Jump to content

AXANO

Active Members
  • Posts

    15
  • Joined

  • Last visited

Posts posted by AXANO

  1. I've been seeking online for a complete tutorial that goes from finding if a computer is vulnerable to an exploit
    to getting a meterpreter session without the use of trojans.
    The things that are missing are...


    1.the exact procedure of scanning a pc to find if it is vulnerable (and if it is possible a pc outside a local network and how is it possible to scan individual compuiters that are behind routers?)

    2. Importing a new exploit that isnt already inside the metasploit framework.

    3. setting a backdoor without the use of the persistance command of the meterpreter.

    4. the procedure of the triggering of the exploit on the victim machine (what happens exactly?)

    any kind of info is apreciated.

  2. @digininja i respect you and your knowledges and you have proven to me that you know things but if there wasnt a way to hide yourself from the government there wouldnt be any hackers because they would all have been caught surely there is a big chance that somebody will make a mistake but we are not talking about mistakes here only about ways to really stay anonymous from the gov. and to protect all our personal data.

  3. with safe i mean to be able to chat without anybody knowing from who is the message sent and to who , so more precisely i want the origin and the destination of my messages to be undetectable , and it is for use through the internet. The main idea is connecting on a random IRC server through the TOR network with a random nick on a random channel and having the reciever connecting on that random server and channel

  4. guys,

    I ve made a payload with SET that isnt detectable by windows defender,

    I can perfectly get a meterpreter session without beign detected,

    anyway i can do most of the actions that are possible in meterpterer , but when I run the persistence command ,

    Windows Defender gives a report of a trojan Swrort.A .

    some info

    Victim pc is running windows 10 64-bit

    I am attacking localy

    the attacker is kali sana 2.0

    So the question is how can I avoid detection?

  5. So here are the facts

    i am working with kali sana trying to spoof dns with ethercap



    1.internal network
    2.I can spoof dns ===> when pinging facebook.com from victim machine i get my internal IP (192.168.1.6)
    3.but when i try to browse with edge, chrome to facebook.com it says no connection
    4.when i spoof a different url i get the index page of the server of the attacker
    5.tried to spoof dns on xp and on windows 10 same results

    how can i solve this problem and what is the cause


    Thank you in advance

×
×
  • Create New...