Forum Replies Created
- AuthorPosts
- glosnickParticipant
Thanks for getting back to me. I did watch the lectures again and I don’t think he fully explains why he uses 1,2,3,4,5. I understand that he uses order by to determine the number of columns in the database. So if I understand correctly it doesn’t really matter what Zaid uses in the query. So he could use A,B,C,D and E for example and would it still work? So the results displayed on the screen is the server attempting to execute our query even though 1,2,3,4,5 do not relate to the column headings, again is that correct? I’m really sorry to be a nuisance and I really do appreciate your patience with this novice ethical hacker.
Again my thanks and regards
Nick
glosnickParticipantThanks for getting back to me and oops, forgot to include the link to the snapshot, me bad!!! Anyway, great minds think alike it appears. Had already backed up the VMWare folder.
Regards
Nick
glosnickParticipantSorry I haven’t responded to your previous message in a while, I thought I had but maybe I just hadn’t sent it. It looks as though I took a snapshot for you but neglected to write a message to you. How strange! Anyway, in the snapshot you will see an option to upgrade to VMWare Workstation Pro and listed in the options you get with the upgrade is snapshots and so on. It’s somewhat vexing but such is life.
Thanks for you help and regards
Nick
glosnickParticipantI just downloaded and installed VMWare and created the virtual machines for Kali and Metasploitable again and that seems to have done the trick. I can now log into metasploitable again. However, I had a quick question about VMWare. When I looked both machines seem to be on NAT and not a NAT-network as previously in Virtualbox. Does this make a difference? And how can I set it up for a NAT-network as Zaid has done so before? I think I have to buy a pro licence to get that and things like snapshots? Is that correct?
Regards
Nick
glosnickParticipantThanks for letting me know. May I ask why you no longer support Virtualbox?
Regards
Nick
glosnickParticipantHi, I was just wondering why I hadn’t heard from you in response to my question. I was under the impression that Zaid had said that a response would be forthcoming within 15 hours and I’ve heard nothing.
Anyway, I hope you respond soon as I’m in a little pickle. I can’t seem to log into mutillidae at all beyond the security of level 1 each I try I get the filter error message even when I’m using valid credentials and I’ve no idea why. I tried deleting the history of Firefox with no success. I tried rolling back to a previous snapshot and again no joy. I tried downloading and recreating metasploitable with no joy. Then I thought I’d download your version of Kali again but found that you have changed the format and set up of the download page. I tried installing the iso file in Virtualbox but couldn’t achieve it. I got as far as the following screen shot but was then defeated. Could you please help me!!!
Regards
Nick
Screenshot of Kali installation screen:
glosnickParticipantI’m confused and somewhat vexed. I downloaded metasploitable again and set it up as described by Zaid. However, again when I changed mutillidae to security level 1, the filtering still stopped me from using what I thought were valid credentials i.e nick and 123456. I’ve no idea what I’ve done wrong and I am now frustrated. I do hope you are able to figure out my mistake.
Regards
Nick
glosnickParticipantThank you for spotting that elementary error, sigh. Such a simple thing.
Regards
Nick
glosnickParticipantI followed Zaid’s Ethical Hacking course on Udemy and I’m glad to have your support again on this course.
Thanks and regards
Nick
glosnickParticipantDammit!!!!! Such a small mistake and everything fails. I added the / slash and it worked fine. Well spotted and thank you.
Regards
Nick
glosnickParticipantFirst, thanks for getting back to me. Second I think I’ve got all the screenshots you want!
Ifconfig of Kali machine:
ifconfig of Metasploitable machine:
route -n of Kali machine:
route -n of Metasploitable machine:
Network settings of Kali VM:
Network settings of Metasploitable machine:
I think that is them all and I hope they work. Phew!!!! There must be easier ways to add images to a question in this forum!
I tried the nc command directly on the metaspoitable machine and got exactly the same response which is interesting. What is also interesting is that in the lecture about code execution vulnerabilities I was able to execute the nc command on the metaspoitable machine perfectly and it established the shell. So what do you think all this means?
Thanks for your help and regards.
Nick
glosnickParticipantIt appears the images are sort of working if you right click on them and open them in a new tab. However, whilst the URL for my screenshots are all different they have the same descriptions because I just cut and pasted the link and only changed the image name but not each description. Please bare with me as I come to grips on your system for uploading pictures.
Regards
Nick
glosnickParticipantI’m not sure if the snapshots have uploaded correctly. I don’t think they have. Could you let me know if you can’t see them and what I’ve done wrong please.
Thanks and regards
Nick
glosnickParticipantThank you that is most kind.
Regards
Nick
glosnickParticipantNice one thanks for the solution. My image was 1000×562 or there abouts so I decreased it to 500×250 initially and that worked.
Thanks again and regards
Nick
- AuthorPosts