Author Topic: SEToolkit exploits doesn't work properly ! Yelp... !!!  (Read 4482 times)

kanthalaraghu

  • Newbie
  • *
  • Posts: 5
    • View Profile
    • Tickr News
on: November 21, 2013, 12:41:37 PM
Recently i tried SEToolkit on Backbox, and i had successfully created the exploit, but when i pass that link ( I.e my Ip address http://106.123.78.335:8080 ) to others through Internet (facebook o in mail), they are unable to open the link at all.

When i tried opening that link on my PC it worked.
I want to know what i did wrong ? why isn't it working ?

Any help is appreciated.


Kanthala Raghu


weVeg

  • Hero Member
  • *****
  • Posts: 737
    • View Profile
Reply #1 on: November 21, 2013, 02:28:21 PM
may be exploit doesn't work, or payload doesn't work, also it's a reverse o bind? did you opened and forwarded your port on router? I don't think that SEToolkit exploits doesn't work properly, may be you have setting something wrong....
Again, what kind of exploit you made? If they didn't download the exploit how do you think it should work?
« Last Edit: November 21, 2013, 02:33:53 PM by weVeg »

una voce libera è sempre liberatrice
under_r00t


b4d_bl0ck

  • Sr. Member
  • ****
  • Posts: 285
    • View Profile
Reply #2 on: November 21, 2013, 03:02:13 PM
106.123.78.335  ???
LOL never seen an address like that... AFAIK an octet can assume a maximum value of 255! ;D

Also check weVeg suggestions... anyways  who are you giving this link to?

Bye!

bool secure = check_paranoia() ? true : false;


weVeg

  • Hero Member
  • *****
  • Posts: 737
    • View Profile
Reply #3 on: November 21, 2013, 05:18:20 PM
106.123.78.335  ???
LOL never seen an address like that... AFAIK an octet can assume a maximum value of 255! ;D

Also check weVeg suggestions... anyways  who are you giving this link to?

Bye!
lol indeed! I had not noticed that!

una voce libera è sempre liberatrice
under_r00t


kanthalaraghu

  • Newbie
  • *
  • Posts: 5
    • View Profile
    • Tickr News
Reply #4 on: November 22, 2013, 03:01:03 PM
may be exploit doesn't work, or payload doesn't work, also it's a reverse o bind? did you opened and forwarded your port on router? I don't think that SEToolkit exploits doesn't work properly, may be you have setting something wrong....
Again, what kind of exploit you made? If they didn't download the exploit how do you think it should work?

I used 'Credential Harvester exploit', i don't use a router so i don't need forwarded port i suppose. But in order to download the exploit the end user has to open the link right ? (which is not at all opening on their machine). Have an ideas as to where i might be wrong ?

P.s i didn't use any custom made exploit.

Kanthala Raghu


kanthalaraghu

  • Newbie
  • *
  • Posts: 5
    • View Profile
    • Tickr News
Reply #5 on: November 22, 2013, 03:03:22 PM
106.123.78.335  ???
LOL never seen an address like that... AFAIK an octet can assume a maximum value of 255! ;D

Also check weVeg suggestions... anyways  who are you giving this link to?

Bye!

Its just an example i used to mention the [IP Addr][along with port]. I was giving this link to my friends.

Kanthala Raghu


weVeg

  • Hero Member
  • *****
  • Posts: 737
    • View Profile
Reply #6 on: November 22, 2013, 03:56:46 PM
may be exploit doesn't work, or payload doesn't work, also it's a reverse o bind? did you opened and forwarded your port on router? I don't think that SEToolkit exploits doesn't work properly, may be you have setting something wrong....
Again, what kind of exploit you made? If they didn't download the exploit how do you think it should work?

I used 'Credential Harvester exploit', i don't use a router so i don't need forwarded port i suppose. But in order to download the exploit the end user has to open the link right ? (which is not at all opening on their machine). Have an ideas as to where i might be wrong ?

P.s i didn't use any custom made exploit.
Sorry I don't know that exploit, therefore I can't help you! Sorry again!

una voce libera è sempre liberatrice
under_r00t


ZEROF

  • Hero Member
  • *****
  • Posts: 1247
    • View Profile
    • Pen Tester
Reply #7 on: November 22, 2013, 05:25:17 PM
Hi,

That is what we call "he need to learn a lot". You need to learn how system was build, and then how to exploit same system. To start, learn differences between local and remote exploits. If you exploit was made for local 'only' you can't exploit external world. Remote exploits need more knowledge. You need to learn what is TCP/IP, how to open ports on your pc (like that people can actually can see your url). Learn how you can set dns or ddns to make custom urls (http://site.com/something) etc..

But in the end, i don't see why we need to help somebody who try to hack people without permission? We are not here for that.

Think before making mess in your life.

Have fun !  
« Last Edit: November 23, 2013, 02:36:52 PM by ZEROF »


Don't ask, read : http://wiki.backbox.org
or just run sudo rm -rf /*