Forum Replies Created
It might be that the AV on Windows is interfering with the connection, so please disable it first, and try another payload like the reverse HTTP/TCP payload with another port to see if you can maintain the connection with the HTTP listener on Kali.
Please try the following source for installing it or try an older version:
To fix this just run the fake authentication WHILE airodump-ng is running against the target network as shown in the course, so run airodump-ng using the –channel and –bssid arguments against the target network, keep it running, and run the fake authentication from another terminal window.
For the ARP replay injection, try to re-enable monitor mode again:
ifconfig wlan0 down
airmon-ng check kill
iwconfig wlan0 mode monitor
ifconfig wlan0 up
Make sure that you’re on the right frequency band since the AWUS036ACH supports two bands:
airodump-ng –band abg wlan0 (For 2.4 & 5Ghz networks)
airodump-ng –band a wlan0 (Only for 5Ghz networks)
In addition, try the following when you connect the adapter before you enable monitor mode:
– Experiment with connecting the adapter before and after Kali fully loads, and after you log in as root.
– Experiment with setting the adapter to use USB 2.0 and 3.0 in Kali system settings in Vbox.
– Make sure you connect the adapter directly to the computer, don’t use a hub or an extension.
– And experiment with connecting the adapter to different USB ports.
Last but not least, try to enable monitor using another method:
It’s okay if you don’t see the “starting the payload handler” for this how the multi handler starts and shows up in Metasploit Framework 5 (msf5) which was different at the time of recording the lecture.
You can check Github topics and the below two sources to see if you can find something:
Yes, this is true, it’s really hard to hack iOS, but see, this is not always the case if the application installed on the iOS device is vulnerable to an attack (same case with what happened on WhatsApp). Here’s a brief explanation about the vulnerability to get a better idea of what I mean, but It has been patched since then and every day there are new vulnerabilities that get patched so quickly. Check this example.
Also, please note that if the iOS device is jailbroken, then the ssh service will be installed automatically which might make the device vulnerable to attack if the user didn’t change the default password which is ‘alpine’ by default, thus making it easier to gain access through a default configuration. Another thing to mention is that you need to understand how iOS works internally in order to exploit it. You can refer to the following source for more info:
You can also search on the Internet for recent vulnerability to see what you can find including https://exploit-db.com and other sources as well…
Yes, this is true, you’re not the only one that you get these errors when you try the downgrade, but it will work if you followed everything correctly as shown in the lecture, so if it’s downgrading winzip.com from HTTPS to HTTP, then you can ignore the error message that you get and proceed normally with the course.
Please check my answer in the other query. I’ve already replied to you.
Let me know if you face any issues again.
You can either post the query on Udemy or on the forum here; In case you’re not getting the same results, then you have 2 options:
1. Use the latest version of the wallet (the one you have), and start it using monero-wallet-gui, so navigate to the directory where it’s downloaded exactly as shown in the lecture and then do
2. Use an older version of the wallet that comes with the .sh file, you can download an older version from here
There are two links that are provided in the resources of lecture 38, section 6. The PDF document along with the servers list. I just tried the link for the server list and it’s opening fine without any issue. Please try it again, and let me know how it goes. Here’s the link anyway: