I am using Kali in a VM machine. Whenever I create a x86 powershell injection payload and use it on same Actual machine it works. Though when I take this payload out on another machine and run the .bat file it doesn't start any session. How do I solve this. PS: I use SET -> Alphanumeric powershell option for this.
I am thrilled to see how many people are interested participating in a CTF event. To make these as fun as possible its going to take a couple of organizers to help me come up with challenges as well as set up the environments. So this post is for those who want to be a part of that team. The drawback is that being on this team disqualifies you from participating, but it will make you a referee of sorts.
I am using my desktop at another location to try and get persistence working. I started the meterpreter session, ran the persistence, it installed, successfully, said something about installing to the registry and stuff and then took me back to meterpreter.
Hi guys...I conduct passive recon on target using Netcraft ..I found the ip address which i cross check with multiple online tools.The problem is online tools as well as Netcraft gave me different ip address of the same target....which one do i take ??please guide me regarding this
Hello everyone! I hope you are having a great day so far. Today, instead of caring about networks we are going to talk about subnetting based on host requirements as promised in my first article about subnetting. Just like in the previous articles we will jump right into the examples because that's the best way to learn.
when writing custom shells say like in python is there still a need to port forward when using these shells over the WAN or is there a way around this like say using no-ip??
Welcome back everyone! It's been quite a while hasn't it? Today we're going to kick off the second part of the Python training series by introducing modules. We'll start off by explaining what a module is and we'll give an example. So, let's get started!
This started as a very unofficial set up while on the IRC channel and there was some interest in holding a capture the flag event. I wanted to post and see if there was both enough interest, and to make sure it was carried out in a legal and null-byte compliant way. If you have interest in participating or want to make me aware of any necessary rules or precautions I need to take please send me a PM.
My Huawei e303f data card has been infected with a trojan. I don't know how to remove it? AVs doesn't find it on while installed. lately i tried to install it to another laptop baidu av found it, yet av didn't remove it.
It's been a while since I wrote up an article for this series but I did say that I'd be covering some WinAPI. So if you're interested in programming for the Windows platform, hop aboard and follow along.
Last week, the U.S. Justice Department issued criminal indictments against seven Iranian hackers. These hackers, working for private companies in Iran, are accused of orchestrating DDoS attacks against U.S. financial institutions from 2011-2013 as well as intruding into the control panel of a small dam in Rye, New York. It is thought that these attacks were a response to the U.S. tightening financial restrictions on Iran during those years and the NSA-based Stuxnet attack on their uranium...
I was trying out the credentials harvester method with site clone on SET on Kali 2016.It's working when I gave my pc ip ,but only in the same network.Next, I tried with public ip and port forwarded port 80 to my pc ip.I am using a router with a broadband which is providing me static ip (but public ip changes with each logout & login).It now doesn't work on this network also (and not elsewhere also).
I have an old pentium-4 pc justing sitting in the closet , its running Windows XP and I don't remember the password. I know DreamPackPL will help me obtain the password, I want to know if I can use Konboot???
Although there has been much speculation about how much damage could be done if hackers were to take control of a country's SCADA systems, there have been few examples - until a few months ago, with the power outage in Ukraine caused by hackers.
I was trying to perform spearphising by sending a hoax website link and also attaching a payload or trojan. But gmail and ymail detect them as virus. My main intension is to attach a attachment of trojan .
Ok what i wanted to do it first to hack the victim's system next to upload there a file written in python run it and then i will be able to reconnect to the victim with shell now i have some photos to show you what i did:
does anyone one no how to root a router a home router that runs busybox with read only privileges?? how do I go from read only to root?? i no you would have to get root exploit on there, but I don't understand how? i mean wget but than i would have to compile it which seems like its not possible to do....or how to nano so I can just write my own shelll??? i don't understand how to this point???so i guess my question is how to root a router??
I am using a veil evasion exploit that is embedded inside a Excel document, and is not detected by AV. I have tested it myself on different WAN computers(windows only) and it has worked perfectly, but now I tried to execute on on another computer(the victim a friend, knowingly doing it) but I asked him not to tell me if he has a MAC or Windows Comptuer. If it worked on windows before with WAN computers, can I assume since it is stuck on the sending stage that the exploit is not compatible and...
As we all know, Hollywood has granted us with a realistic view on how to be super 1337 h4ck3rz, but one common hack we always see are anonymous calling, with the bonus of a deep voice changer so it sound like the scary trash can monsters we've all grown to fear.
hey guys! I need help with setting up media streaming raspberry pi with TV. Is it possible to watch live stream from www.leisertv.com with raspberry. Or is it possible to extract streaming files from that site (i'am member of the site)
when i tried to install veil-evasion everything went right except the last line cant download go they say i have to copy something to the file /etc/apt (source file) i dont know what i looked on google but nothing worked i dont know what to do pls help who understands...
Hi the title kind of explains my question? I don't really understand and I haven't been able to find good info if any at all on google about from going to a compromise home router to compormising all systems on the network.....what are the steps in making this possible? I know I can send out arp request from the router some how and figure out what systems are connected to the the router, but they would be inside LAN so how would I port scan them? and how do I pivot from the router to the other...
if i have a portforwarding vpn can I use it for metasploit over wan or anything else over like connecting to a php shell??? or do I still need a router to portforward????
Hello everyone! How's subnetting going? Did you practice a lot? I hope you did, but even if you didn't we will go through some more examples so you can be feeling confident after reading this article. It's all about that bad boy binary!
i have a script writing in python it is script that pass AVG and reconnect to victim system in any time but its bind shell i dont know how tonstart and reconnect to his system last line i dont know when tonstart.. (i look on google but i did not find the information i nees so i comeing to u)
Greetings security enthusiasts, for the longest time I have been pondering what I could write about. While most of you know how to act, some of the newcomers could use a few pointers.
Hai friends is their anuway I can bypass sophos firewall which is currently used in my college.. They blocked everything, sometimes even google.. It's terrible...