Hi My Fellow H4ck3Rs! In this Thread, I`m gonna show you how to install Metasploit Framework in TermuX. You can use it for Android to Android/Windows hacking. It is the best way to hack another android like WATCH_DOGS Style :)
i have a android phone and im wondering if i could get remote access to it with just the ip of the device and being able to look to whatsapp etc . i would like to preform actions like in a metasploit session but just without an file that needs to be installed on the device
Hi My Brothers! Wanna do some WATCH_DOGS style H4cK1nG...!!! , then you are at Right Place!.
Hello everyone, this is my first post, i'm already watching aircrack-ng doing its magic with the rockyou.txt file, but its taking too long, and most of the words that pass-by in the process aren't actually making any sense, i live in morocco and most of the pass-phrases that we use are likely to be something like 'A3E5BD93A" using only 9 characters with no strange symbols or actual meaningful words, I've tried to make my own word-lists with crunch, but i will save that as a last resort, maybe...
So last night I watch your video on how to install kali linux or re4son ons the Raspberry Pi 3 b+ and I got everything right until you putted in the command dpkg reconfigure openssh.service the I get the error rescue-ssh.target is a disabled or a static unit I looked on other forms for the command that wil help but none did, so please help.
Hello guys,I have a problem with airodump-ng. When i put this commands:
Hello Hackerz! Today I will show you how to use a tool I created to make hacking wifi easier. Make sure that the router has wps lock off and wps is on. Make sure bully and pixiewps in installed.
Have successfully created a Live USB with Kali Linux, and managed to get DV-PI's vulnerable services up and running. after a few nmap scans I am curious how to use the information gathered to exploit the system? this is my first penetration-test and I am a bit lost and do not want to get discouraged.
hello guys i have a problem and i couldn't find answer in ANY site !
Hi, I my name is Justin,and this is my first tutorial in null-byte, so please tell me if the background is distracting, or other things. Also sorry for the language in the screen, English is not my first language :p
Hello, with Kali Linux I tried to open Software & Update, but as soon as I click the process closes, writing software-properties-gtk in the terminal returns me this:
how to install parrot security step by step Step 1: Download Parrot Security
hi everyone today im go wanna show you how to install metasploitable on vmware here
hi everyone today im go wanna show you how to install parrot security on vmware workstation
Hi, I am a Kali Linux user, and I used metasploit to get access of the webcam.
i have tried multiple times to make a payload but i dont think im doing it right, everytime i create a listener in msfconsole, it doesnt work so i was wondering how exactly do you make an android payload. Should i use reverse_tcp, http or https and once created how exactly do i make a listener for this payload
I've recently downloaded qbittorrent from their official web site extracted it, but don't know which command to run in order to install it!
Hello everyone I am new to the forum and I start in computer security. For my test I installed Linux box and windows 10 professionel When I do an nmap scan I see that port 445 is open and when I'm doing In metasploit use auxiliary / scanner / smb / smbms17010 I add the rhosts then enter I find that my target of evaluation is vulnerable to this attack. When I use the following exploits: ms17010eternalblue, eternalblue_doublepulsar, and other exploits of type smb, the attack fails. Please help ...
Hi i'm a first time installer, I've made a live Kali usb stick, now it works fine when i start up the laptop, but when I select a live option to boot. It will run and then stop. It doesn't always stop at the same line(s), but this is the one with includes both (error) lines.
Can I hide my IP from my own network? I explain.
Hi, So I've been trying to use Meterpreter over WAN but unfortunately I am dead stuck at Port Forwarding. Ive read many port forwarding tutorials but no help.
Hey, I wanted to know how I can slow down my internet from my friend or DDOSsen. I did a lot of research on the internet, also about the ping of death metode (which is probably very bad) but there were a lot of unnecessary answers. Many thanks in advance!!!
so i have kali linux on a usb and i dual boot it on my mac but when i first booted it i noticed that i wasnt able to connect to wifi at all, so i bought the alfa awus036h on a recommendation and tried installing it on my mac.
How can i root my victims phone? by meterpreter or shell commands..
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Hello Guys, I am new in the Kali Linux World, i have installed Kali 2017.1 in a USB, and run it in persistence mode, i have installed "Fluxion 5.6" after 4 days of working and searching.
SUP, My fellow hackers! This time I am doing a tutorial on a tool called TRAPE, it can track and do things in the victim's device.
Help I want to see what my significant other is doing through wifi hacking. I don't know his password I do come in contact with his phone here and there ,but can't access it. Someone help me please yes he's cheating. I just need solid proof. Please don't judge I just want to know if I could hack his phone through the same wifi and how.
I use a virtual machine of kali in my windows laptop and when I try to deauthenticate all users in a network I normaly deauthenticate only myself or few others but never ALL.
can I just use the databases without key, to hack the conversations????
hey guys i was thinking about create a phising mail with a tool ( gophish , SET ..... ) and at the Use a fake domain at the end created witj evilurl but how can i use it ? use a fake domain created with a several domain ?
we all know how important is our privacy to all of us and today our provacy is on websites like Fb,twitter, or any other platform.
Hi to every one. i have searched over internet and found a way (Metasploit) to get access to an android phone via port forwarding and ip method, it gives much access (as per my little search) but the problem is i want to find out a way through which i can get access to android phone completely like i can install/uninstall apps remotely in future whenever i want. I know some of softwares are providing this facility but they are paid or have many ads into them. If anyone can help me is it good ...
Like Elliot from Mr.Robot has a chat over the terminal with its mates.
when i installed kali linux it get installed properly. But when i enter the username and password in the login page produce gray screen error .
hello guys, sorry for my bad english, i'm italian. So i use Fluxion. WifiPhisher and Airgeddon with 2 network adapter. Every time i create the fake AP the clients in the real ap are deauthenticate, but after they don't connect automatically in my fake ap. How i can fix this issue?
I am using metasploitable to learn pen testing but I ran into a problem that is most likely very simple but I don't yet understand this. I used the vsfpd backdoor exploit to connect to metasploitable. Then I disconnect. When I try to reconnect using the same exploit I get the message that the exploit ran successfully, however no shell was created. How do I reconnect to metasploitable after using an exploit on it and disconnecting?