Yo, I'm trying to use the Stagefright exploit to generate a mp4 to send to the victim (A Genymotion virtual machine). https://github.com/jduck/cve-2015-1538-1/blob/master/Stagefright_CVE-2015-1538-1_Exploit.py https://github.com/jduck/cve-2015-1538-1/blob/master/Stagefright_CV ...more
Yo, I wouldn't be wrong assuming that most people nowadays use a dynamic ip. After exploiting a system, admitting that both sides (attacker and victim) reboot their machines, modems and routers, how is the attacker supposed connect back to the backdoor ?
Yo, How do hackers manage to host infected websites without getting caught by domain name registar providers ?
Is it possible to exploit without user interaction ?
Hello, I intend to host a malicious website in my own computer. Problem : I don't have the bucks to pay for a domain name. Now questions : Where to get free domain names ? Is using those risky when we want to submit a malicious website ? If I want to send to the victim a lin ...more
Everyday, it seems to me that hacking is getting harder. OSs are getting harder to exploit, and resources are hard to find. Most of the resources I stumble on are outdated. So is it really possible to exploit modern OSs ? And are there good up-to-date resources for someone wi ...more
Hola ! I was wondering what was the right path to take for someone who intends to compromise a person's computer ? It seems to me "pentesting" (I don't know what else I can call it) is pretty tricky to perform in real life against a PC since it would be hard to get someone's ...more
Hello, I'm trying to send myself a pdf file with a backdoor embedded via facebook and gmail, but everytime, they manage to detect a "virus". So I wanted to know more about the technique to bypass these sites virus detection system. Can anyone help ?
Hello, Every time I press "4) Update the Social-Engineer Toolkit", I obtain the following output : Kali or BackBox Linux not detected, manually updating.. Updating the Social-Engineer Toolkit, be patient... Performing cleanup first... fatal: Not a git repository (or any of ...more
Hello, I'm trying to use a Spear-fishing attack in SET, but I'm putting myself in the situation where the victim doesn't have email, so I want to send the infected attachment by other social medias. For this, I need to retrieve the infected file generated by SET. Where is it ...more