Forum Replies Created
- AuthorPosts
Diego Pérez
ParticipantHi!
No, I can’t manipulate your machine you would need to do it yourself but yes we can have a session about course doubts.Greetings!
DiegoDiego Pérez
ParticipantHi!
No, it seems you have installed a different Pyinstaller version, I used the one that is installed by default with zlogger.
So take a look at the screenshot I sent, specially lines 399 and 402, look for those lines in your utils.py and modified it as I mentioned.Thanks!
Bug-Bounty.com TeamDiego Pérez
ParticipantHi!
If there’s on USB controller already added then there’s no need to add more (actually just one can be added). So just keep going on.Greetings!
DiegoDiego Pérez
ParticipantHi!
Sorry, videos can’t be downloaded.Greetings!
DiegoDiego Pérez
ParticipantHi!
I did some research and it seems the bug is related to a system library, so a quick patch can be done manually. Open the file /usr/local/lib/python2.7/dist-packages/PyInstaller/depend/utils.py in a text editor or IDE and add this lines in code line 400:if m is None: continue
It should like the photo. Then run the zlogger command again and it should work.
Greetings!
DiegoAttachments:
You must be logged in to view attached files.Diego Pérez
ParticipantHi!
Running the installation script should’ve installed the proper versions, maybe a different tool has already installed a different pyinstaller version.
Can you share a screenshot with the command used to create the keylogger and the top of the result?Thanks!
DiegoDiego Pérez
ParticipantDiego Pérez
ParticipantHi!
Well, I gave you a solution to veil that doesn’t need an extra course, it seems you didn’t read the link I sent about using msfvenom. I only told you about Social Engineering course because you want to use empire and it is covered in such course. The course can be properly run in an intel-based macbook, it’s not our fault that some developers doesn’t create tools for the M1/M2 chips.Greetings!
DiegoDiego Pérez
ParticipantHi!
You said you have run an upgrade and this is a problem with custom kali. Python course will also use bettercap to do the downgrade. Unfortunately we can’t connect to your computer to manipulate it. There’s a 1-on-1 session you can request though.Greetings!
DiegoDiego Pérez
ParticipantHi!
If you have run an upgrade then most of the custom changes made by Zaid have been undone, I suggest to remove that kali and import a fresh custom kali. Avoid doing any upgrade on it. Then try the attack again against the windows virtual machine, you can also try to use firefox in windows virtual machine.Yes, mitmproxy is a different tool than bettercap and burpsuite.
Greetings!
DiegoDiego Pérez
ParticipantHi!
Bettercap is the best tool for this kind of attack, did you run any update or upgrade in kali or bettercap? Other than apt update. Are you using a mac with the M1/M2 chip? Which browser are you using?Greetings!
DiegoDiego Pérez
ParticipantHi!
Basically there are 2 challenges:
Websites that use normal https like zsecurity.org, stackoverflow.com ….etc you should be able to bypass all of these even if accessed directly.Websites that use HSTS like facebook and twitter, these websites will only load over HTTPS if accessed directly because the browser has a list of famous websites that use HSTS, therefore it will only load them over https, the only way around this is to use the custom hstshijack caplet that Zaid provided, this will only work if the user searches for the website using a search engine that does not use HSTS, for example if they use the local google domain such as google.ie to search for facebook / twitter …etc in this case the script will replace the .com at the end with .corn bypassing the list of famous websites that the browser has and allowing us to downgrade these websites to http.So clear browser’s cache for All Times or Everything on victim’s machine, then run the attack and enter linkedin.com in the browser’s address bar, just like that, without prepending https://
Let me know how it goes!
DiegoDiego Pérez
ParticipantHi!
Can you share some screenshots where I can see what exactly are you doing?Also the Social Engineering course shows how to install and use Empire, maybe it would be a good idea to take it.
Greetings!
DiegoDiego Pérez
ParticipantHi!
That github repo is outdated. Use this one instead https://github.com/BC-SECURITY/Empire. It also includes the installation instructions.Greetings!
DiegoDiego Pérez
ParticipantHi!
Are you able to sniff dta from http site like:http://testphp.vulnweb.com/login.php
Let me know.
Diego- AuthorPosts