Forum Replies Created
- AuthorPosts
- NameParticipant
Hi, I think the error comment on the bottom of the previous screenshot ‘/var /lib/veil/output/source/rev_tcp_8080.exe.go:9: binary redeclared as imported package name previous declaration at /var/lib/veil/output/source/rev_tcp_8080.exe.go:3’ is stating regarding the result you’ve mentioned – the duplicate files. Am I right?
I tried generating the file with numerous different names, but the system still reports the same error.
How can I handle this error?
Thanks.NameParticipantHi, Diego. I also tried appending the extension on the output file, just as you recommended, but it still shows the same result. You can check the screenshot here.
Thanks.NameParticipantHi, Diego. I’m not sure why the error is occurring, but the system reports that it’s unable to create an output file, even though it can save the Source code and the Metasploit Resource file.
You can view the screenshots of the errors here. I attempted both for port 8080 and 443.
Thanks.
NameParticipantHi, Diego. I wasn’t able to continue ethical hacking lessons for a while due to school assignments to complete. Here are the results of the attempts that you previously suggested to try (they both didn’t work.), with the screenshot of the result of the route -n in Kali. Thanks.
NameParticipantHi, here are the screenshots of the results you’ve asked: you can check in this document. Thanks.
NameParticipantHi, it doesn’t seem that the backdoor generated has problems. However, I think this is because the Windows virus detector automatically detects the backdoor file as a threat and prevents installing it, even though I force it to run the file. After I click to run the file, Windows recognizes it and automatically deletes it. Because the file isn’t launched fully on my Windows virtual machine, the results of the target computer are not showing.
I tried antivirus scans on nodistribute and antiscan, but it appears on nodistribute that ‘either the file is empty or there’s a problem in the file.’ Nodistribute doesn’t seem to work on my computer. Antiscan states that the file with this format can’t be scanned. Only the ones that are ‘transformed,’ such as, to a Word document or a PDF, can be scanned. Are there any other antivirus scan methods?
If the backdoor I generated gets detected by most antivirus scan programs, how can I modify it to be undetectable? In the case of Veil, I’ve learned in the lesson that ‘PROCESSORS’ and ‘SLEEP’ can be changed, but I’m not sure what values to change to. Also, is it okay to set LPORT to a value that’s different from 80 or 8080? (80 and 8080 are the port numbers that most internet servers are using, right?) Are there ways to modify backdoors that are generated via TheFatRat, too?
Thanks.
NameParticipantNow it’s working fine. I can view the apache server when I type my IP address in my Windows virtual machine. Thanks.
NameParticipantThank you so much! Veil successfully launched.
NameParticipantOk, thanks!
NameParticipantOops, sorry. I’ve updated the sharing options; you can view the photos now.
NameParticipantHi, Diego. Here are the screenshots of kali and windows:
Kali: https://drive.google.com/file/d/1tx5lXue1ZYrm-IbyE8oxk9IGjt_n-QXR/view
Windows: https://drive.google.com/file/d/1ltmHSmXu0AjmVtP3m_lKGqMc7YLSEVrw/viewAlso, can I know the difference between ‘ifconfig/ipconfig’ and ‘route -n/arp -a’ commands? Thanks.
NameParticipantHere’s the link to the image: https://tinyurl.com/ydguuwsb
Also, when nodistribute scans are not functioning, is there an alternative method for it? Thanks.
NameParticipantHi, can you view the replied comment below? After I made a reply, it suddenly disappeared. If you can’t, please let me know via email. Thanks.
- AuthorPosts