Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      • 0
      Sign in to follow this  
      nexus1981

      loki 2.0 error

      Question

      i need help  pleese    MESSAGE: Execute failed: (1364) Field 'cookie' doesn't have a default value
      ERROR:

      Share this post


      Link to post
      Share on other sites

      5 answers to this question

      Recommended Posts

      • 0
      Staff

      I do not have the bot to try it or reproduce the error.

      show a video showing how you get the error.

      Share this post


      Link to post
      Share on other sites
      • 0
      Staff

      @nexus1981 The LVL23 team is working to try to solve the problem.
      Did you buy this bot? or did you download it?

      Share this post


      Link to post
      Share on other sites
      • 0
      Staff

      @nexus1981 How did you solve it?

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Security Onion
          Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
          Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack.
          Core Components
          Logstash – Parse and format logs.
          Elasticsearch – Ingest and index logs.
          Kibana – Visualize ingested log data.
          Auxiliary Components
          Curator – Manage indices through scheduled maintenance.
          ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information.
          FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc.
          DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc.
          Changelog v2.0 RC1
              Re-branded 2.0 to give it a fresh look
              All documentation has moved to our docs site
              soup is alive! Note: This tool only updates Security Onion components. Please use the built-in OS update process to keep the OS and other components up to date.
              so-import-pcap is back! See the so-import-pcap docs here.
              Fixed issue with so-features-enable
              Users can now pivot to PCAP from Suricata alerts
              ISO install now prompts users to create an admin/sudo user instead of using a default account name
              The web email & password set during setup is now used to create the initial accounts for TheHive, Cortex, and Fleet
              Fixed issue with disk cleanup
              Changed the default permissions for /opt/so to keep non-priviledged users from accessing salt and related files
              Locked down access to certain SSL keys
              Suricata logs now compress after they roll over
              Users can now easily customize shard counts per index
              Improved Elastic ingest parsers including Windows event logs and Sysmon logs shipped with WinLogbeat and Osquery (ECS)
              Elastic nodes are now “hot” by default, making it easier to add a warm node later
              so-allow now runs at the end of an install so users can enable access right away
              Alert severities across Wazuh, Suricata and Playbook (Sigma) have been standardized and copied to event.severity:
              1-Low / 2-Medium / 3-High / 4-Critical
              Initial implementation of alerting queues:
                  Low & Medium alerts are accessible through Kibana & Hunt
                  High & Critical alerts are accessible through Kibana, Hunt and sent to TheHive for immediate analysis
              ATT&CK Navigator is now a statically-hosted site in the nginx container
              Playbook
                  All Sigma rules in the community repo (500+) are now imported and kept up to date
                  Initial implementation of automated testing when a Play’s detection logic has been edited (i.e., Unit Testing)
                  Updated UI Theme
                  Once authenticated through SOC, users can now access Playbook with analyst permissions without login
              Kolide Launcher has been updated to include the ability to pass arbitrary flags – new functionality sponsored by SOS
              Fixed issue with Wazuh authd registration service port not being correctly exposed
              Added option for exposure of Elasticsearch REST API (port 9200) to so-allow for easier external querying/integration with other tools
              Added option to so-allow for external Strelka file uploads (e.g., via strelka-fileshot)
              Added default YARA rules for Strelka – default rules are maintained by Florian Roth and pulled from https://github.com/Neo23x0/signature-base
              Added the ability to use custom Zeek scripts
              Renamed “master server” to “manager node”
              Improved unification of Zeek and Strelka file data


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. amber is a reflective PE packer for bypassing security products and mitigations. It can pack regularly compiled PE files into reflective payloads that can load and execute itself like a shellcode. It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products and application white-listing mitigations. If you want to learn more about the packing methodology used inside amber check out below.
          New Features
              x64 support added !
              Support for MacOS and Windows (Currently supporting all major platforms)
              Assembly stubs rewritten
              External dependencies reduced to two
              C++ stubs converted to go
              All project converted into a go package

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. TECHNIQUE
          When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him.
          AVAILABLE TUNNELLING OPTIONS
              LOCALHOST
              NGROK (https://ngrok.com/)
          TESTED ON FOLLOWING:-
              Kali Linux - 2020.1a (version)
              Parrot OS - Rolling Edition (version)
              Ubuntu - 18.04 (version)
              Arch Linux
              Termux App

          Advance Phishing Tool 2.0

              Add 16 New Phishing Pages with Latest Version
              Fix Ngrok Problem
              Add World First Tiktok Phishing Page


          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Loki
          Loki is a simple Remote Access Tool.
          Loki uses RSA-2048 with AES-256 to keep your communication with infected machines secure.
          Requirements
              Python 3.6.x | 3.7.x | 3.8.x
          Server tested on
              Windows 10
              Kali Linux
          Bot tested on
              Windows 10
          Payload generator tested on
              Windows 10
          Features
              Upload & Download
              Chrome Launching
              Persistence
              Screenshare
              Screenshot
              Keylogger
              SFTP
              SSH

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. user32.sys = Stub

          Hidden Content
          Give reaction to this post to see the hidden content.