Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi Peter!
Cool you got it!
DiegoDiego PérezModeratorHi Z!
Can you share a screenshot of the error please?
Thanks!
DiegoDiego PérezModeratorHi Z!
Cool you got it!
DiegoDiego PérezModeratorGreetings Sithum!
DiegoDiego PérezModeratorHi Samuel!
Did you add the card to the USB list as shown in lecture 11? If you did, then make sure that you don’t physically connect the card to the computer until Kali is fully booted, connect the card, then go to the devices menu (beside the file menu) >> USB >> Click your device.
If you’ve already done the above, then please try the following suggestions:– Experiment with connecting the adapter before and after Kali fully loads, and after you log in as root.
– Experiment with setting the adapter to use USB 2 and USB 3.
– Make sure you connect the adapter directly to the computer, don’t use a hub or an extension.
– And experiment with connecting the adapter to different USB ports.Let me know how it goes!
DiegoDiego PérezModeratorHi!
The password is: Passw0rd!Greetings!
DiegoDiego PérezModeratorHi Peter!
For the other courses please avoid using VPN so you can get internet connection in your machines, also many attacks will fail if you are using it in kali or windows vm.
But it should work fine in TAILS, isn’t it?
Let me know.
DiegoDiego PérezModeratorHi Akabueze!
Have you checked the spam folder?
If the mail is there then consider this:1. You’re setting the from email to a none existent email.
2. You’re setting the from email to an email that the target never received an email from.
3. You’re setting the from email to an email of a domain that correctly implements DKIM, DMARC and SPF, currently only %4 of domains implement them properly.So please try again keeping the above notes in mind and you should be able to get your email to land in the inbox.
Hope it helps!
DiegoDiego PérezModeratorHi!
I can’t see the photo, asked for access already.Greetings!
DiegoDiego PérezModeratorHi Arminius!
Once you are inside msfconsole you can use the command:
search autorouteThis will tell you the exact path to the module. Metasploit developer’s have moved it from the location showed in the course.
Hope it helps!
DiegoDiego PérezModeratorHi Sithum!
Then continue with the ones that are working for you, for me HTB has helped a lot to lear new tricks as I said.
Anyway just keep practicing and learning, that’s the way.Greetings!
DiegoDiego PérezModeratorHi Peter!
You are nor returning the result of subprocess module in your function:
def execute_system_command(command):
subprocess.check_output(command, shell=True)You are just calling the module, so you need to return it’s output, if you don’t understand what I’m saying will recommend to watch the lecture again.
Let me know how it goes!
DiegoDiego PérezModeratorHi Peter!
First can you try to update smtplib? Just run:
python.exe -m pip install smptlib
This will install any update if available, also consider that you have to provide the full path for python.exe
Let me know how it goes!
DiegoDiego PérezModeratorHi Samuel!
Cool you got it!
DiegoDiego PérezModeratorHi!
Are you running reaver before the fakeauth attack?
Let me know.
Diego - AuthorPosts