Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi Sithum!
Are you still using the latest custom kali image provided by Zaid? Cause it has the needed drivers for that specific chipset. And should work out of the box.
Also you can try:– Experiment with connecting the adapter before and after Kali fully loads, and after you log in as root.
– Experiment with setting the adapter to use USB 2 and USB 3.
– Make sure you connect the adapter directly to the computer, don’t use a hub or an extension.
– And experiment with connecting the adapter to different USB ports.Hope it helps!
DiegoDiego PérezModeratorHi!
Defender is also watching outgoing connections so it may prevent it from connecting. You can try to use a common port like 80 but you won’t be able to use apache server as 2 apps can’t use the same port at the same time.
Basically bypassing AV programs is like a game of cat and mouse, so backdoors might start getting detected at some stage, then the developers release an update, this will allow you to generate undetectable backdoors, then AV programs release an update which will make backdoors detectable ……..So the main thing is to make sure that Veil or any other tool you’re using to generate the backdoor is up to date.
Here’s a few solutions to try if your backdoor is getting detected:
1. Make sure that you have the latest version of Veil, so do updated before doing use 1.
2. Experiment with different payloads, and experiment with different payload options and you should be able to bypass it.
3. Try generating a backdoor using the fat rat, empire.
4. Modify backdoor code if its in bat as shown in lecture 33.
5. Modify backdoor using a hex editor as shown in lecture 40.
6. Create your own backdoor (covered in python course).
The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them.
Hope it helps!
DiegoDiego PérezModeratorHi!
Which was the other device?
Can you share the contents of the config files?
Let me know.
DiegoDiego PérezModeratorHi!
If you already have the course then I would suggest to continue with it.
Will pass your question to Zaid.Thanks!
DiegoDiego PérezModeratorHi Zayed!
Which method are you using? Or which lecture are you on?have you tried with some other devices?
Let me know.
DiegoDiego PérezModeratorHi Akabueze!
I just installed it last week from the firefox’s addons and it’s working properly. I used to clone some sites for testing and all of them are working.
What’s the exact issue you are getting?Also I haven’t tested HTTrack, have you?
Let me know.
DiegoDiego PérezModeratorHi!
To update it just run the commands:apt update
apt install setThe developers said that the error message you are getting will dissapear with the latest update.
Let me know how it goes!
DiegoDiego PérezModeratorHi!
Thanks.
Can you disable defender and see if the conection back success?Let me know how it goes!
DiegoDiego PérezModeratorHi!
Then if you have used a different name, it’s definetively weired.
Have you tried to create a backdoor using a different language other that go? like cs for example.Let me know how it goes!
DiegoDiego PérezModeratorHi!
Where did you see it? I just checked maltego’s site and it costs $999 for classic and $1,999 XL. Both prices are per year and in dollars currency.This is will be useful if you are a private investigator or so.
Hope it helps!
DiegoDiego PérezModeratorHi Ssamv!
Ok, have you tried to use the windows virtual machine as well? Are they able to communicate?
Let me know.
DiegoDiego PérezModeratorHi!
How much time have you let it to run?If you have left it for a while and nothing happens, are you getting a limit rate warning? Or are you just trying the program?
Let me know.
DiegoDiego PérezModeratorHi!
The attack on section 4 (Captive Portals) won’t provide internet connection, just a fake login to steal credentials, so you have achieve that. The only issue here would be the apache configuration.The attack of a fake AP using fluxion will provide internet connection.
So for the appache configuration, your file looks fine, can you try to add just the first block of rules again?I mean don’t include the ones for the iphones. did you have a backup of the original file?
Let me know.
DiegoDiego PérezModeratorHi!
Can you share a screenshot of:
1. Result of ifconfig and route -n in Kali.
2. The result of ipconfig in Windows.
3. The options used for the listener and for the stager.
4. Can you share a screenshot of the Network settings used in VirtualBox for both machines.Also try to disable defender and try the attack again.
Let me know.
DiegoDiego PérezModeratorHi!
The error is complaining that the file with a same name exists in Veil’s database, can you use a different name please?Let me know how it goes!
Diego - AuthorPosts