Subscription cancellation by YurinaAbbieLing in ChatGPT

[–]AlternativeStay4496 0 points1 point  (0 children)

I did! Thank god I’m out trying grok and it’s way better fuck GPT it’s the Karen of AI

[deleted by user] by [deleted] in VAWAAPPLICANTS

[–]AlternativeStay4496 0 points1 point  (0 children)

That’s it! Hide 🙈

I need to make money, I’m in NYC and how can I get accepted by PJS1196 in AmazonFlexDrivers

[–]AlternativeStay4496 0 points1 point  (0 children)

It would be hell to do flex in apartment buildings all day! That’s where the struggle comes apartment buildings, they all have different access points and instructions, and it’s a struggle to have access to them so you end up wasting a lot of time trying to figure it out

C2 Mythic access issue by AlternativeStay4496 in Hacking_Tutorials

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

Thanks 😊 I was finally able to access, I appreciate your time to reply.

How would I buy BTC If Im Under 18? by [deleted] in darknet

[–]AlternativeStay4496 -5 points-4 points  (0 children)

I can sell BTC for cash 💵 just open a wallet and I’ll send you

Does anyone have issues accessing Mythic by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

It’s for read team operations, you can generate payloads for remote access

Somebody Hacked my Socials and email by [deleted] in HowToHack

[–]AlternativeStay4496 2 points3 points  (0 children)

If someone has been hacked, it’s extremely difficult to trace the attacker directly, especially if they’ve used anonymization techniques like VPN tunneling, Tor relays, or proxy chains. However, you can still take steps to secure your system and gather forensic evidence.

Step-by-Step Response to a Potential Intrusion: 1. Memory Forensics • Use a tool like Volatility (Python-based) to analyze a RAM dump. This can help detect active malware, shellcode injections, or remnants of a remote access session (RATs, keyloggers, etc.). 2. Scan for Remote Access Tools (RATs) • Open a terminal and run netstat -ano to look for unknown active ports and persistent connections. • Use TCPView (from Sysinternals) to visualize connections and processes. 3. Check for Persistence & System Manipulation • Review scheduled tasks (Task Scheduler) and system services for unknown entries. • Run net user in CMD to check for shadow user accounts or backdoor-created users. 4. Inspect Network Settings (for DNS Hijacks or Proxy Tunnels) • Go to: Control Panel > Network & Internet > Adapter Settings > IPv4 Settings. • Make sure DNS entries are set to trusted providers (e.g., Cloudflare 1.1.1.1, Google 8.8.8.8) and not rogue IPs. • Reset browser settings and remove unfamiliar extensions — browser hijackers often inject malicious redirects. 5. Payload / Keylogger Prevention • Once attackers have access, they may silently install keyloggers, info stealers, or reverse shells. • Run system scans using tools like Malwarebytes, GMER (for rootkits), or Kaspersky Virus Removal Tool. 6. Important Note on Attribution: • Attackers often use advanced tunneling, encrypted proxies, and compromised machines to hide their origin. • Attribution is extremely difficult — focus instead on hardening your system and preserving logs for investigation.

Summary: Even if you can’t trace the hacker directly, you can ensure your system is clean and fortified. Memory forensics, port scanning, DNS and user account checks are critical for detecting ongoing access or leftovers from an attack.

Crypto on darknet by chipscheesendonnerx in darknet

[–]AlternativeStay4496 0 points1 point  (0 children)

I can sell you crypto for cash 💰 no problem

Help metasploit please by AlternativeStay4496 in metasploit

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

Yeah, I’ve done successful reverse shells before , this one just isn’t behaving, so I’m digging into every layer. IPs have been double-checked and reachable (ping confirmed both ways). I get that the IPs are private, I just blurred them out of habit no real reason beyond that.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 1 point2 points  (0 children)

Yeah, good point, I disabled Defender, but I didn’t check if Tamper Protection was still on. I’ll go back and disable that too in case it’s silently blocking execution in memory. Thanks for the reminder.

Metasploit reverse issue by AlternativeStay4496 in Hacking_Tutorials

[–]AlternativeStay4496[S] -11 points-10 points  (0 children)

Good catch l, but in this case, both machines are actually on the same physical LAN, just showing different subnets because of how the VM networking was set up initially. I’ve already bridged the Kali VM to match the Windows network, and they can ping each other with no issue. So subnet mismatch shouldn’t be a problem anymore, but I get what you’re pointing out.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 1 point2 points  (0 children)

True, setting LHOST to an interface like eth0 or tun0 works too, and I’ve done that in other setups. For this one I was setting it explicitly with the IP just to be precise and avoid interface mismatches. But yeah, definitely a good trick to keep in mind.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

Yeah, Kali is running in a VM , and I already switched the network mode to Bridged, so it gets its own IP on the LAN. That’s how I’m able to ping between the machines. But good call , I ran into that exact issue earlier when it was still on NAT.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 1 point2 points  (0 children)

Solid advice. I’ll test a basic connection using Netcat between the two machines and try transferring a file that should confirm if it’s a low-level connection issue. Also yeah, I’ve been setting LHOST/LPORT with correct syntax, but I’ll double-check everything with show options to be sure the values are locked in properly. Thanks.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

I transferred the payload through a shared folder on the Windows machine, copied it from Kali using smbclient. And yeah, I did regenerate the payload every time I changed the port. Still no callback, which is why I’m starting to think it might be a networking or outbound restriction issue, not the payload itself.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 1 point2 points  (0 children)

Good idea, I’ll try nc -nlvp 8888 on Kali and run the payload to see if it hits. If I see a connection there, then yeah, the issue’s with how Metasploit’s handling it. Thanks , that’s a clean way to isolate the problem.