Forum Replies Created
- AuthorPosts
Diego Pérez
ModeratorHi Joshua!
Can you show the results of:
ifconfig and route -n in kali
ipconfig in windows
Can you share a screenshot of the Network settings used in VirtualBox for both machines?You can upload the images to a free web image hosting and share the links here.
Thanks!
DiegoDiego Pérez
ModeratorHi Peter!
You have a typo in this line:
stdeer=DEVNULL
It should be stderr, so change it and let me know how it goes!Are you getting any errors while compiling it? Are you doing it in windows or linux?
Let me know.
DiegoDiego Pérez
ModeratorHi Peter!
So you said it’s working when you have installed pyinstaller isn’t it? Are you recieving emails now? And yes, you can change the code to make it work with python3.
Let me know how it goes!
DiegoDiego Pérez
ModeratorHi!
Ok, so let’s solve 1 issue at a time, did you get a working backdoor using NAT Network?Let me know.
DiegoDiego Pérez
ModeratorHi!
What do you mean by “install scapy complete and basic”? There’s no need to install them in Pycharm.
Also you didn’t answered if you are running the script in kali’s terminal, can you tell please? Did you get any errors while running the commands I shared? Are you using python 2 or 3?Can you share a screenshot of the command used to run the script and the result please?
Thanks!
DiegoDiego Pérez
ModeratorHi Samuel!
Then you can try a different vector attack, like making a fake AP replicating the name of your target network. The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them. The Network Hacking Advanced course shows this kind of techniques.
In the current course you’ll learn one method as well.Hope it helps!
DiegoDiego Pérez
ModeratorHi Arminius!
Ok, so the attack can work even if the machine is outside the network but you’ll need to use a wireless adapter attached to kali and connected to your home router, then you’ll need to set the port forwarding rules, this is covered in Section 14 of the course. So the first step is to get a connection back from the victim machine, then you can try to pivot to any other machine. But I will suggest to try it in the virtual lab first, I mean in your host machine and kali and windows as virtual machines attaches to the same NAT Network.Hope it helps!
DiegoDiego Pérez
ModeratorHi Arminius!
The problem is that you are using bridged mode which is ro unreliable and more if you are attacking your host machine, also you won’t be able to pivot to metasploitable this way, you’ll need to use the 3 as virtual machines if you want to try this attack.Hope it helps!
DiegoDiego Pérez
ModeratorHi!
Can you try to store the credentials in Internet Explorer? And try to run lazagne as:lazagne.exe all
Let me know how it goes!
DiegoDiego Pérez
ModeratorHi!
Cool you got it!
DiegoDiego Pérez
ModeratorHi Peter!
Which exact version of python interpreter did you installed? I have tried it in 2.7.18 and it worked without issues, so maybe you can try to delete the current version and install the one I mentioned.Let me know how it goes!
DiegoDiego Pérez
ModeratorHi Z!
I can’t see it in your photos but did you run ./fluxion.sh with the -i option?
Let me know.
DiegoDiego Pérez
ModeratorHi Arminius!
Your second link is not working.Can you show the results of:
ifconfig and route -n in kali and metasploitable
ipconfig in windows
Can you share a screenshot of the Network settings used in VirtualBox for all the machines?Thanks!
DiegoDiego Pérez
ModeratorHi!
Which was th command used to run lazagne? is it the latest version? which browser did you use to store the credentials?Let me know.
DiegoDiego Pérez
ModeratorHi!
Cool you got it!
Diego- AuthorPosts