Forum Replies Created
- AuthorPosts
Diego Pérez
ParticipantHi!
You can try it, it may work.
Run:
echo 1 > /proc/sys/net/ipv4/ip_forwardLet me know how it goes!
DiegoDiego Pérez
ParticipantHi Akabueze!
I already replied to you in the other question. Will be better to leave the same topic in just one question so it’s easier to follow.
Greetings!
DiegoDiego Pérez
ParticipantHi Akabueze!
You’ll have to find out which one works, I haven’t tested with accounts like that. So I can’t tell which one will work.Let me know how it goes!
DiegoDiego Pérez
ParticipantHi Akabueze!
Maybe you can try with something like [email protected].What has happened with the other mails? Are they going to spam?
Let me know.
DiegoDiego Pérez
ParticipantHi Sithum!
I’ve just tried it in custom kali and it’s working properly. Can you first make a test with the apache server? So just start it and then create the tunnel for port 80, see if you can reach it from the outside network.Let me know how it goes!
DiegoDiego Pérez
ParticipantHi Sithum!
Have you tried to host it in 000webhost?
Let me know.
DiegoDiego Pérez
ParticipantHi Akabueze!
It should be there, I’ve just see it. But it’s called original.txt, you have to raname it to send.phpHope it helps!
DiegoDiego Pérez
ParticipantHi!
I haven’t used HiddenEye but look for the source code of the page you are using (the fake login) and write the code there, as you have donw it with some other pages.Hope it helps!
DiegoDiego Pérez
ParticipantHi Alastair!
First it has to work in local host.
Can you share your code please? And the iptables rules used in this case?Thanks!
DiegoDiego Pérez
ParticipantHi Shaka!
Will pass your question to Zaid.Thanks!
DiegoDiego Pérez
ParticipantHi!
You can try to flood the AP using a tool called MDK3, this causes SOME routers to reset and unlock WPS, you can do that using the following command:mdk3 wlan0mon a -a [interface] -m
Hope it helps!
DiegoDiego Pérez
ParticipantHi!
Sorry to replay until now but haven’t had so much time to test your code.
Now I did it and found the error, in line “return self.reliable_receive” in execute_remotely you are missing the parenthesis, it should be like this:
return self.reliable_receive() this will make it work.Greetings!
DiegoDiego Pérez
ParticipantHi!
Did the installation was successful or did it throw some error?
If it didn’t then can you try to download it again?
Thanks!
DiegoDiego Pérez
ParticipantHi Akabueze!
Yeah, you can use the same link for different targets.Greetings!
DiegoDiego Pérez
ParticipantHi Akabueze!
Maybe you can try to put the javescript hook in Hiddeneye’s fake page, you’ll need to open another tunnel for beef.
Let me know how it goes!
Diego- AuthorPosts