Forum Replies Created
- AuthorPosts
- January 18, 2022 at 5:26 pm in reply to: What is the way I can get a job as an ethical hacker on day? #61867
Diego Pérez
ModeratorHi!
It depends on the kind of attack. Any MITM attack will require both the attacker and the victim connected to the same network. The backdoors can work outside the network, including the backdoor built in the course. But yeah, it’s a very good idea to take the general Ethical Hacking course, and also is very important to practice, so go ahead.
Greetings!
DiegoJanuary 17, 2022 at 5:06 pm in reply to: What is the way I can get a job as an ethical hacker on day? #61839Diego Pérez
ModeratorHi!
I’ll suggest to practice on online platforms such as tryhackme.com, hackthebox.eu, offensive-security.com/labs, etc. So you can really test your skills. There are many areas in the ethical hacking field so it will depend what exactly you want to do in order to choose the next course, and to get a job you’ll need to look for one available position the same you would do with any other job, I mean do a google research, use twitter to get in touch with cybersecurity community, build a linkedin profile, etc. If it’s possible try to assist to any hacking conference to build a job network.
Hope it helps!
DiegoDiego Pérez
ModeratorOk, cool.
Greetings!
DiegoDiego Pérez
ModeratorHi!
What’s the exact error? Can you elaborate? Also some screenshots will help.
Thanks!
DiegoDiego Pérez
ModeratorHi!
Check this webpage, it has some other commands that can be used:
https://support.torproject.org/tbb/how-to-verify-signature/Greetings!
DiegoJanuary 7, 2022 at 5:56 pm in reply to: Using a De-authentication Attack to Disconnect Users From The Network #61541Diego Pérez
ModeratorHi!
Can you share screenshots with the commands used and the results please?
Also, what do you mean by the computer still connected to the computer? Can you explain?Thanks!
DiegoDiego Pérez
ModeratorHi!
Again there’s a syntax error, you are using a comma and add a blank space. Where are you watching the lectures? I mean which device are you using.Don’t use Bing as it uses hsts protection now a days, use a simple http sites like vulnweb.com or speedbit.com.
Greetings!
DiegoDiego Pérez
ModeratorHi!
You have used a capital L in haslayer and that’s a wrong syntax, check Zaid’s code and make sure yours is exactly the same, especially pay attention to the syntax.
Greetings!
DiegoJanuary 3, 2022 at 5:24 pm in reply to: Unable to connect windows machine to Kali via the reverse_backdoor.py #61433Diego Pérez
ModeratorHi!
Make sure that you’re using the same payload when generating the backdoor and when using multi handler, if you’re already doing that then try using a different port, if you’re still having issues then please show me the following please:
1. Result of ifconfig and route -n in Kali.
2. The result of ipconfig in Windows.
3. The result of options before generating the backdoor in Veil or the IP used in the backdoor.
4. The result of show options before running the multi handler.
5. Can you share a screenshot of the Network settings used in VMware for both machines.Let me know.
DiegoDiego Pérez
ModeratorHi!
Yeah, all the settings are correct and yes, you need to run windows VM as well. Also I got confused and typed Virtualbox instead of VMware.Greetings!
DiegoDiego Pérez
ModeratorHi!
Can you show the results of:
ifconfig and route -n in kali
ipconfig in windows
Can you share a screenshot of the Network settings used in VirtualBox for both machines?Thanks!
DiegoDiego Pérez
ModeratorHi!
While writting the mac address changer we have use the ifconfig command to know kali’s ip nad mac address, taking notes while watching the course will be very helpful. In windows you can use ipconfig command, look at the ipv4 and you’ll know which is your target machine’s ip.
And in a real scenario it’s not that easy to know which is the ip of the target machine, you’ll need to capture some traffic and analyze it, it might give you a clue to identify the target. Also the mac addresses can give you an idea because most of them have specific numbers assigned to vendors, I mean you can know if the connected device is apple, windows, huwaei, tp-link, etc. Check this website: https://macaddress.io/ (obviously this won’t work for virtual machines as the mac address they have is fake)
Hope it helps!
DiegoDiego Pérez
ModeratorHi!
Yeah, for the script to work you need to uncomment the change_mac function call line, can you share a screenshot with the current state of the script? Also a screenshot where we can see the command used to run the script.
Thanks!
DiegoDecember 27, 2021 at 9:54 pm in reply to: Is there a list which contains all the links for the documentations #61135Diego Pérez
ModeratorHi!
No, there’s no suchlist. But if you want to look for the documentation of an specific python’s module just google it, the proper result will be the very first result in most of the cases, just check that the server name is docs.python.orgGreetings!
DiegoDiego Pérez
ModeratorHi!
You’ll need to install an older version of it, so run:
… pip install pyinstaller==3.6
Then it should work.
Greetings!
Diego - AuthorPosts