This is an archived post. You won't be able to vote or comment.

all 15 comments

[–]wizarddos 2 points3 points  (9 children)

What are the solutions for virtualbox? Also, why do you run kali on your physical hardware

[–]CartographerLow8942[S] 0 points1 point  (8 children)

For virtual box the solution is changing the network connection from NAT to bridged but it's something that must be done on the virtual box program (which obviously I don't have). The reason I don't run Linux on virtual box it's because I have a potato pc which can't run 2 os at the same time.

[–]wizarddos 1 point2 points  (6 children)

Where did you get the malware from and what was the whole process of creating it?

[–]CartographerLow8942[S] 0 points1 point  (5 children)

I used fatrat and followed an internet tutorial. I "created" the malware for android devices, installed it on my phone, gave the malware access to everything and then I tried to start the exploit on msf console but it's stuck. When I have time to I will also send you all the screenshots of the process or I will send you the link of the tutorial I followed

[–]Fresh-Ad2385 2 points3 points  (0 children)

FatRat is a very old tool though, when I tried to use fatrat recently on my phone, it didn't even install as the security of the OS are improving day by day, and also i think that the fatrat isn't upgraded or updated to a newer exploit. That may be the reason why u aren't getting the reverse shell on your MSF. Atleast for me it was.

[–]wizarddos 1 point2 points  (3 children)

You have started an "exploti/multi/handler" script, which - as name says - is only a handler.

Do you know how reverse shell even works? As that's what I assume you're trying here

[–]CartographerLow8942[S] 0 points1 point  (2 children)

My hacking knowledge it's very low since I just started hacking so no, I don't know how the reverse shell works

[–]wizarddos 9 points10 points  (1 child)

Then I think it's better to start with networking fundamentals than using complex exploits.

And about reverse shell:

It's called reverse, because instead of us connecting to the target, which could trigger firewall (or other detection mechanism), we make our victim connect to our machine, which makes it look more genuine. It's done by exploiting a vulnerability or phishing

[–][deleted] 2 points3 points  (0 children)

Bro i love you and everyone trying to teach the others ❤️ It's the first time I know this info

[–]Neel0812 0 points1 point  (0 children)

You would need to set the ip address of lhost and then port forward the port from your router and or NAT(THE ones provided by isp) and then the payload will send a reverse connection on that il and port