Forum Replies Created
- AuthorPosts
Diego Pérez
ModeratorHi Sithum!
I’ve just tried it in custom kali and it’s working properly. Can you first make a test with the apache server? So just start it and then create the tunnel for port 80, see if you can reach it from the outside network.Let me know how it goes!
DiegoDiego Pérez
ModeratorHi Sithum!
Have you tried to host it in 000webhost?
Let me know.
DiegoDiego Pérez
ModeratorHi Akabueze!
It should be there, I’ve just see it. But it’s called original.txt, you have to raname it to send.phpHope it helps!
DiegoDiego Pérez
ModeratorHi!
I haven’t used HiddenEye but look for the source code of the page you are using (the fake login) and write the code there, as you have donw it with some other pages.Hope it helps!
DiegoDiego Pérez
ModeratorHi Alastair!
First it has to work in local host.
Can you share your code please? And the iptables rules used in this case?Thanks!
DiegoDiego Pérez
ModeratorHi Shaka!
Will pass your question to Zaid.Thanks!
DiegoDiego Pérez
ModeratorHi!
You can try to flood the AP using a tool called MDK3, this causes SOME routers to reset and unlock WPS, you can do that using the following command:mdk3 wlan0mon a -a [interface] -m
Hope it helps!
DiegoDiego Pérez
ModeratorHi!
Sorry to replay until now but haven’t had so much time to test your code.
Now I did it and found the error, in line “return self.reliable_receive” in execute_remotely you are missing the parenthesis, it should be like this:
return self.reliable_receive() this will make it work.Greetings!
DiegoDiego Pérez
ModeratorHi!
Did the installation was successful or did it throw some error?
If it didn’t then can you try to download it again?
Thanks!
DiegoDiego Pérez
ModeratorHi Akabueze!
Yeah, you can use the same link for different targets.Greetings!
DiegoDiego Pérez
ModeratorHi Akabueze!
Maybe you can try to put the javescript hook in Hiddeneye’s fake page, you’ll need to open another tunnel for beef.
Let me know how it goes!
DiegoDiego Pérez
ModeratorHi Sithum!
You can store them in your dropbox.
Greetings!
DiegoDiego Pérez
ModeratorHi Suthum!
Are you testing with a backdoor? Can you tell me more about what are you doing?
Let me know.
DiegoDiego Pérez
ModeratorHi Shaka!
That’s really weired, your course should be complete.Please try with a different browser.
Let me know how it goes!
DiegoDiego Pérez
ModeratorHi Jtam!
I haven’t used it in Raspberry, but are you using root credential to log in to the machine? is it connected to the router? Can you see your victim’s device if you run netdiscover or bettercap? Can you share a screenshot of the command used and the result please?Thanks!
Diego- AuthorPosts