Forum Replies Created
- AuthorPosts
Diego Pérez
ModeratorHi!
1. Which lecture are you on? Can you specify?
2. The injections can be done in any page as long as the user can enter any data, this will also depend on how the site is coded and if it’s vulnerable to the attacks.
3. Which site are you scanning? Almost any good developer will prevent the access to phpmyadmin page.
4. Which sites? Remember you can’t run any of the attacks against sites you don’t have permission to.Let me know.
DiegoDiego Pérez
ModeratorHi!
Yes, it can happen if you are changing it for a real interface like wlan0 as the router can recognize it as a new device. But sometimes it won’t happen.Greetings!
DiegoDiego Pérez
ModeratorHi!
You’ll need to try different queries to know whcih type it is. Take a look at this article:
https://portswigger.net/web-security/sql-injection/examining-the-databaseHope it helps!
DiegoDiego Pérez
ModeratorHi!
As mentioned I only used your code, compiled it in kali and ran it in windows. There’s no trick or anything extra. Just disable defender before running it and make shure your windows machine has internet access.
Maybe try with this article to permanently disable defender:
https://www.windowscentral.com/how-permanently-disable-windows-defender-windows-10Hope it helps!
DiegoDiego Pérez
ModeratorHi!
There’s no like a go to model, also you’ll need to use a wireless adapter in any case. So just buy something that has like 8GB of RAM (at least), SSD storage, 1TB would be great, and a good and recent chipset may be i7 or newer.
Hope it helps!
DiegoDiego Pérez
ModeratorHi!
Maybe you can try:– Experiment with connecting the adapter before and after Kali fully loads, and after you log in as root.
– Experiment with setting the adapter to use USB 2 and USB 3 in VirtualBox’s USB settings.
– Make sure you connect the adapter directly to the computer, don’t use a hub or an extension.
– And experiment with connecting the adapter to different USB ports.Hope it helps!
DiegoDiego Pérez
ModeratorHi!
Take a look at this page, it mentions this issue for some mac models:
https://tails.boum.org/support/known_issues/index.en.html#index2h2Hope it helps!
DiegoDiego Pérez
ModeratorHi Sithum!
I don’t know if crypto currency is accepted, will pass your query to Zaid.Thanks!
DiegoDiego Pérez
ModeratorHi!
Yeah, the files you shared were labeled Keylogger_1.py, which has the class, and Keylogger_2.py which is the one who call the class.
So I put them in the same directory, change the call inside Keylogger_2.py to call the proper Keylogger_1.py class, then enter my email credentials in the script and finally run the command:wine /root/.wine/drive_c/Python27/Scripts/pyinstaller.exe Keylogger_2.py –onefile –noconsole
Then I sent the executable inside the dist directory and it worked.
Hope it helps!
DiegoDiego Pérez
ModeratorHi!
Are you using external devices? Because I have tested it in the same set up as yours and TAILS worked fine.Let me know.
DiegoDiego Pérez
ModeratorHi!
Which file is zlogger.py? Is it the one calling the class? Because the ones you shared had a different name so don’t exactly know.Let me know.
DiegoDiego Pérez
ModeratorHi!
Can you try to run the attack without setting your adapter in monitor mode?Let me know how it goes!
DiegoDiego Pérez
ModeratorHi!
As mentioned before I dind’t changed anything in your code, it actually works. I just compiled it in kali. Which commands are you using for compiling it?
I think the error is there.Let me know.
DiegoDiego Pérez
ModeratorHi!
Yeah, you have just downloaded the necessary dependencies, you need to install it now. Just do it as in the lectures, the command is:/usr/share/veil/config/setup –force –silent
Hope it helps!
DiegoDiego Pérez
ModeratorHi!
Can you try this solution:apt update
apt install -y aptitude
aptitude install -y veilYou have to run this commands in a fresh custom kali.
Let me know how it goes!
Diego- AuthorPosts