Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi!
Did it used to work? Or why did you keep going on if it doesn’t? I’ll suggest to forget about ssl at the moment because it need to work for http sites first. So maybe start it over again, I mean watch the lectures in this section again.
Can you tell me the exact model of your adapter?(brand and model)
Which http sites are you using for testing?Thanks!
DiegoDiego PérezModeratorHi!
Avoid running the scripts in pycharm’s terminal, it uses a virtual python environment so it won’t be able to find the libraries installed on your system. As long as they work fine when run in kali’s terminal is ok.Greetings!
DiegoDiego PérezModeratorHi!
Can you share the content of your email?
Thanks!
DiegoDiego PérezModeratorHi!
You have to update mitmproxy:apt update
apt install mitmproxyThen you can proceed to install veil
Greetings!
DiegoDiego PérezModeratorHi y4gud007!
I don’t think that using a separate css sheet will work, instead I guess you would have to use the style tag in the html itself. In any case you’ll need to try it out.
Greetings!
DiegoDiego PérezModeratorHi!
If you have ngrok’s paid version then the tunnel links are permanent, at least that’s what they say, I don’t have the paid version so can’r verify it.Also in both Ethical Hacking and Social Engineering course Zaid showed how to set port forwarding rules in the router, so just follow the instructions and set port forwarding rules for port 80. Remember you need a wireless adapter attached to kali and connected to the router.
And follow the instructions to clone a website using webscrappbook (this is showed in the Social Engineering course) and put all the files in the html directory so they are showed when reaching apache server.Greetings!
DiegoDiego PérezModeratorHi!
Knockpy has been updated last week and now it needs some extra installation steps, so take a look at the github repo page and follow the installation instructions. Always is a good idea to read installation instructions when downloading stuff.Greetings!
DiegoDiego PérezModeratorHi!
The screenshot was not attached properly, can you try it again?Thanks!
DiegoDiego PérezModeratorHi!
What exactly do you mean? Can you share a screenshot? It’s not clear what you are trying to ask.
Greetings!
DiegoDiego PérezModeratorHi!
The APK code section seems to have been updated recently, but as it is a well known tool AV developers are always aware of any update and they can patch their software, so now a days it’s not so easy to create an undetectable backdoor with just one click. The most effective way is to modify the backdoor to make it more undetectable.Basically bypassing AV programs is like a game of cat and mouse, so backdoors might start getting detected at some stage, then the developers release an update, this will allow you to generate undetectable backdoors, then AV programs release an update which will make backdoors detectable ……..
So the main thing is to make sure that Veil or any other tool you’re using to generate the backdoor is up to date.
Here’s a few solutions to try if your backdoor is getting detected:1. Make sure that you have the latest version of Veil, so do updated before doing use 1.
2. Experiment with different payloads, and experiment with different payload options and you should be able to bypass it.
3. Try generating a backdoor using the fat rat, empire.
4. Modify backdoor code if its in bat as shown in lecture 33.
5. Modify backdoor using a hex editor as shown in lecture 40.
6. Create your own backdoor (covered in python course).The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them.
Also check out this video:
Greetings!
DiegoDiego PérezModeratorHi!
Are you sure you are using the latest custom kali image provided by Zaid? It’s important!Did you add the card to the USB list as shown in lecture 11? If you did, then make sure that you don’t physically connect the card to the computer until Kali is fully booted, connect the card, then go to the devices menu (beside the file menu) >> USB >> Click your device.
If you’ve already done the above, then please try the following suggestions:– Experiment with connecting the adapter before and after Kali fully loads, and after you log in as root.
– Experiment with setting the adapter to use USB 2 and USB 3 in VirtualBox’s USB settings.
– Make sure you connect the adapter directly to the computer, don’t use a hub or an extension.
– And experiment with connecting the adapter to different USB ports.Greetings!
DiegoDiego PérezModeratorHi!
Have you checked if your system supports Qubes?Hardware incompatibility is a common issue with qubes, so check the above list.
Let me know how it goes!
DiegoDiego PérezModeratorHi!
Once you are in the meterpreter session for the persistent backdoor use the resource command to load the .rc file, then it will delete the backdoor.
Greetings!
DiegoDiego PérezModeratorHi!
As mentioned in the lecture you would have to use the .rc file created by the persistence module, please review the lecture again.Greetings!
DiegoDiego PérezModeratorYou’re welcome!
Greetings!
Diego - AuthorPosts