Jump to content


  • Posts

  • Joined

  • Last visited

Recent Profile Visitors

430 profile views

shimsam's Achievements


Newbie (1/14)

  1. Got a question im wondering about. Lest say i plug a Turtle on an Enterprise Network. The kind that have Active Directory and Cisco Routers, That filter devices by Mac address and not allowing machines that are not approved to connect and set off Unwanted Alarms. Will a Turtle survive or become Turtle soup?! I didn't undertood exactly the way it work. Does it have its own nic to get an ip and create vpn or share the ip of the machine and create vpn with that machine. In an enterprise Network its better to use 3G Turtle right? If i don't have outside network or its filtered. If the Turtle SD does have a nic and wont work(get blocked).
  2. Make my kali linux virtual machine connect to the vps that will run vpn server. I cant have my kali machine have my real ip, for obvious reasons. And i cant use vpn service, cause i wont have a dedicated ip address. I'll have the same ip some of the other users have, and i wont be able to accept reverse connections from targets. So i want to use vps for two reasons. 1. Hide my real ip. 2. Have a dedicated ip address. BTW i know PureVPN have a dedicated ip service, but not interested for a reason.
  3. Hi.. What i need is a machine with metasploit and its own IP address to accept reverse connections from machines. I cant use the cheap VPS services, cause for metasploit you need a minimum of 4gig of memory and 2Ghz cpu i believe. And if i buy expensive vps, some might ban me if they will think im using metasploit or some hacking tool. And i'll need to install all the stuff that i need on it, in kali all the goodies are already installed :) So.. I thought to my self.. What if i buy a cheap vps and use it to install VPN like darren do in one of the episodes. And have my kali linux connect to that vpn, and wait for connections. Will that work for me? I will be in a lan. I wont have an external ip address cause its vpn. But will i still be able to get connections from the machines that i sent the metasploit payloads? Or will it need some configurations done on it?
  4. Thanks for the help.. Yea i know i can use win cmd to gather info.. But if i already have the ability to drop exe file on the machine and have hem run it, i rather it will be a payload that will give me access to everything including to transfer files. Thanks for vid i'll watch it.. I found a C source code for a Reverse TCP Shell that work with Metasploit, but i dont understand C enough to change it to make it FUD. Maybe using the Hex editing like in the video.
  5. Hi.. First post. Hope i dont break any rules.. I was playing around with Metasploit, and i wanted to get my hands on way to avoid AV. So i trid cryptes and they maybe good but not great. I saw a video ‪"DerbyCon 3 0 3202 Antivirus Evasion Lessons Learned Thelightcosine"‬‏. I didn't just skipped to the end to get my answers which is how can i get my payloads FUD. Cause i enjoyed the video. Well.. So i understood it was or paying 5000$ a year for metasploit pro and get my hands on Dynamic Payloads , or learn to code and make myself my own reverse tcp script that will be FUD . But i dont have the money ot the skillz . So i gave it up. No im joking.. I found a python script online. Its a server script, that doing the lisening to the port and client script thats making the reverse tcp connection. Its working and all but there is no point in just having connection to windows command line. Metasploit have all those goodies that i can use... But the problem is that when i run it(client script), i cant have it connect back to metasploid, only to the python "server" script. BTW i can have it connect to netcat but the connection allso break when i run a command like "cd c:\" I looked at the code and tried figuring out why, but the only reason i can think of is that netcat and metasploit are supposed to be used with there own scripts. But i hope there is way.. is there???
  • Create New...