Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi Peter!
You have a typo in this line:
stdeer=DEVNULL
It should be stderr, so change it and let me know how it goes!Are you getting any errors while compiling it? Are you doing it in windows or linux?
Let me know.
DiegoDiego PérezModeratorHi Peter!
So you said it’s working when you have installed pyinstaller isn’t it? Are you recieving emails now? And yes, you can change the code to make it work with python3.
Let me know how it goes!
DiegoDiego PérezModeratorHi!
Ok, so let’s solve 1 issue at a time, did you get a working backdoor using NAT Network?Let me know.
DiegoDiego PérezModeratorHi!
What do you mean by “install scapy complete and basic”? There’s no need to install them in Pycharm.
Also you didn’t answered if you are running the script in kali’s terminal, can you tell please? Did you get any errors while running the commands I shared? Are you using python 2 or 3?Can you share a screenshot of the command used to run the script and the result please?
Thanks!
DiegoDiego PérezModeratorHi Samuel!
Then you can try a different vector attack, like making a fake AP replicating the name of your target network. The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them. The Network Hacking Advanced course shows this kind of techniques.
In the current course you’ll learn one method as well.Hope it helps!
DiegoDiego PérezModeratorHi Arminius!
Ok, so the attack can work even if the machine is outside the network but you’ll need to use a wireless adapter attached to kali and connected to your home router, then you’ll need to set the port forwarding rules, this is covered in Section 14 of the course. So the first step is to get a connection back from the victim machine, then you can try to pivot to any other machine. But I will suggest to try it in the virtual lab first, I mean in your host machine and kali and windows as virtual machines attaches to the same NAT Network.Hope it helps!
DiegoDiego PérezModeratorHi Arminius!
The problem is that you are using bridged mode which is ro unreliable and more if you are attacking your host machine, also you won’t be able to pivot to metasploitable this way, you’ll need to use the 3 as virtual machines if you want to try this attack.Hope it helps!
DiegoDiego PérezModeratorHi!
Can you try to store the credentials in Internet Explorer? And try to run lazagne as:lazagne.exe all
Let me know how it goes!
DiegoDiego PérezModeratorHi!
Cool you got it!
DiegoDiego PérezModeratorHi Peter!
Which exact version of python interpreter did you installed? I have tried it in 2.7.18 and it worked without issues, so maybe you can try to delete the current version and install the one I mentioned.Let me know how it goes!
DiegoDiego PérezModeratorHi Z!
I can’t see it in your photos but did you run ./fluxion.sh with the -i option?
Let me know.
DiegoDiego PérezModeratorHi Arminius!
Your second link is not working.Can you show the results of:
ifconfig and route -n in kali and metasploitable
ipconfig in windows
Can you share a screenshot of the Network settings used in VirtualBox for all the machines?Thanks!
DiegoDiego PérezModeratorHi!
Which was th command used to run lazagne? is it the latest version? which browser did you use to store the credentials?Let me know.
DiegoDiego PérezModeratorHi!
Cool you got it!
DiegoDiego PérezModeratorHi Peter!
That’s weired, are you trying this in your host machine or in a virtual one?Let me know.
Diego - AuthorPosts