Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi Sithum!
Yes, it’s real. It contains the fundamentals to make your way in into wbsite hacking. This is planned so you can start without previous knowledge so it has to be the basic stuff, but once you have a solid foundation is time to grow up yourself. What i Liked most about this course was the way Zaid explained the stuff, he is very clear and ven go through the steps once more to let it clear, it’s really good at explaining.
Hope it helps!
DiegoDiego PérezModeratorHi!
You are learning useful stuuf, but there’s no magical recipe or a program that will hack facebook juts hitting enter. You have to make some effort here, bypassing AVs is possible, you just need to try harder. I’ve gone through this my self and it’s possible to do it, sometimes is frustrating (AV evasion) but is possible, the more you learn and practice the best you gonna be as pentester or ethical hacker. Take a look at plataforms like HackerOne and you’ll see many people achieving bounties and they needed to bypass AVs.Basically bypassing AV programs is like a game of cat and mouse, so backdoors might start getting detected at some stage, then the developers release an update, this will allow you to generate undetectable backdoors, then AV programs release an update which will make backdoors detectable ……..
So the main thing is to make sure that Veil or any other tool you’re using to generate the backdoor is up to date.
Here’s a few solutions to try if your backdoor is getting detected:
1. Make sure that you have the latest version of Veil, so do updated before doing use 1.
2. Experiment with different payloads, and experiment with different payload options and you should be able to bypass it.
3. Try generating a backdoor using the fat rat, empire.
4. Modify backdoor code if its in bat as shown in lecture 33.
5. Modify backdoor using a hex editor as shown in lecture 40.
6. Create your own backdoor (covered in python course).
Hope it helps!
DiegoiDiego PérezModeratorHi!
Just delete the port forwarding rules in your router and you’ll be safe.Home routers doesn’t have open services exposed to interne, unless you opend it like the port forwarding.
Hope it helps!
DiegoDiego PérezModeratorHi Sithum!
Both plataforms have free and paid modes.How i get invite code for hack the box ? if you want to be a bug bunty hunter then do it by yourself, hack your way in 🙂
Let me know.
DiegoDiego PérezModeratorHi!
The system recognize it bu we spoof extension and also change the icon to look like a pdf. But it is configured to run silently, this was done when converting the .bat file to executable.
Hope it helps!
DiegoiDiego PérezModeratorHi Yorshme!
You can run this commands:
apt update
apt install powershell-empireThen run this command in terminal:
powershell-empireIt will prompt for a password for database, just hit enter.
Let me know if you get it.
DiegoDiego PérezModeratorHi Qwefmi!
The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them. The Python course covers how to create your own keylogger among other tools. This custom tools are also very efficient for AV evasion as their fingerprint is unique, so I think it’s the best method to do it.
Hope it helps!
DiegoDiego PérezModeratorHi Dennis!
I can’t access your photos, I can read your questions so please ask it just once and in the same thread.ifconfig wirks only in Unix-like OS and show active interfaces, route -n shows gateways
ipconfig is the ifconfig version for windows arp -a shows all the connected devices to the same network as windows.Hope it helps!
DiegoDiego PérezModeratorHi Akabueze!
There’s no way that anyone can track your local ip inside VirtualBox, you don’t have to worry about it.The course in the other hand show how to improve your privacy and anonymity, It’s a good one!
Hope it helps!
DiegoDiego PérezModeratorHi Dennis!
It’s not possible to see the attached photos inside your dcument. I can read your question here so they are not dissapearing.Continue here please and show the results.
Thanks!
DiegoDiego PérezModeratorHi Qwefmi!
This is just to show a different method, there’s people that doesn’t even read what they got and just press ok, believe me hahaThe most effective way is the method in lecture 45 where the trojan doesn’t show any suspicious window that’s for sure.
Hope it helps!
DiegoDiego PérezModeratorHi Akabueze!
In the scenario you are describing if kali is in a machine that is a dedicated server then it’s exposed to the internet hence there’s no need to use port forwarding, it has a public ip already.
Hope it helps!
DiegoDiego PérezModeratorYou’re welcome Sithum!
Diego PérezModeratorYou’re welcome Sithum!
I recommend to go hackthebox.eu, tryhackme.com or similar plataforms to practice a lot.
Greetings!
DiegoDiego PérezModeratorHi Sithum!
Cool you got it!
Diego - AuthorPosts