Forum Replies Created
- AuthorPosts
- Zaid SabihModerator
Hmm, this is strange, you must have missed something tiny, I can share my code with you, but before doing so do you want to just revise the program and revise the lectures to make sure you did everything like I did in the video?
Zaid SabihModeratorNone of the screenshots above are loading, please send them again.
Also can you please show us the code? and are you using the custom Kali I made for this course?Zaid SabihModeratorFor Nexpose you need a minimum of 6Gb memory assigned to Kali, if you can’t give it that much then its fine cause we won’t be using Nexpose in any of the next lectures.
Zaid SabihModeratorThat’s not possible cause the wordlist will be huge, and even if you manage to create it it’ll take years to go through the whole wordlist.
that’s the main difficulty with wordlist attacks, therefore you need to try to narrow down the possibilities by gathering info about the target, for example here in Ireland routers that start with UPC user a random password of CAPITAL LETTERS ONLY of length 8, so its much easier to cover all possibilities for these routers, you can also try the ready links in the resources of the crunch lecture, you can also try the online services, the use huge wordlists and super computers to crack your handshake, I can’t share links that ask you to pay money here but you can find loads of them if you search in google, they would only ask you to pay if they manage to crack the password for you anyway.
You can also use your GPU for cracking (if you have one), that would make the process much faster.
Finally you can rely on social engineering and use an evil twin attack to get the password, this attack does not require any cracking, basically you create a network identical to the target network, deauth clients from the target network, wait for them to connect to yours, and once they do automatically display a page for them asking them to enter the password, once they do that password will be sent to you !
Using the GPU and Evil Twin attacks are covered in my advanced network hacking course.Zaid SabihModeratorDo you mean reverse engineer it by “deconstruct it”? If so then this is not covered in the course, because it is a big topic and it’ll need a full course just on that.
Zaid SabihModeratorAre you getting this error with all commands or with just one specific command?
Zaid SabihModeratorHello Ashan,
Please just try multiple times, also try to open and you type while your file is being uploaded and load a website in the new tab for some reason that helps me force the file to be uploaded. As for use in the course on Udemy unfortunately we cannot do that because we do not Udemy, so you’ll have to buy it there if you want to access it there.Zaid SabihModeratorHello BigRed,
Does the simple Deauth attack work?As for Nexpose, how much memory and CPU did you assign to Kali?
Zaid SabihModeratorHello BigRed,
Does the simple Deauth attack work?As for Nexpose, how much memory and CPU did you assign to Kali?
Zaid SabihModeratorThanks for sharing this was actually a board that we had and we fixed it two days ago so if you download the latest custom image it should work without any problems.
Zaid SabihModeratorSo to discover vulnerabilities for all of the ones covered in this course you should test every possible method to pass data to the web server, so:
1. send data through input boxes.
2. Send data through file?var=DATA.
3. Interceptor requests using bird as shown earlier and passed data this way.Zaid SabihModeratorHello Sithum,
I’m not sure how to help here to be honest, you can include whatever you want, and sure I will follow 🙂Zaid SabihModeratorPlease enclose the username and password with “”
Zaid SabihModeratorYes you can as long as you’re the writer, I seen this in the dashboard, so its probably queued, the team will get back to you ASAP regarding it.
Zaid SabihModeratorYou’re welcome, I’m glad I could help 🙂
- AuthorPosts