Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi!
Can you check that windows and kali have internet access before running the attack?
Can you show the results of:
ifconfig and route -n in kali
ipconfig in windows
Can you share a screenshot of the Network settings used in VirtualBox for both machines?Bur use screenshots please as the info you have shared is hard to read. And for the code use code button from the menu because I can’t read it properly as it doesn’t have any indentation.
Thanks!
DiegoDiego PérezModeratorHi!
Cool you got it!
DiegoDiego PérezModeratorHi!
Cool you got it!To get rlogin to work you’ll need to install the latest version, just use the commands:
apt update
apt install rsh-clientDiego
Diego PérezModeratorHi!
Can you install a specific version:…. pip install pyinstaller==3.5
Let me know how it goes!
DiegoDiego PérezModeratorYou’re welcome!
Greetings!
DiegoDiego PérezModeratorHi!
You can try to use antiscan.me as a nodistribute alternaive.Basically bypassing AV programs is like a game of cat and mouse, so backdoors might start getting detected at some stage, then the developers release an update, this will allow you to generate undetectable backdoors, then AV programs release an update which will make backdoors detectable ……..
So the main thing is to make sure that Veil or any other tool you’re using to generate the backdoor is up to date.
Here’s a few solutions to try if your backdoor is getting detected:1. Make sure that you have the latest version of Veil, so do updated before doing use 1.
2. Experiment with different payloads, and experiment with different payload options and you should be able to bypass it.
3. Try generating a backdoor using the fat rat, empire.
4. Modify backdoor code if its in bat as shown in lecture 33.
5. Modify backdoor using a hex editor as shown in lecture 40.
6. Create your own backdoor (covered in python course).The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them.
Also check out this video:
Hope it helps!
DiegoDiego PérezModeratorHi!
Unfortunately I don’t know a book about windows vulnerabilities, but fell free to do some google research. It’s important to develop searching skills.
Greetings!
DiegoDiego PérezModeratorHi!
Yeah, use those suggested command on a fresh custom kali.
Greetings!
DiegoDiego PérezModeratorHi!
I’ve already answered you in the other same question, so let’s keep it there please.Thanks!
DiegoDiego PérezModeratorHi!
Cool you got it!
DiegoDiego PérezModeratorHi!
You’ll need to connect it to a network.
Greetings!
DiegoDiego PérezModeratorHi!
You can upload it to an image host service and share the linkh here.Did you disable defender in victim machine?
Can you show me the following please:
1. Result of ifconfig and route -n in Kali.
2. The result of ipconfig in Windows.
3. The options for the listener.
4. The options for the stager.
5. Can you share a screenshot of the Network settings used in VirtualBox for both machines.Let me know.
DiegoDiego PérezModeratorHi!
You can use aptitude if you want, but most of the tools are installed properly using apt-get install.Greetings!
DiegoDiego PérezModeratorHi!
You have many field to cover then, also you’ll need to learn some basic coding to understand how programs work. For windows c, c++, c# and .net are the most common languages. Try to read info about window’s vulnerabilities, for example Eternalblue and understand smb communication protocol, and so on.
Here you can read about specific window’s vulnerabilities:
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-023Hope it helps!
DiegoDiego PérezModeratorHi!
Cool you got it!
Diego - AuthorPosts