Forum Replies Created
- AuthorPosts
- March 2, 2024 at 12:12 am in reply to: Unable to pass value to php file to steal user information (lecture 3.6) #127491Diego PérezModerator
Hi!
It seems you haven’t installed php, watch the lecture called File hosting & Firewall settings again and make sure to follow all the instructions.Greetings!
DiegoDiego PérezModeratorHi!
There were some issues with the server where the videos are stored but it should be fixed now, can you check it? And remember to clear the browser’s cache first.Greetings!
DiegoFebruary 29, 2024 at 7:54 pm in reply to: Unable to pass value to php file to steal user information (lecture 3.6) #127185Diego PérezModeratorHi!
Are you getting any error in screen? Or can you elaborate much more what exactly is going on?Greetings!
DiegoDiego PérezModeratorHi!
Yes, it’s normal that the kali version provided by Amazon doesn’t have much apps already installed. If apache is not installed then just run:
sudo apt update
sudo apt install apache2Then it should work.
Greetings!
DiegoDiego PérezModeratorHi!
It seems like something is blocking .yaml files from being uploaded, can you momentarily change the extension to .txt and upload the file again? Or upload it in google drive and share the link here.Greetings!
DiegoFebruary 24, 2024 at 6:26 pm in reply to: question about Learn Ethical Hacking Using The Cloud #126075Diego PérezModeratorHi!
There are some attacks that will work against any device that has a browser but dome other attacks will work against computers. There are no android specific attacks in the course.Greetings!
DiegoFebruary 24, 2024 at 12:35 am in reply to: question about Learn Ethical Hacking Using The Cloud #125798Diego PérezModeratorHi!
What do you mean? Can you elaborate much more?Greetings!
DiegoDiego PérezModeratorHi!
The behavior of the captive portal is expected, it is not meant to provide internet connection but to steal credentials. So if that part is working then you got it successfully!
Sorry but the file of the captive portal in the lesson are not available.Greetings!
DiegoDiego PérezModeratorHi!
It seems there’s something wrong in the content of the .yaml file, can you share it?Greetings!
DiegoDiego PérezModeratorHi!
As mentioned before you need to create them yourself, Zaid covers how to create phishlets. Did you try it? Because modifying the original ones might not work.Greetings!
DiegoDiego PérezModeratorHi!
Yes, the author of the tool mentioned that the phishlets were becoming outdated soon but he doesn’t provide any updated version. So you would need to write your own.Greetings
DiegoDiego PérezModeratorHi!
Great you got it.Greetings
DiegoDiego PérezModeratorHi!
Yes, you would need to run a deauth attack in order to lure the victim to the fake network.Greetings!
DiegoDiego PérezModeratorHi!
As mentioned before as long as the victim is connected to the fake AP both the attacker and the victim are in the same network, there’s no need for internet because the communication is local. The victim device is connected to an access point you control.Greetings!
DiegoDiego PérezModeratorHi!
As long as the target machine is connected to the fake AP then both machines can communicate, there’s no need for internet in such case.Greetings!
Diego - AuthorPosts