- This topic has 4 replies, 5 voices, and was last updated 4 years, 6 months ago by A J.
- AuthorPosts
- February 3, 2020 at 11:35 pm #30030mahmudshahmuradovParticipant
Zaid,love you and your courses, but in fatrat there are plenty of options but you show only windows based and basic stuff. Whatever I generated a payload backdoor with original apk (5th option) I did with tcp then http tried all.. All options nothing worked. Meterpreter couldnt get sessions. But just an empty apk was caught by meterpreter but I couldnt do anything like no webcam stream no contact dump nothing(error connection time). Everytime I ran command phone tirggered permission request.(s8 android) In teaser you mask backdoor with flappy bird but you dont show it to us( you just show meterpreter commands ( please help I was so motivated now I am confused…..
February 4, 2020 at 12:43 pm #30060Sithum Nimlaka AbeydheeraParticipantZaid,
I found email sending software.you can check and publish for your students.I check it.It’s work properly.This is a link for download it
—————————————————February 5, 2020 at 5:58 pm #30110Zaid SabihModeratorHello Mahmudshah,
Did you try migrating to a safer process as shown in the post-exploitation section?
If yes then please try using a different payload type and let me know what you get.March 12, 2020 at 7:48 pm #31526[email protected]ParticipantHi Zaid,
I have executed a backdoor using Veil evasion in my Windows machine similar to what has been demonstrated in the lecture, but while listening to the port , “starting the payload handler” is not showing.
March 16, 2020 at 3:49 pm #31656A JModeratorHi Deepak,
It’s okay if you don’t see the “starting the payload handler” for this how the multi handler starts and shows up in Metasploit Framework 5 (msf5) which was different at the time of recording the lecture.
- AuthorPosts
- You must be logged in to reply to this topic.