Jump to content

Search the Community

Showing results for tags 'metasploit'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 9 results

  1. I'm pretty new to Metasploit but I have what appears to be a successful shell/session created however there is no prompt (normal commands return nothing) and I see that it shows only the default route (0.0.0.0:0) between my computer and the target. I did input my LHOST though it is a staged bind shell payload (inline payload shells produce the same result and meterpreter payloads don't work). Is it possible to obtain a full interactive shell? =======================================================================================================================================
  2. Host OS: Windows 10 Pineapple Nano v. 2.7.0 VirtualBox v. 6.1.6 Kali Linux v. 2020.2 **Forward: I've been doing all this on my own private router, WiFi signal, computer, etc. Nothing illegal. Just trying to learn a new skill.** So I've been able to successfully capture a 4-way handshake (Both .CAP and.PCAP) using either the Pineapple Nano or Kali Linux> Successfully cracked the password of the WiFi AP using www.GPUHASH.me> And I can log into the "client" AP. I just don't know where to go from here and feel pretty dumb. How do I actually exploit the
  3. Hello guys, Before I start, I want to say that I looked on all the forums for a solution and tried multiple options until I started writing this. I have tried to make an exploit for Android. Everything works fine until I open the apk on my test phone where after I installed it by bypassing the security restrictions, it doesn't do anything. On msf it doesn't show that it's connected to a device. As well, regardless if I stop the exploit, kill it and remove it, the server is still up and contains the file. I need a solution since I believe that this is caused b
  4. Hi Guys need help with this problem im having so im trying to hack my samsung s7 edge with a meterpreter apk and when i install and open it on my phone nothing happens it still says started reverse_TCP handler on my ip address :4444 any fixes? sincerely, Kyran
  5. How do I actually increase the dimensions of the pictures while doing webcam stream and snap? I'm currently using on my android, and while I can increase the quality to 100, my pictures come very small. It's possible to take as the size of the camera of the cellphone, or at least increase it a little bit?
  6. Hello people....... tried to get a connection vie Meterpreter to mi Pineapple nano, but all the fuck i h get is this msf5 exploit(multi/handler) > show options Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, pr
  7. v0dka

    Payload timeout

    Hi. I met a problem recently : I have installed metasploit and it runs well in SSH. But when I tried to run it in in a payload, just like: /root/metasploit-framework/msfconsole & It will run for a while, I can find it with cmd "ps -aux | grep 'msfconsole' ". But it then disappeared! As it takes a long time for msf to startup. so I think maybe the payload has a timeout. I'm not sure what's wrong with it. Thanks in advance
  8. Hello! I would like to ask if there is any way to use meterpreter directly from the bash bunny metasploit over wan after i infected a machine. And also if S. E. T is working :) Thanks in advance :)
  9. Hi guys, Anyone know how I can get shell access in using any modern browsers (Chrome, IE, Firefox, etc. so that the browser doesn't bitch at me and say I need to upgrade to latest browser version) by browsing to a URL? I tried putting a malicious iframe on my evil portal and using these exploits: auxiliary/server/browser_autopwn, auxiliary/server/browser_autopwn2. I even tried downgrading to IE 8 then using the exploit: exploit/windows/browser/ms10_002_aurora. But so far I got nothing. :( No meterpreter sessions. This is for a presentation, by the way. Any of you gu
×
×
  • Create New...