• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      A J

      Home › Forums › A J

      • Profile
      • Topics Started
      • Replies Created
      • Engagements
      • Favorites

      Forum Replies Created

      Viewing 10 posts - 16 through 25 (of 25 total)
      ← 1 2
      • Author
        Posts
      • March 18, 2020 at 6:16 pm in reply to: Empire backdoor not working #31734
        A J
        Moderator

        Hi Basmeijer,

        It might be that the AV on Windows is interfering with the connection, so please disable it first, and try another payload like the reverse HTTP/TCP payload with another port to see if you can maintain the connection with the HTTP listener on Kali.

        March 16, 2020 at 5:07 pm in reply to: Ubuntu installation in VBox #31660
        A J
        Moderator

        Hi Basmeijer,

        Please try the following source for installing it or try an older version:

        https://ubuntu.com/download/alternative-downloads

        March 16, 2020 at 3:52 pm in reply to: Fakeauth and arpreplay #31657
        A J
        Moderator

        Hi Warren,

        To fix this just run the fake authentication WHILE airodump-ng is running against the target network as shown in the course, so run airodump-ng using the –channel and –bssid arguments against the target network, keep it running, and run the fake authentication from another terminal window.

        For the ARP replay injection, try to re-enable monitor mode again:

        ifconfig wlan0 down
        airmon-ng check kill
        iwconfig wlan0 mode monitor
        ifconfig wlan0 up

        Make sure that you’re on the right frequency band since the AWUS036ACH supports two bands:

        airodump-ng wlan0
        airodump-ng –band abg wlan0 (For 2.4 & 5Ghz networks)
        airodump-ng –band a wlan0 (Only for 5Ghz networks)

        In addition, try the following when you connect the adapter before you enable monitor mode:
        – Experiment with connecting the adapter before and after Kali fully loads, and after you log in as root.
        – Experiment with setting the adapter to use USB 2.0 and 3.0 in Kali system settings in Vbox.
        – Make sure you connect the adapter directly to the computer, don’t use a hub or an extension.
        – And experiment with connecting the adapter to different USB ports.

        Last but not least, try to enable monitor using another method:

        March 16, 2020 at 3:49 pm in reply to: Backdoors problem.(fatrat) #31656
        A J
        Moderator

        Hi Deepak,

        It’s okay if you don’t see the “starting the payload handler” for this how the multi handler starts and shows up in Metasploit Framework 5 (msf5) which was different at the time of recording the lecture.

        March 12, 2020 at 2:40 pm in reply to: key logger for android #31512
        A J
        Moderator

        Hi Sithum,

        You can check Github topics and the below two sources to see if you can find something:

        https://github.com/IceWreck/LokiBoard-Android-Keylogger
        https://github.com/thelinuxchoice/keydroid

        March 12, 2020 at 2:32 pm in reply to: OSX / IOS Keylogger #31511
        A J
        Moderator

        Yes, this is true, it’s really hard to hack iOS, but see, this is not always the case if the application installed on the iOS device is vulnerable to an attack (same case with what happened on WhatsApp). Here’s a brief explanation about the vulnerability to get a better idea of what I mean, but It has been patched since then and every day there are new vulnerabilities that get patched so quickly. Check this example.

        Also, please note that if the iOS device is jailbroken, then the ssh service will be installed automatically which might make the device vulnerable to attack if the user didn’t change the default password which is ‘alpine’ by default, thus making it easier to gain access through a default configuration. Another thing to mention is that you need to understand how iOS works internally in order to exploit it. You can refer to the following source for more info:

        iOS Security Internals

        You can also search on the Internet for recent vulnerability to see what you can find including https://exploit-db.com and other sources as well…

        March 12, 2020 at 2:18 pm in reply to: Kali 2020 missng ssl strip #31510
        A J
        Moderator

        Hi Dege,

        Yes, this is true, you’re not the only one that you get these errors when you try the downgrade, but it will work if you followed everything correctly as shown in the lecture, so if it’s downgrading winzip.com from HTTPS to HTTP, then you can ignore the error message that you get and proceed normally with the course.

        February 28, 2020 at 12:18 pm in reply to: questions unanswered! #31007
        A J
        Moderator

        Hi Rjyoung,

        Please check my answer in the other query. I’ve already replied to you.
        Let me know if you face any issues again.

        February 27, 2020 at 3:30 pm in reply to: monero install #30923
        A J
        Moderator

        Hi Rjyoung2000,

        You can either post the query on Udemy or on the forum here; In case you’re not getting the same results, then you have 2 options:

        1. Use the latest version of the wallet (the one you have), and start it using monero-wallet-gui, so navigate to the directory where it’s downloaded exactly as shown in the lecture and then do
        ./monero-wallet-gui

        2. Use an older version of the wallet that comes with the .sh file, you can download an older version from here
        https://downloads.getmonero.org/gui/monero-gui-linux-x64-v0.14.1.0.tar.bz2

        February 27, 2020 at 3:23 pm in reply to: xmpp lectures #30922
        A J
        Moderator

        Hi Rjyoung2000,

        There are two links that are provided in the resources of lecture 38, section 6. The PDF document along with the servers list. I just tried the link for the server list and it’s opening fine without any issue. Please try it again, and let me know how it goes. Here’s the link anyway:

        https://gist.github.com/dllud/a46d4a555e31dfeff6ad41dcf20729ac

      • Author
        Posts
      Viewing 10 posts - 16 through 25 (of 25 total)
      ← 1 2

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2021 zSecurity Ltd. All rights reserved.

      • Privacy
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Learn more Hacking!

      While waiting for the download, why not follow us on media? We regularly post hacking tutorials and articles


      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance