Hi. OMG your video is Amazing. I have a problem i hope you can help me or somebody from the audience. When i run the command in the target I can see the connection established but after a few seconds the connection drops down and it says ' Zombie 0: Timed out' what do you guys think is the problem? Thanks
this was so nice and educative learning and practicing along side, but i noticed my connection doesn't last thoe, i connected to my windows 11 machine. how do i sustain connection for a longer time.
Great Explaination sir ! but there is slight problem with the tool i installed this on my kali machine and while using it there are certain commands that were not working correctly like while using the (use stage ) it was showing no module available but when i entered the full path it worked similarly with the use implant i did have to enter the whole path of the module from this video please help me with it as if i was using this without viewing the video how i am supposed to know the path of the module😅
Just make sure your machine is up-to-date so I would do an update and an upgrade just to make sure everything is up to par. And thank you for the comment. I really appreciate it.
Great video but I have one problem: I can only connect to the Pc I am running a VM on. When I try to connect to my other PC the command simply opens a txt file.
Your videos are very ❤ good brother / what to do in order to come in cyber security, can you explain in detail, because I am new in this line, where should I start, what to do and what not
I need help with something else! Someone has hacked me and can get pass vpns. Is there a video you have or can make or is there any commands to block out hackers? Thanks! Love your video btw!
Hey man I've been having a problem no one has been able to help and wondering if you can help, when I run the command on tbe target computer it opens a white box and doesn't give me a zombie
I would just make sure there’s nothing that blocking it on the Client side. And reboot the service to make sure there’s nothing running that’s causing problems. That would be my recommendation.
Koadic remote access works only if the target computer is within the same network?? If koadic works this way, then it is a tool that works only within an internal network and not an internal network connection with an external network computer.
Well the only way will be to test it i guess :P :P. Please note gaining access to someones computer or IT hardware without their explicit acknowledgement is illegal test it on your own hardware that you own and have full access wright's.
Please test on your virtual environment that you have access to. Remember these videos are for educational purposes and it’s all tested on your own equipment unless you have explicit permission.
After you get shell on the victim ,is ther a possible way to excute a man.in.the.middel attack on their internet router after ? My question is confusing and probably stupid but can you own the victims wifi as a stage 2 mission if you have remote access to the computer that is connected to the target wifi ,and if the answear is yes ,explain how ? My immagination tells me that i need my kali physically connected to that wifi but i dont know .
What if the target user isn’t an admin and can’t run cmd or bat files as admin, can you include some steps for privilege escalation with this tool or does that require a separate tool
What if victim don't implement our url to their cmd ....then how he will become our zombie?Or Is there any other tool that remotely give victim cmd access to us?
Itll probably work on older OS computers... try this with a laptop thats protected with a antivirus protection installed... thats what i call hacking... breaching through protected systems!!
Can not get it to work have been Fin around for mount and nothing don't work. But far enough I dont have #youtubeprivilege so it will never work for me just saying
Video is awesome but , most important is how and what tool do you use to sent it to the victim ???? That's is what really critical part of the how process and you just literally decided to not explain it or give a clear example of how is done, that make your youtue video presentation very useless and weak to be honest. It should be very clear and precise from the beging to the end throughout the entire process of the use of this remote control tool on Kali linux, with out leaving the most important part in the process and the is de deployment of payload or script to the victim's computer.
hey i have a quick question, what do i need to do if my zombie instantly gets timed out and the status is dead? thank you
This is always done inside a network but to be done from outside is different.
Hi. OMG your video is Amazing. I have a problem i hope you can help me or somebody from the audience. When i run the command in the target I can see the connection established but after a few seconds the connection drops down and it says ' Zombie 0: Timed out' what do you guys think is the problem? Thanks
this was so nice and educative learning and practicing along side, but i noticed my connection doesn't last thoe, i connected to my windows 11 machine. how do i sustain connection for a longer time.
I first saw it on the great Hacker Loi channel, and now I'm here. Nice. :3
Can someone help mě please?
If i use the cmd command it open a white file and nothing is showing if i type zombies in Kali linux
is there a way you can remove the IP address from the password box?
Thanks for sharing, Pat. As always, a pleasure watching...
My pleasure! Thanks for watching
please make a video about how to remote access pc with koadic over the internet please
Tks 4 sharing :) but what about the antivirus...
Great Explaination sir !
but there is slight problem with the tool i installed this on my kali machine and while using it there are certain commands that were not working correctly like while using the (use stage ) it was showing no module available but when i entered the full path it worked similarly with the use implant i did have to enter the whole path of the module from this video please help me with it as if i was using this without viewing the video how i am supposed to know the path of the module😅
Just make sure your machine is up-to-date so I would do an update and an upgrade just to make sure everything is up to par. And thank you for the comment. I really appreciate it.
Great video but I have one problem: I can only connect to the Pc I am running a VM on. When I try to connect to my other PC the command simply opens a txt file.
Your videos are very ❤ good brother / what to do in order to come in cyber security, can you explain in detail, because I am new in this line, where should I start, what to do and what not
Thank you so much. I’m gonna be going live on my channel next week to talk about how you can get into cyber security, and how I did it myself.
qual o nome daquela ferramenta que esta fixada na barra de tarefa que parece um felino da cor rosa ?
I need help with something else! Someone has hacked me and can get pass vpns. Is there a video you have or can make or is there any commands to block out hackers? Thanks! Love your video btw!
thank youu but one thing it work fine but now it starts to time out within a sec what should I do ?
hey quick question, so when i will execute koadic and everything. Does the victim need to open cmd and type like the http thing?
Loving the video :D, BUT could you please tell me the song you used in the intro?
Idk the song. It was made when I did the intro video.
how do i download a file from the windows to kali when session is estrablished
Nice! To list / after to see the files and folders, instead of having to do ls afterwards. Hehe
Hey man I've been having a problem no one has been able to help and wondering if you can help, when I run the command on tbe target computer it opens a white box and doesn't give me a zombie
I would just make sure there’s nothing that blocking it on the Client side. And reboot the service to make sure there’s nothing running that’s causing problems. That would be my recommendation.
Koadic remote access works only if the target computer is within the same network??
If koadic works this way, then it is a tool that works only within an internal network and not an internal network connection with an external network computer.
Well the only way will be to test it i guess :P :P. Please note gaining access to someones computer or IT hardware without their explicit acknowledgement is illegal test it on your own hardware that you own and have full access wright's.
Absolutely thank you for this message. Test all in your own environment that you have access to.
Please test on your virtual environment that you have access to. Remember these videos are for educational purposes and it’s all tested on your own equipment unless you have explicit permission.
when i paste the script in the command promt, after about 10 seconds it says "Zombie 0: Timed Out" Someone help please, thanks
does this require port forwarding? please respond thanks
im going to use this only for educational pourpouses only
when I try to call home it dose not give me a zombie...am I doing something wrong? I followed the whole video?
After you get shell on the victim ,is ther a possible way to excute a man.in.the.middel attack on their internet router after ?
My question is confusing and probably stupid but can you own the victims wifi as a stage 2 mission if you have remote access to the computer that is connected to the target wifi ,and if the answear is yes ,explain how ?
My immagination tells me that i need my kali physically connected to that wifi but i dont know .
What if the target user isn’t an admin and can’t run cmd or bat files as admin, can you include some steps for privilege escalation with this tool or does that require a separate tool
It should still execute. I just did it as an administrator because I was already logged into that machine. Test it and see if it works.
what if the target user is in other network ?
Good question. Haven’t done that. But test it and let me know. Thank you
Very cool video thanks again.
Glad you enjoyed it
but how to close session completely
Another useful tool. Thanks for the tutorial.
How can we download files from dir ????
In my case, when I try to execute ipconfig on my zombie's shell it doesn't appear
What I should do?
i think you have to be on the same network for this to work you can just do it to another computer somewhere else
sooooo stage or stager is not a command anymore, I looked it up in the help section
So how would we use this with a machine that is not in our LAN?
I need help for me it isnt working when i run the mshta in cmd nothing happends in the kali vm and a white program pops up
What an amazing video. thank u
Glad you enjoyed it!
Nice job, keep it up! 👍😎👍
Thanks, will do!
Soo interested but when the victim shut downs his pc or restarts then will the connection be lost I mean wil it not be zombie anymore ?
Yeah you can get the connection back for the machine that you connected to
please someone help me
why zombie doesn't appear in my Linux system while i am doing everything alright?
It's Unexpectedly Closing with 'zombie time out' error how to fix it?
Keep trying. Not sure I haven’t had that problem.
what i am trying to find out is how to run something from the suspects pc into the victoms pc
If I exit the kali linux terminal will I lose the connection sir
Again to connect the victim should I repeat the process
Just test it and see. But the connections to still be established from my experience.
so you show how to install and work ... .but how to uninstall and clean the machine ?
What if victim don't implement our url to their cmd ....then how he will become our zombie?Or Is there any other tool that remotely give victim cmd access to us?
can you do this to a Chromebook?
Any code to turn off the Defender on the target machine?
Not sure what you mean, but if you’re wanting to turn off defender in windows, you can for sure
Once the connection established, it immediately turns DEAD. I thought it’s because of the windows defender that’s why I wanna turn it off first
pls help, i dont see any zombie, it just pop up a weird window on the windows machine
I did this project on another computer it does not work.
zombies wont appear and a blank thing appears on my windows screen. does anyone know how to fix this?
how to get persistent ??
When they run the command a blank message box pops up and no connection is there can you help me fix it?
hey Zhentor were you able to fix this? i had a similar issue, just a white window popped up. thanks
how do you install koadic?
can i change the port 9999 to another ?
How to avoid the connection to be DEAD?
It’s a connection days you would have to reestablish that connection
Opens just blank window, not showing any connection, I even did that with my OWN machine and with Virutal
which means same network
With this you can hack another PC that it's not on the same network as you ?
You are gold
Thanks. Hope the video was informative
i cant see that zombie thing bro
Itll probably work on older OS computers... try this with a laptop thats protected with a antivirus protection installed... thats what i call hacking... breaching through protected systems!!
This only work if you are on same network.
Why zphishing and pypshing links didn't support in chrome browser. Those links open only in Firefox. what to do for chrome users
I’m not sure why that is. But I’ll check it out and see if there’s a work around.
How i get implant ?
tnx
You’re welcome
Can not get it to work have been Fin around for mount and nothing don't work. But far enough I dont have #youtubeprivilege so it will never work for me just saying
My zombie keeps timing out
Working
Thank you 😊
i cant even hack my self i did everything like in the video. (ofc i used my own ip and not pats ip)
it's just locally 😐💔
Yeah it’s locally. At least that’s the way I use this tool.
Video is awesome but , most important is how and what tool do you use to sent it to the victim ???? That's is what really critical part of the how process and you just literally decided to not explain it or give a clear example of how is done, that make your youtue video presentation very useless and weak to be honest. It should be very clear and precise from the beging to the end throughout the entire process of the use of this remote control tool on Kali linux, with out leaving the most important part in the process and the is de deployment of payload or script to the victim's computer.