

In this case, we will search for the Android meterpreter payload.Ĭommand: msf> set payload Android/meterpreter/reverse_tcpĪlong with ‘use’ and ‘search’ commands, ‘set’ is another command used in Metasploit to set a particular payload for an exploit. You can use the ‘search’ command within msfconsole to search for a keyword. In this case, we wish to use the multi/handler exploit, which facilitates listening to an incoming wildcard connection. In Metasploit, use command uses a particular model of the framework. Once you verify and note down the IP address, we shall open the MSF console to create a listener for our exploit. We will be using this IP address in our exploit. Open the terminal in the Kali Linux, and note down the IP address of the system.

Verify the IP address of the Kali machine.

Login to the Kali Linux virtual machine using the default credentials given above. Open Kali Linux OS on Oracle VM VirtualBox. Creating an APK and initiating a multi/handler exploit Step 1:
