Hey guys, so during an nmap scan i came across something really strange that i hadn’t seen before and i haven’t been able to find much info on it - from obvious info looks like an android/meterpreter payload, but i cant even begin to wonder what its doing there
Was wondering if anyone could maybe explain please?
3031/tcp open eppc?
| fingerprint-strings:
| NULL:
| androidpayload.stage.Meterpreter
| META-INF/MANIFEST.MF
| LK-.
| :UZ)
| classes.dex
| nvg’M
| \xe9
| \xbf
| \x02o
| \x01W
| \x06W
| !\x82k
| x=ca
| )\xb1
| E\x19