAIK, meterpreter is not going to install it self forever, by default.
There is a post exploit module, I think, called persistence or something, which makes it auto start on startup. However never tested it on Android. (there is autostart things on droid without root permission, too, so it could be possible)

Sent from my GT-I9500 using Tapatalk