General Discussion

Forum Thread: How to Decrypt the Handshake Cap File ?

Hello everyone, this is my first post, i'm already watching aircrack-ng doing its magic with the rockyou.txt file, but its taking too long, and most of the words that pass-by in the process aren't actually making any sense, i live in morocco and most of the pass-phrases that we use are likely to be something like 'A3E5BD93A" using only 9 characters with no strange symbols or actual meaningful words, I've tried to make my own word-lists with crunch, but i will save that as a last resort, maybe...

Forum Thread: DV-PI Assistance?

Have successfully created a Live USB with Kali Linux, and managed to get DV-PI's vulnerable services up and running. after a few nmap scans I am curious how to use the information gathered to exploit the system? this is my first penetration-test and I am a bit lost and do not want to get discouraged.

Forum Thread: How Do I Make an Android Payload

i have tried multiple times to make a payload but i dont think im doing it right, everytime i create a listener in msfconsole, it doesnt work so i was wondering how exactly do you make an android payload. Should i use reverse_tcp, http or https and once created how exactly do i make a listener for this payload

Forum Thread: Hack Windows 10 Pro Build 10586

Hello everyone I am new to the forum and I start in computer security. For my test I installed Linux box and windows 10 professionel When I do an nmap scan I see that port 445 is open and when I'm doing In metasploit use auxiliary / scanner / smb / smbms17010 I add the rhosts then enter I find that my target of evaluation is vulnerable to this attack. When I use the following exploits: ms17010eternalblue, eternalblue_doublepulsar, and other exploits of type smb, the attack fails. Please help ...

Forum Thread: Why Is Kali Linux Stuck When Booting

Hi i'm a first time installer, I've made a live Kali usb stick, now it works fine when i start up the laptop, but when I select a live option to boot. It will run and then stop. It doesn't always stop at the same line(s), but this is the one with includes both (error) lines.

Forum Thread: Ehtools Framework by Entynetproject

Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.

Forum Thread: How to Hack Android Phone Using Same Wifi

Help I want to see what my significant other is doing through wifi hacking. I don't know his password I do come in contact with his phone here and there ,but can't access it. Someone help me please yes he's cheating. I just need solid proof. Please don't judge I just want to know if I could hack his phone through the same wifi and how.

Forum Thread: How to Get Full Access to an Android Phone Life Time

Hi to every one. i have searched over internet and found a way (Metasploit) to get access to an android phone via port forwarding and ip method, it gives much access (as per my little search) but the problem is i want to find out a way through which i can get access to android phone completely like i can install/uninstall apps remotely in future whenever i want. I know some of softwares are providing this facility but they are paid or have many ads into them. If anyone can help me is it good ...

Forum Thread: Help with Evil Twins

hello guys, sorry for my bad english, i'm italian. So i use Fluxion. WifiPhisher and Airgeddon with 2 network adapter. Every time i create the fake AP the clients in the real ap are deauthenticate, but after they don't connect automatically in my fake ap. How i can fix this issue?

Forum Thread: How to Reconnect to Previously Exploited Machine?

I am using metasploitable to learn pen testing but I ran into a problem that is most likely very simple but I don't yet understand this. I used the vsfpd backdoor exploit to connect to metasploitable. Then I disconnect. When I try to reconnect using the same exploit I get the message that the exploit ran successfully, however no shell was created. How do I reconnect to metasploitable after using an exploit on it and disconnecting?

Prev Page