Forum Replies Created
- AuthorPosts
Diego Pérez
ParticipantHi MK!
Here you can find an article that may help you:
https://hashcat.net/wiki/doku.php?id=brute_force_in_oclhashcat_plus_originalHope it helps!
DiegoDiego Pérez
ParticipantHi!
I think the problem is related to your adapter, it has a chipset that is not working fine with linux anymore.Can you share a screenshot of the result you get after running dnsmasq?
Let me know.
DiegoDiego Pérez
ParticipantHi Akabueze!
The problem can be in the method used for cloning the sites, have you tried with the sites included in SET?Also I have been using a tool called Nexphisher, works pretty well. Give it a try, just edit the setup script file first IT’S VERY IMPORTANT THIS STEP, so open it with leafpad and remove the line “apt-get upgrade -y”, then you can run it and it will be installed properly.
Here is the link to it:
https://github.com/htr-tech/nexphisherAlso you’ll find the instructions to use it there.
Let me know how it goes!
DiegoDiego Pérez
ParticipantHi Tcale!
The problem here is the url used in your download and execute file, you should remove everything else in the URL after .jpg, just as you have shared the image here in the first link.Let me know how it goes!
DiegoDiego Pérez
ParticipantHi!
So the problem is how it is executed, you have to implement a function to execute files in remote host without waiting for a result, as the current functions does. Take as an example the upload and download file, both of this functions are implemented in our code, so you’ll need to do something similar (not the same) to execute the keylogger. I have implemented it in my own backdoor, but you’ll learn a lot if you do it your self.
Try it out and let me know how it goes!
DiegoDiego Pérez
ParticipantHi Peter!
Cool you got it!
DiegoDiego Pérez
ParticipantHi!
Can you share a screenshot of what are you compressing in kali?
Also the result in windows please.Thanks!
DiegoDiego Pérez
ParticipantHi!
Ok, your settings looks ok.
Can you tell me the exact model of your wireless adapter?(brand and model)
Thanks!
DiegoDiego Pérez
ParticipantHi Tcale!
Can you share the content of your download and execute file?
Thanks!
DiegoDiego Pérez
ParticipantHi!
Yes you hvae to use your public ip, when using VPN, as LHOST in your backdoor.
Do you want to create a backdoot using SET?
Here is an article that can help you:
https://medium.com/@Shehacks_KE/creating-a-backdoor-using-social-engineering-toolkit-set-c5ce486aab5Greetings!
DiegoDiego Pérez
ParticipantHi Akabueze!
What’s the exact issue? Can you elaborate a bit more please?
Thanks!
DiegoDiego Pérez
ParticipantHi!
Cool, experimenting is the best way to learn.Greetings!
DiegoDiego Pérez
ParticipantHi!
Which is the command used for executing the keylogger in remote host?
Let me know.
DiegoDiego Pérez
ParticipantHi!
No, the ip usen in the code injection shuold be kali’s ip, this way when your victim’s machine visited vulnweb.com it will be hooked by beef.
Let me know how it goes!
DiegoDiego Pérez
ParticipantHi Peter!
Cool you got it!
Diego- AuthorPosts