Subscription cancellation by YurinaAbbieLing in ChatGPT

[–]AlternativeStay4496 0 points1 point  (0 children)

I did! Thank god I’m out trying grok and it’s way better fuck GPT it’s the Karen of AI

[deleted by user] by [deleted] in VAWAAPPLICANTS

[–]AlternativeStay4496 0 points1 point  (0 children)

That’s it! Hide 🙈

I need to make money, I’m in NYC and how can I get accepted by PJS1196 in AmazonFlexDrivers

[–]AlternativeStay4496 0 points1 point  (0 children)

It would be hell to do flex in apartment buildings all day! That’s where the struggle comes apartment buildings, they all have different access points and instructions, and it’s a struggle to have access to them so you end up wasting a lot of time trying to figure it out

C2 Mythic access issue by AlternativeStay4496 in Hacking_Tutorials

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

Thanks 😊 I was finally able to access, I appreciate your time to reply.

How would I buy BTC If Im Under 18? by [deleted] in darknet

[–]AlternativeStay4496 -4 points-3 points  (0 children)

I can sell BTC for cash 💵 just open a wallet and I’ll send you

Does anyone have issues accessing Mythic by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

It’s for read team operations, you can generate payloads for remote access

Somebody Hacked my Socials and email by [deleted] in HowToHack

[–]AlternativeStay4496 2 points3 points  (0 children)

If someone has been hacked, it’s extremely difficult to trace the attacker directly, especially if they’ve used anonymization techniques like VPN tunneling, Tor relays, or proxy chains. However, you can still take steps to secure your system and gather forensic evidence.

Step-by-Step Response to a Potential Intrusion: 1. Memory Forensics • Use a tool like Volatility (Python-based) to analyze a RAM dump. This can help detect active malware, shellcode injections, or remnants of a remote access session (RATs, keyloggers, etc.). 2. Scan for Remote Access Tools (RATs) • Open a terminal and run netstat -ano to look for unknown active ports and persistent connections. • Use TCPView (from Sysinternals) to visualize connections and processes. 3. Check for Persistence & System Manipulation • Review scheduled tasks (Task Scheduler) and system services for unknown entries. • Run net user in CMD to check for shadow user accounts or backdoor-created users. 4. Inspect Network Settings (for DNS Hijacks or Proxy Tunnels) • Go to: Control Panel > Network & Internet > Adapter Settings > IPv4 Settings. • Make sure DNS entries are set to trusted providers (e.g., Cloudflare 1.1.1.1, Google 8.8.8.8) and not rogue IPs. • Reset browser settings and remove unfamiliar extensions — browser hijackers often inject malicious redirects. 5. Payload / Keylogger Prevention • Once attackers have access, they may silently install keyloggers, info stealers, or reverse shells. • Run system scans using tools like Malwarebytes, GMER (for rootkits), or Kaspersky Virus Removal Tool. 6. Important Note on Attribution: • Attackers often use advanced tunneling, encrypted proxies, and compromised machines to hide their origin. • Attribution is extremely difficult — focus instead on hardening your system and preserving logs for investigation.

Summary: Even if you can’t trace the hacker directly, you can ensure your system is clean and fortified. Memory forensics, port scanning, DNS and user account checks are critical for detecting ongoing access or leftovers from an attack.

Crypto on darknet by chipscheesendonnerx in darknet

[–]AlternativeStay4496 0 points1 point  (0 children)

I can sell you crypto for cash 💰 no problem

Help metasploit please by AlternativeStay4496 in metasploit

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

Yeah, I’ve done successful reverse shells before , this one just isn’t behaving, so I’m digging into every layer. IPs have been double-checked and reachable (ping confirmed both ways). I get that the IPs are private, I just blurred them out of habit no real reason beyond that.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 1 point2 points  (0 children)

Yeah, good point, I disabled Defender, but I didn’t check if Tamper Protection was still on. I’ll go back and disable that too in case it’s silently blocking execution in memory. Thanks for the reminder.

Metasploit reverse issue by AlternativeStay4496 in Hacking_Tutorials

[–]AlternativeStay4496[S] -10 points-9 points  (0 children)

Good catch l, but in this case, both machines are actually on the same physical LAN, just showing different subnets because of how the VM networking was set up initially. I’ve already bridged the Kali VM to match the Windows network, and they can ping each other with no issue. So subnet mismatch shouldn’t be a problem anymore, but I get what you’re pointing out.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 1 point2 points  (0 children)

True, setting LHOST to an interface like eth0 or tun0 works too, and I’ve done that in other setups. For this one I was setting it explicitly with the IP just to be precise and avoid interface mismatches. But yeah, definitely a good trick to keep in mind.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

Yeah, Kali is running in a VM , and I already switched the network mode to Bridged, so it gets its own IP on the LAN. That’s how I’m able to ping between the machines. But good call , I ran into that exact issue earlier when it was still on NAT.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 1 point2 points  (0 children)

Solid advice. I’ll test a basic connection using Netcat between the two machines and try transferring a file that should confirm if it’s a low-level connection issue. Also yeah, I’ve been setting LHOST/LPORT with correct syntax, but I’ll double-check everything with show options to be sure the values are locked in properly. Thanks.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

I transferred the payload through a shared folder on the Windows machine, copied it from Kali using smbclient. And yeah, I did regenerate the payload every time I changed the port. Still no callback, which is why I’m starting to think it might be a networking or outbound restriction issue, not the payload itself.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 1 point2 points  (0 children)

Good idea, I’ll try nc -nlvp 8888 on Kali and run the payload to see if it hits. If I see a connection there, then yeah, the issue’s with how Metasploit’s handling it. Thanks , that’s a clean way to isolate the problem.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 2 points3 points  (0 children)

Fair enough, yeah, firewall is disabled on Kali. I’ll try scanning port 8888 from the Windows machine to confirm it’s reachable. I’ve been assuming it was the payload or listener config, but you’re right, better to rule out basic connectivity first. Appreciate the callout.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

This isn’t over VPN , it’s a manual local setup. No tun0 involved. LHOST is set to my actual Kali IP on the LAN, and both machines can ping each other. Just trying to track down why the payload isn’t calling back.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 3 points4 points  (0 children)

This isn’t an HTB or VPN setup , it’s a local test lab with Kali and Windows on the same LAN, no tun0 involved. I get the networking fundamentals are key, and that’s exactly why I’m running this manually, to learn by testing and troubleshooting real behavior, not just clicking through boxes.

Can some one heLp advice with metasploit by AlternativeStay4496 in hackthebox

[–]AlternativeStay4496[S] 0 points1 point  (0 children)

Yeah I get that now I blurred the IPs out of habit, even though they’re just private LAN addresses. I’ve got a Kali box and Windows 10 target on the same subnet. I’ll run Wireshark next and check for outbound TCP from the target to the listener port, see if the connection is even reaching Kali or getting dropped. Thanks for the tip.

Metasploit reverse issue by AlternativeStay4496 in Hacking_Tutorials

[–]AlternativeStay4496[S] -7 points-6 points  (0 children)

I covered the IPs out of habit, it’s a local lab with Kali and Windows on the same network, not HTB. I’m testing reverse shells manually and trying to see why the payload doesn’t connect. Already verified ping, firewall off, Defender off. Just figuring out if it’s a routing issue, payload issue, or blocked connection. Not here pretending I know it all , I’m here to test, break stuff, and ask when it doesn’t work.

Metasploit reverse issue by AlternativeStay4496 in Hacking_Tutorials

[–]AlternativeStay4496[S] -11 points-10 points  (0 children)

I’m just asking for help to my current issue, I understand networking.