Forum Replies Created
- AuthorPosts
- A JModerator
Hi Sithum,
You can check Offensive Security list for your device compatibility with your Net Hunter:
https://www.offensive-security.com/kali-linux-nethunter-download/
Or
https://gitlab.com/kalilinux/nethunter/Please note that not only the above devices are compatible with Net Hunter, though you can try it and see. In addition, Zaid is going to unpublish the course because it is out of date, he already requested that from Udemy so they will unpublish it in the next few days. I’m sorry about that, he might completely remake the course with the newest version of Net Hunter this year, he will keep you posted through the notifications.
A JModeratorHi Nosol,
As mentioned in the Qubes lecture, not all computers support it, in fact it is not supported on a large number of computers because it has a number of requirements, here’s a list of all the requirements, compatible hardware….etc
So if the other laptops don’t satisfy these requirements its highly unlikely that it would run.
A JModeratorPlease try the following fix on Ubuntu, then generate a new keylogger for Linux, and run it as you did before:
Hope this helps.
A JModeratorHi Talwinder,
Please try to use the same hashcat command on Windows while using the pipe symbol to pipe the output of crunch to the standard input of Hashcat without wasting storage space on the hard drive. For example:
crunch 7 11 --stdout | hashcat [your options] -o -
A JModeratorHi Basmeijer,
The main thing is to make sure that Veil or any other tool you’re using to generate the backdoor is up to date. Here are a few solutions to try if your backdoor is getting detected:
1. Make sure that you have the latest version of Veil, so do updated before doing use 1.
2. Experiment with different payloads, and experiment with different payload options and you should be able to bypass it.
3. Modify backdoor code if its in bat (covered in the Social Engineering course)
4. Modify backdoor using a hex editor (covered in the Social Engineering course).
5. Create your own backdoor (covered in Python course).
The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them.
Please keep in mind also that this is the nature of all malware, it will eventually get detected, especially that there are 250,000+ students who are trying the same thing, so even when Zaid shows a new method of bypassing AV programs, this method soon becomes detectable, there’s no way he can give you code that would pass AV programs and it would remain that way after a few days, therefore the best thing to do is to learn how to use these tools first, then tackle bypassing AV programs as a completely separate issue, Zaid does cover how to do that by manually editing HEX (in the Social Engineering course) but again if you modify the exact same parts that he modifies, then you won’t make much progress, you need to learn the methodology and try it yourself until you get it working.
A JModeratorHi Basmeijer,
You can try different versions from the same Github repo of laZagne:
LaZagne Releases
Here’s LaZagne 2.4
Just click on Assets once you go to the page, and download the executable file called ‘laZagne.exe’A JModeratorPlease make sure that you disable Real-time protection in Windows Defender first before testing for bypassing AVs can be covered in a whole course, though Zaid covers more basic techniques to try and make the signature looks more unique in other courses. For the above error, it seems that Windows has missing libraries in order to run it properly, can you show me a screenshot of the error to better debug the issue please?
Don’t forget to enable 3rd party apps to access your Gmail account in your Gmail account settings, and make sure that you’re using the correct username and password before you generate the keylogger.
A JModeratorThe 1st thing to do is to try and enable port forwarding in your router assuming that this is possible. You have to to check first if the port(s) is open again using https://canyouseeme.org while keeping the below notes if it didn’t work:
1. You did not configure the router properly to allow for port forwarding, so please make sure that you do some research of your router model, cause every router model has a slightly different method to enable port forwarding.
2. The port is not actually open in Kali, so make sure that the service is actually running in Kali on the required port.
3. Your ISP (Internet Service Provider) does not allow you to forward ports, so please call them to check/
As for the above method using intermediate servers, as mentioned above, it won’t be covered in any course, but you can set up your own server for the procedure, and search online if you can find anything related to this subject, but I can’t guarantee one way of doing this, so it’s best if you do further research on this… I hope this clarifies better.
A JModeratorHi Lucid,
Kindly follow these steps shown in the below source to set up properly your wireless adapter on Tails:
Enable a wireless deviceYou can also refer to the following once for more info:
Connecting to a networkIf you still have issues with the wireless connection, then plug the adapter it into a different USB port on your PC, and try again to connect to the captive portal through the unsafe browser as shown in the lecture. Or use the Ethernet cable to connect Tails directly to the network.
Kindly note that USB devices can only be connected to only one machine at a time, so make sure that the wireless adapter isn’t attached to Windows first before you try to connect it to Tails.
A JModeratorYou’re welcome 🙂
A JModeratorHi Basmeijer,
I tried to clone the repo after 1/1/2020, and it’s working fine. Kindly follow the exact steps shown in the following post:
zLogger for Windows & LinuxAnd even if you get a depreciation message, you can ignore and install zLogger as shown above in order to generate the keylogger for either Windows or Linux with the persistent feature enabled in case the user reboot their PC.
A JModeratorHi Sithum,
This is not mandatory for they are many online tunneling services that let you enable port forwarding with even accessing the router (even if you’re connected to a wired network), though these services might be down due to black hat hacking and phishing. You can check out the following examples:
Alternatively, you can send reverse connections to an intermediate computer (a server on the internet), this way you won’t need to configure anything, and use a VPN or TOR to directly connect to this middle server and control the target, this way you won’t need to enable port forwarding anywhere so something like this:
Target —–(reverse connection) —–> Middle server <——-(Direct connection over VPN/TOR) ——- Your computerKindly note that the above method won’t be covered in ANY course, due to the above-mentioned reasons and for better security measures.
A JModeratorHi Sithum,
The main thing is to make sure that Veil or any other framework that you’re using to generate the backdoor is up to date. Here are some few solutions to try if your backdoor is getting detected:
1. Make sure that you have the latest version of Veil, so do <i>updated</i> before doing use 1.
2. Experiment with different payloads, and experiment with different payload options and you should be able to bypass it.
3. Try generating a backdoor using the TheFatRat, Empire, or Phantom Evasion
https://zsecurity.org/phantom-evasion-bypassing-anti-virus-and-hacking-windows-linuxmac-os-x-and-android/4. Modify backdoor code if its in bat (covered in the Social Engineering course)
5. Modify backdoor using a hex editor (covered in the Social Engineering course)
6. Create your own backdoor (covered in Python course) which is one of the best ways to make the backdoor signature looks more unique and increase the chances of bypassing more AVs
You can check the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them.
A JModeratorYou’re welcome Artuk!
A JModeratorYou’re welcome Sithum 🙂
- AuthorPosts