Forum Replies Created
- AuthorPosts
Diego Pérez
ModeratorHi!
Yeah, that can work, is safe enough. Also you can download it and flash the usb again.Hope it helps!
DiegoDiego Pérez
ModeratorHi!
You need to install it for the windows python version, run the command:wine /root/.wine/drive_c/Python27/python.exe -m pip install pyinstaller==3.5
Let me know how it goes!
DiegoDiego Pérez
ModeratorHi!
Can you check that windows and kali have internet access before running the attack?
Can you show the results of:
ifconfig and route -n in kali
ipconfig in windows
Can you share a screenshot of the Network settings used in VirtualBox for both machines?Bur use screenshots please as the info you have shared is hard to read. And for the code use code button from the menu because I can’t read it properly as it doesn’t have any indentation.
Thanks!
DiegoDiego Pérez
ModeratorHi!
Cool you got it!
DiegoDiego Pérez
ModeratorHi!
Cool you got it!To get rlogin to work you’ll need to install the latest version, just use the commands:
apt update
apt install rsh-clientDiego
Diego Pérez
ModeratorHi!
Can you install a specific version:…. pip install pyinstaller==3.5
Let me know how it goes!
DiegoDiego Pérez
ModeratorYou’re welcome!
Greetings!
DiegoDiego Pérez
ModeratorHi!
You can try to use antiscan.me as a nodistribute alternaive.Basically bypassing AV programs is like a game of cat and mouse, so backdoors might start getting detected at some stage, then the developers release an update, this will allow you to generate undetectable backdoors, then AV programs release an update which will make backdoors detectable ……..
So the main thing is to make sure that Veil or any other tool you’re using to generate the backdoor is up to date.
Here’s a few solutions to try if your backdoor is getting detected:1. Make sure that you have the latest version of Veil, so do updated before doing use 1.
2. Experiment with different payloads, and experiment with different payload options and you should be able to bypass it.
3. Try generating a backdoor using the fat rat, empire.
4. Modify backdoor code if its in bat as shown in lecture 33.
5. Modify backdoor using a hex editor as shown in lecture 40.
6. Create your own backdoor (covered in python course).The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them.
Also check out this video:
Hope it helps!
DiegoDiego Pérez
ModeratorHi!
Unfortunately I don’t know a book about windows vulnerabilities, but fell free to do some google research. It’s important to develop searching skills.
Greetings!
DiegoDiego Pérez
ModeratorHi!
Yeah, use those suggested command on a fresh custom kali.
Greetings!
DiegoDiego Pérez
ModeratorHi!
I’ve already answered you in the other same question, so let’s keep it there please.Thanks!
DiegoDiego Pérez
ModeratorHi!
Cool you got it!
DiegoDiego Pérez
ModeratorHi!
You’ll need to connect it to a network.
Greetings!
DiegoDiego Pérez
ModeratorHi!
You can upload it to an image host service and share the linkh here.Did you disable defender in victim machine?
Can you show me the following please:
1. Result of ifconfig and route -n in Kali.
2. The result of ipconfig in Windows.
3. The options for the listener.
4. The options for the stager.
5. Can you share a screenshot of the Network settings used in VirtualBox for both machines.Let me know.
DiegoDiego Pérez
ModeratorHi!
You can use aptitude if you want, but most of the tools are installed properly using apt-get install.Greetings!
Diego- AuthorPosts