Forum Replies Created
- AuthorPosts
- voidaslanParticipant
Ayy, Diego. Good to hear from you again, brother. Had a feelin’ you would come to save me. 🙂
I don’t know what the chipset in the adapter is, brother. Sorry, this is all new to me and I’m hapless when it comes to tech. If there’s a way to know what the chipset is, please let me know and I’ll look into it.
I looked on FCCID.io (https://fccid.io/2AKC6XHT-WF5B) and got a bunch of pages of info that I can’t make heads or tails of. XD
Honestly, Diego, if you can just recommend a dual-band wireless adapter that you know will work, I would really appreciate it. I don’t mind buying another adapter/the one that best works with the course when I can afford it.
Sorry for the trouble, man. If you don’t respond to this, no hard feelings. I’ll post the question again on Udemy’s Q&A in a couple of days.
Thanks, Diego.
voidaslanParticipantLol, yeah, you guys do a great job with the “skills” part, so that’s covered, but the “patience” part is what’s kicking my ass. Haha!
It’s crazy to think that Ethical Hacking goes way beyond the scope of social media. That basic stuff is really challenging for me, yet, to most, it’s close to being their first step…A little discouraging, not gonna lie. Lol.
Thank you so much for sharing those resources. I’ll likely try tryhackme.com before hackthebox.eu, since it sounds like it’s more beginner-friendly. So, thank you.
My cousin managed to get into my Snap the other day. Don’t even know how he did it, to be honest…Your boy just lost $100. (sad face)
You’ve been so generous with your feedback/help, Diego, so I’ll understand if you don’t wanna answer yet another question. BUT, if you’re willing, I would love to get your input.
Question: I’m working through the Create An Undetectable Backdoor videos in the lecture and Youtube video you were kind enough to share. I’m at the part where we use antiscan.me to see if the backdoor is detected by antivirus programs. I managed to get it past 9 out of 26 antivirus programs by modifying the SLEEP and PROCESSORS portion of the Backdoor several times/by inputting different values. Not great but I’m on the right track. What else can I adjust that will help me make the Backdoor undetectable by the remaining 17 antivirus scans on antiscan.me?
Really appreciate your advice, Diego, it’s helping me improve faster than I normally would, thank you. I’m likely too impatient to follow it thoroughly, in all honesty, because I want to hack my (smug) cousin’s Snapchat ASAP so I can be the smug douchebag for once. Haha!
Thank you again, brother, I appreciate it.
voidaslanParticipantLol, yes, I quickly realized that a week is nowhere near as long enough to learn something that others have made their passion/livelihood. It’s a little insulting of me to assume so, in fact; so, I apologize. I’m learning to appreciate what you and those in your field do with every lecture I watch from you guys’ courses.
I will try a phishing attack and keylogger, as soon as I learn what those are, exactly. Lol.
Sorry if I implied that I would do this behind his back. My cousin lives with me and Ethical Hacking is something we decided to pick up during quarantine together. Been trying to get him to learn from ZSecurity’s courses but he’s adamant about going somewhere else, for some strange reason. We both know our information (Snap, email, address, etc…cause we live together) and we have each others’ permission to hack one another for practice.
I will try to learn as much as possible about phishing attacks and keyloggers from the lectures, thank you, Diego. Hopefully he doesn’t get into my Snap before I get into his, or else I’m down another $100. Haha!
I remember Zaid saying that it’s boring to learn all this stuff if you don’t have something practical to use it on, so I’m trying to do that with this little Snapchat challenge. I think it’ll motivate me to keep going.
I’ll stop rambling and get started on phishing attacks. Thanks again, man, I appreciate you taking the time. If you have any other pieces of advise you wanna share I’m all ears/thank you.
Cheers.
voidaslanParticipantWow, Diego, dude, thank you so much for the literal list of info. I appreciate you taking the time. Truly.
If I could ask one final question, and I hope I’m not abusing your generosity…
What’s the best way to hack a social media account?
I started this Pen Testing journey on a bet. My cousin bet me I couldn’t get into his Snap in a week…Long story short, he was right and I was $200 short. But it all lead me to Zaid, you and ZSecurity. My point: I’ve bought 4 courses so far from you guys since you clearly provide quality content and I’m wondering if one of them specifically provides information on how to access a social media account, or, if it’s not too much trouble, I could ask you to tell point me in the right direction/provide a few steps.
Thanks again for taking the time, man. Your advice is golden, so, please, keep it comin!
voidaslanParticipantDiego, you’re a genius!
I neglected to set the Windows Machine Network Adapter to NetNetwork…my bad.
It works now, so, thank you; but I ran into another issue. If you don’t mind, I could use your advice.
The goal of the lecture was to test the Backdoor. Upon downloading it on my Windows Machine (both in Chrome and Microsoft Edge), both browsers flagged and deleted the file.
I tried testing the Backdoor using the No Distribute website–to see if scanners would detected it–but the website does not work anymore; ergo, I’m unable to test if the Backdoor was configured properly.
What can I do to make the Backdoor “safe” when it is downloaded on a browser via my Windows Machine?
I hope I articulated that well. Again, thank you for taking the time, brother.
- AuthorPosts