Forum Replies Created
- AuthorPosts
- March 2, 2024 at 7:08 pm in reply to: Unable to pass value to php file to steal user information (lecture 3.6) #127744
Diego Pérez
ParticipantHi!
Glad you got it!
DiegoDiego Pérez
ParticipantHi!
What exactly do you mean bu does not cover the contect of the lecture? Can you explain?
And yes, the domain name used for the lectures has changed but what’s the exact problem with it? Using a domain name has been explained in the course so it’s the same thing, or can you tell what don’t you understand?Greetings!
DiegoMarch 2, 2024 at 12:12 am in reply to: Unable to pass value to php file to steal user information (lecture 3.6) #127491Diego Pérez
ParticipantHi!
It seems you haven’t installed php, watch the lecture called File hosting & Firewall settings again and make sure to follow all the instructions.Greetings!
DiegoDiego Pérez
ParticipantHi!
There were some issues with the server where the videos are stored but it should be fixed now, can you check it? And remember to clear the browser’s cache first.Greetings!
DiegoFebruary 29, 2024 at 7:54 pm in reply to: Unable to pass value to php file to steal user information (lecture 3.6) #127185Diego Pérez
ParticipantHi!
Are you getting any error in screen? Or can you elaborate much more what exactly is going on?Greetings!
DiegoDiego Pérez
ParticipantHi!
Yes, it’s normal that the kali version provided by Amazon doesn’t have much apps already installed. If apache is not installed then just run:
sudo apt update
sudo apt install apache2Then it should work.
Greetings!
DiegoDiego Pérez
ParticipantHi!
It seems like something is blocking .yaml files from being uploaded, can you momentarily change the extension to .txt and upload the file again? Or upload it in google drive and share the link here.Greetings!
DiegoFebruary 24, 2024 at 6:26 pm in reply to: question about Learn Ethical Hacking Using The Cloud #126075Diego Pérez
ParticipantHi!
There are some attacks that will work against any device that has a browser but dome other attacks will work against computers. There are no android specific attacks in the course.Greetings!
DiegoFebruary 24, 2024 at 12:35 am in reply to: question about Learn Ethical Hacking Using The Cloud #125798Diego Pérez
ParticipantHi!
What do you mean? Can you elaborate much more?Greetings!
DiegoDiego Pérez
ParticipantHi!
The behavior of the captive portal is expected, it is not meant to provide internet connection but to steal credentials. So if that part is working then you got it successfully!
Sorry but the file of the captive portal in the lesson are not available.Greetings!
DiegoDiego Pérez
ParticipantHi!
It seems there’s something wrong in the content of the .yaml file, can you share it?Greetings!
DiegoDiego Pérez
ParticipantHi!
As mentioned before you need to create them yourself, Zaid covers how to create phishlets. Did you try it? Because modifying the original ones might not work.Greetings!
DiegoDiego Pérez
ParticipantHi!
Yes, the author of the tool mentioned that the phishlets were becoming outdated soon but he doesn’t provide any updated version. So you would need to write your own.Greetings
DiegoDiego Pérez
ParticipantHi!
Great you got it.Greetings
DiegoDiego Pérez
ParticipantHi!
Yes, you would need to run a deauth attack in order to lure the victim to the fake network.Greetings!
Diego - AuthorPosts