Forum Replies Created
-
AuthorPosts
-
Diego PérezParticipantHi MK!
Here you can find an article that may help you:
https://hashcat.net/wiki/doku.php?id=brute_force_in_oclhashcat_plus_originalHope it helps!
Diego
Diego PérezParticipantHi!
I think the problem is related to your adapter, it has a chipset that is not working fine with linux anymore.Can you share a screenshot of the result you get after running dnsmasq?
Let me know.
Diego
Diego PérezParticipantHi Akabueze!
The problem can be in the method used for cloning the sites, have you tried with the sites included in SET?Also I have been using a tool called Nexphisher, works pretty well. Give it a try, just edit the setup script file first IT’S VERY IMPORTANT THIS STEP, so open it with leafpad and remove the line “apt-get upgrade -y”, then you can run it and it will be installed properly.
Here is the link to it:
https://github.com/htr-tech/nexphisherAlso you’ll find the instructions to use it there.
Let me know how it goes!
Diego
Diego PérezParticipantHi Tcale!
The problem here is the url used in your download and execute file, you should remove everything else in the URL after .jpg, just as you have shared the image here in the first link.Let me know how it goes!
Diego
Diego PérezParticipantHi!
So the problem is how it is executed, you have to implement a function to execute files in remote host without waiting for a result, as the current functions does. Take as an example the upload and download file, both of this functions are implemented in our code, so you’ll need to do something similar (not the same) to execute the keylogger. I have implemented it in my own backdoor, but you’ll learn a lot if you do it your self.
Try it out and let me know how it goes!
Diego
Diego PérezParticipantHi Peter!
Cool you got it!
Diego
Diego PérezParticipantHi!
Can you share a screenshot of what are you compressing in kali?
Also the result in windows please.Thanks!
Diego
Diego PérezParticipantHi!
Ok, your settings looks ok.
Can you tell me the exact model of your wireless adapter?(brand and model)
Thanks!
Diego
Diego PérezParticipantHi Tcale!
Can you share the content of your download and execute file?
Thanks!
Diego
Diego PérezParticipantHi!
Yes you hvae to use your public ip, when using VPN, as LHOST in your backdoor.
Do you want to create a backdoot using SET?
Here is an article that can help you:
https://medium.com/@Shehacks_KE/creating-a-backdoor-using-social-engineering-toolkit-set-c5ce486aab5Greetings!
Diego
Diego PérezParticipantHi Akabueze!
What’s the exact issue? Can you elaborate a bit more please?
Thanks!
Diego
Diego PérezParticipantHi!
Cool, experimenting is the best way to learn.Greetings!
Diego
Diego PérezParticipantHi!
Which is the command used for executing the keylogger in remote host?
Let me know.
Diego
Diego PérezParticipantHi!
No, the ip usen in the code injection shuold be kali’s ip, this way when your victim’s machine visited vulnweb.com it will be hooked by beef.
Let me know how it goes!
Diego
Diego PérezParticipantHi Peter!
Cool you got it!
Diego -
AuthorPosts
