So, you wrote windows. If I want to do this for an iphone, what should I write? I tries IOS and didnt work. Guys im starting to do this so i dont have a clue. thanks
Professor K, Thank you for sharing this. your content is easy to follow and understand which is something I can't say about my own professor sadly. Awesome content!
Start by troubleshooting connectivity. Are you and the target seeing each other? Using the same type of Virtulabox networking? Did you follow the lab to the letter? Skip one step or requirement and the lab will not work. Just keep trying.
Once I enter the command at 3:32 it will just say permission denied and idk what to do about it. I tried it on a kali VM then tried a laptop with kali and they both showed the same issue. Does anybody know what I could do about it?
Well no one will teach you the exact method even though if someone will show you something which is working , either it will work on local network or it will work for limited time , if you really need completely undetectable method even on wide area network then i am here , i decided to teach such things as i have learned them from experience.
You would need a public facing web server to host the payload. Ngrok will work if you have a paid account. I just uploaded a video on deploying a payload over the WAN.
It does not allow you to perform actions. . . when using screenshot, it gives me this error: [-] No screenshot data was returned. [-] With Android, the screenshot command can only capture the host application. If this payload is hosted in an app without a user interface (default behavior), it cannot take screenshots at all.
It is not designed for use with an android. For an android the package would have to be a PSK type file. No one has been able to get the attack to work outside of a lab environment for andriods. Watch the android videos on TH-cam. The deliver the payload but they never show the attack actually works.
When dealing with a reverse trojan, specifying 'rhost' is unnecessary as the attacker's location is unknown, leaving all devices vulnerable to attack. Unlike a direct trojan, a reverse trojan prompts the target PC to initiate a connection with the attacker's PC. For a deeper understanding, researching both direct and reverse trojans will clarify the concept.
When your payload fails, always suspect the networking layer. The OS is not going to fix an issue if you fat finger the syntax. Secondly, remember that we are using a pristine lab enviroment. We have a target that is vulnerable by design. You won't find that in the wild. When llooking to exploit a vulberability in the wild, 80% or more the exploits you try will probably fail. If you have issues with your lab enviroment, check your syntax.
So, you wrote windows. If I want to do this for an iphone, what should I write? I tries IOS and didnt work. Guys im starting to do this so i dont have a clue. thanks
This is honestly one of the best videos on this subject. Thank you
Professor K, Thank you for sharing this. your content is easy to follow and understand which is something I can't say about my own professor sadly. Awesome content!
It shows no such file or directory 4:22
Please i don't receive any connection in my metasploit framework after executing tha payload on my target machine. How do i fix this ?
Start by troubleshooting connectivity. Are you and the target seeing each other? Using the same type of Virtulabox networking? Did you follow the lab to the letter? Skip one step or requirement and the lab will not work. Just keep trying.
probably the best video ive ever seen
Once I enter the command at 3:32 it will just say permission denied and idk what to do about it. I tried it on a kali VM then tried a laptop with kali and they both showed the same issue. Does anybody know what I could do about it?
Note that I am logged on as root. If you are logged on as Kali, you will first need to add sudo before typing in the command.
Well no one will teach you the exact method even though if someone will show you something which is working , either it will work on local network or it will work for limited time , if you really need completely undetectable method even on wide area network then i am here , i decided to teach such things as i have learned them from experience.
Can you teach me
Please teach me
Teach me
You also have to describe the purpose first
@@TraderNick-og2wd please teach me the purpose is that they stole my computer and I still remember it's ip address 😢
This a great overview friend, can you make a tutorial in how attacking a computer through over the internet with msfvenom.
You would need a public facing web server to host the payload. Ngrok will work if you have a paid account. I just uploaded a video on deploying a payload over the WAN.
Sir, please tell me how can I solve the error ", Unloadable payload : android/meterpreter/reverse _tcp" tell me step by step.
Bro ip error in Android phone 😢
No kidding
Anybody know why I am unable to find the web server on my target pc
It does not allow you to perform actions. . . when using screenshot, it gives me this error:
[-] No screenshot data was returned.
[-] With Android, the screenshot command can only capture the host application. If this payload is hosted in an app without a user interface (default behavior), it cannot take screenshots at all.
It is not designed for use with an android. For an android the package would have to be a PSK type file. No one has been able to get the attack to work outside of a lab environment for andriods. Watch the android videos on TH-cam. The deliver the payload but they never show the attack actually works.
getting a segfault any idea?
It is working bro!
When I saw this same excersise in the class wasn't able to follow the teacher, now with this video I understand the hole idea. Thanks!
Excellent ! Still works. Thank you #!
You don't set RHOST ? for target ip address you use lhost and lport only ?
When dealing with a reverse trojan, specifying 'rhost' is unnecessary as the attacker's location is unknown, leaving all devices vulnerable to attack. Unlike a direct trojan, a reverse trojan prompts the target PC to initiate a connection with the attacker's PC. For a deeper understanding, researching both direct and reverse trojans will clarify the concept.
Thanks a lot Professor , amazing and the best.
Good shi unc
They never run in linux
thanks so much
Thank you!
Thanks Bud
❤❤❤❤
Thanks a lot! Very useful video
I keep getting error: unloadable payload
When your payload fails, always suspect the networking layer. The OS is not going to fix an issue if you fat finger the syntax. Secondly, remember that we are using a pristine lab enviroment. We have a target that is vulnerable by design. You won't find that in the wild.
When llooking to exploit a vulberability in the wild, 80% or more the exploits you try will probably fail.
If you have issues with your lab enviroment, check your syntax.
This is so well made. Thank you!
Thanks lad. You are the best.
Thank you! I appreciate your detailed explanation!!