Following Scenario: Your targets computer is unlocked and you're alone, but you didn't prepare a payload or a backdoor file. Is there any way to connect the targets computer to mine using the command prompt? Sincerely Archie
Archibald Tuttle's Popular Posts
Hello there, I'd like to use NetHunter on my Android Device but I don't want to buy a Nexus for that reason. Is there any way to install it on a Motorola Moto G (1. Generation Android5.0.2)? It's running almost pure Android that's why I'm asking Many Thanks Archie
Hello dear community, I recently downloaded and installed snort because I wanted to scan my network for keywords (OTW Tutorial fitted exactly). The problem is, every time I run snort -vde -c /etc/snort/snort.conf, snort doesn't seem to search for the keywords I set (for exam ...more
Hello everyone, I got acces to my target system (Windows 8.1). The main reason was to record audio and that's why I ran the soundrecorder script. The problem is that there's no audio file in the concerned folder. Any ideas how to fix this?
Dear Community, I finally succeeded and gained remote access to a target computer. I wanted to use it as a bug. My problem is, that every time i want to record audio longer than 10 seconds, the operation times out. Any Solutions or suggestions? Thanks Archie
I got into my victims terminal via netcat but away from simple things like "say" "open" or "cd/ls/dir" I have no idea what useful commands I could use. Any ideas or suggestions?
Hey there, I was looking for some good metasploit toolkits. Can anyone suggest me some?
Hi I'm a greenhorn Hacker and I just wanted to start with Armitage. It connects and shows me no error messages but after connecting nothing appears on the screen. Any help?
I searched a lot, but I didn't find any exploits for windows 8.1. Metasploit search wasn't successfull also not the exploit database. The ones I tried were terminated by the computer right as I plugged my USB stick in. Any ideas?
Sorry for posting this here bu, however,t I couldn't ask you herehttp://null-byte.wonderhowto.com/how-to/hack-like-pro-hacking-windows-xp-through-windows-8-using-adobe-flash-player-0155228/. I tried this on windows 8.1, followed the steps, but once I pressed enter in the Inte ...more
Well, I started to use metasploit and I tried to search some exploits for Mac OS X Yosemite, but there were nothing. Is the OS too safe to get hacked with metasploit or what's the problem? I really want to solve this problem, cause my victims Computer is running on OSX. Any Id ...more
Following Problem: I found many tutorials where you explain how to break into server, computer, webcams and everything else, but I didn't find anything about what you did before. How did you connect to the victim after installing Meterpreter on its Computer? I really like yo ...more