Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi!
The system recognize it bu we spoof extension and also change the icon to look like a pdf. But it is configured to run silently, this was done when converting the .bat file to executable.
Hope it helps!
DiegoiDiego PérezModeratorHi Yorshme!
You can run this commands:
apt update
apt install powershell-empireThen run this command in terminal:
powershell-empireIt will prompt for a password for database, just hit enter.
Let me know if you get it.
DiegoDiego PérezModeratorHi Qwefmi!
The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them. The Python course covers how to create your own keylogger among other tools. This custom tools are also very efficient for AV evasion as their fingerprint is unique, so I think it’s the best method to do it.
Hope it helps!
DiegoDiego PérezModeratorHi Dennis!
I can’t access your photos, I can read your questions so please ask it just once and in the same thread.ifconfig wirks only in Unix-like OS and show active interfaces, route -n shows gateways
ipconfig is the ifconfig version for windows arp -a shows all the connected devices to the same network as windows.Hope it helps!
DiegoDiego PérezModeratorHi Akabueze!
There’s no way that anyone can track your local ip inside VirtualBox, you don’t have to worry about it.The course in the other hand show how to improve your privacy and anonymity, It’s a good one!
Hope it helps!
DiegoDiego PérezModeratorHi Dennis!
It’s not possible to see the attached photos inside your dcument. I can read your question here so they are not dissapearing.Continue here please and show the results.
Thanks!
DiegoDiego PérezModeratorHi Qwefmi!
This is just to show a different method, there’s people that doesn’t even read what they got and just press ok, believe me hahaThe most effective way is the method in lecture 45 where the trojan doesn’t show any suspicious window that’s for sure.
Hope it helps!
DiegoDiego PérezModeratorHi Akabueze!
In the scenario you are describing if kali is in a machine that is a dedicated server then it’s exposed to the internet hence there’s no need to use port forwarding, it has a public ip already.
Hope it helps!
DiegoDiego PérezModeratorYou’re welcome Sithum!
Diego PérezModeratorYou’re welcome Sithum!
I recommend to go hackthebox.eu, tryhackme.com or similar plataforms to practice a lot.
Greetings!
DiegoDiego PérezModeratorHi Sithum!
Cool you got it!
DiegoDiego PérezModeratorHi Sithum!
The more you know the best. Knowing php is useful for websites penetration testing. Also go and ruby could be a good option to know.
Hope it helps!
DiegoDiego PérezModeratorHi Sithum!
It depends on what are you looking for, take a look at the forums, you can find useful info there:
Hope it helps!
DiegoDiego PérezModeratorHi Mzm!
Cool you got it!
DiegoDiego PérezModeratorHi Sithum!
To be honest I don’t know if this mobile is suitable for hacking, but yo can check the specifications for NetHunter here:https://www.kali.org/kali-linux-nethunter/
Hope it helps!
Diego - AuthorPosts