Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi!
As mentioned before this can be due to the OS you are using, as mentioned I don’t know the specifics of it or if something is not set properly. I tested it on custom kali and it worked just fine, I just did the changes mentioned above and the browser loads as expected with any http site, even https sites load as expected. I didn’t get any 501 nor 404 messages and unfortunately it’s impossible for me to know what’s exactly going wrong as I can’t reproduce those errors. So maybe try to do some google research based on the exact OS used and the errors you are getting, also remember to flush iptables with the commands I shared some comments above to prevent iptables from improper redirections.Greetings!
DiegoDiego PérezModeratorHi!
I just give a try and found the error, you are deleting the UDP checksum and len, remove those lines and add:
del pkt[TCP].chksum
Then the code will work.
Greetings!
DiegoDiego PérezModeratorHi!
Cool, I’ll let you know on monday or sooner if I tested it before.Greetings!
DiegoDiego PérezModeratorHi!
Can you share your code in pastebin so I can test it?Thanks!
DiegoDiego PérezModeratorHi!
So for the code to work you need to navigate to a http site, this initial firefox page will not work nor be injected. When I said to check source code I meant with the page you are using to inject the code. In this initial page it’s common to don’t get responses as you are not requesting any page at the moment, the requests you see in terminal are just default packets sent by the browser when you open it.And you didn’t answer my question? Is the browser working? I mean is it loading the pages normally?
Let me know.
DiegoDiego PérezModeratorHi!
Test the script against http sites only, later on the course you’ll learn to bypass https. So you are getting ecvrypted content because you are using https and hsts sites.Which http site are you using?
Also try by donwlaoding and importing the latest custom kali v1.3, this might also help to solve the issue, just install scapy and netfilterqueue on it.Let me know how it goes!
DiegoDiego PérezModeratorHi!
You previously said And flushing iptables didn’t work it made the browser start getting responses and load the page yes but i was still unable to see any responses in my terminal. , and now you are saying that there are no responses, so is the browser working or not? And if not then why did you said it was getting responses? Can you explain?Let me know.
DiegoDiego PérezModeratorHi!
Unfortunately tour screenshot is unreadable, is to small even after zooming in, can you share a bigger one? Or change the color and font size, and having a transparent terminal doesn’t help here.
About source code, it was explained by Zaid in the lectures, you can display it by clicking ctrl + u (at least that works in kali) or right click and select View Source Code.Greetings!
DiegoDiego PérezModeratorYou’re welcome!
Greetings!
DiegoDiego PérezModeratorYou’re welcome!
Greetings!
DiegoDiego PérezModeratorHi!
Which website did you use this last time for testing the code injector? It was an http site right? If so then look at the code source page and verify if the code has been injected.Let me know.
DiegoDiego PérezModeratorHi!
You can find the username and password in the file:
/etc/beef-xss/config.yamlGreetings!
DiegoDiego PérezModeratorHi!
Yeah, that won’t affect the performance of the script, did flushing iptables work?Let me know.
DiegoDiego PérezModeratorHi!
The problem is that knockpy is a python2 script and it won’t work in python3, as you are using official kali release it defaults to python3. So you can try:
python -m pip install dnspythonThe easiest solution would be to use the latest custom kali image provided by Zaid. It’s important! It has many tools more installed and will fix many issues present in original release. If you want to use any other kali version for your own work is ok.
Thanks!
DiegoDiego PérezModeratorHi!
The command should be failling because you are missing -L, look what I wrote avobe, iptables -t nat -L, so if you are not getting repsonses it should be because some packets are stucked, try to flush iptables first:
iptables –flush
iptables –table nat –flush
iptables –delete-chain
iptables –table nat –delete-chain
iptables -P FORWARD ACCEPTEnable port forwarding
echo 1 > /proc/sys/net/ipv4/ip_forwardThen run the proper iptables rules again and try it once more.
Let me know how it goes!
Diego - AuthorPosts