Search:

Type: Posts; User: humbleman; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    5
    Views
    2,762

    I don't think the files are encrypted. I...

    I don't think the files are encrypted.

    I dowloaded another file and couldn't get that one open either. Frozen Smoke, if you wouldn't mind checking back what you did, I would truly appreciate it. ...
  2. Replies
    5
    Views
    2,762

    Veritas exploit_MTF file format

    Has anybody had success in opening/viewing MTF files received after a successful exploitation of Veritas backup file download vulnerability using Metasploit? (Bugraq 14551). The files received are in...
  3. Replies
    32
    Views
    2,790

    yes, Cisco. 3750 Catalyst. It routes traffic to...

    yes, Cisco. 3750 Catalyst. It routes traffic to the firewall and I believe spans the traffic to our vendors IPS. It is the border router.
  4. Replies
    32
    Views
    2,790

    I am connecting to the public address from the...

    I am connecting to the public address from the Internet.
  5. Replies
    32
    Views
    2,790

    Thorin, You mentioned it was a waste of time to...

    Thorin,
    You mentioned it was a waste of time to use Hydra even if I had gotten admin on the device. I don't understand this logic. I was asked to do a pentest so it is my job to penetrate the device...
  6. Replies
    32
    Views
    2,790

    He knows he insults people and that is why his...

    He knows he insults people and that is why his signature must justify it.



    Thanks again Lupin for your insights. I agree with all you are saying. yes, the public swith is hardly ever accessed...
  7. Replies
    32
    Views
    2,790

    So your saying he can insult me, but I cannot...

    So your saying he can insult me, but I cannot insult him? give me a break. I was being nice to everybody until this guy came along insulting me for no reason. I defend myself and get an infraction? I...
  8. Replies
    32
    Views
    2,790

    Why are you so angry and such an ass? Do you...

    Why are you so angry and such an ass? Do you feel better now? Insecure people crack me up.

    BTW, I ran Hydra against the SSH port that was also open and did not break it...and yes..i do know how...
  9. Replies
    32
    Views
    2,790

    Yes. I have some good resources from the SANS...

    Yes. I have some good resources from the SANS training and have visited most of those sites you referred me to in the link. I have been researching for a couple days as well, but today is the last...
  10. Replies
    32
    Views
    2,790

    Well. I can understand you don't believe, but it...

    Well. I can understand you don't believe, but it is true. I work for one of those finanical firms that was hit hard by the foreclusures. We have no money to spend on external consultants and I am the...
  11. Replies
    32
    Views
    2,790

    Sorry. I should have told you that it is my...

    Sorry. I should have told you that it is my company's public switch. I am doing an external pentest for my company and found it.
  12. Replies
    32
    Views
    2,790

    I have unauthenticated user access to a Cisco...

    I have unauthenticated user access to a Cisco puclic switch facing the Internet. What risk does this present to a company? What would you do with this access? Mainly info gathering? My networking...
  13. I will just use the --open feature. The results...

    I will just use the --open feature. The results of the scan clearly show a host is up, but not the port open. thanks.
  14. Replies
    3
    Views
    1,171

    password guessing dictionaries

    Anybody know where I can get good password dictionaries...ones better than what comes with John the Ripper?
  15. Replies
    4
    Views
    879

    the reverse_tcp meterpreter worked..i guess I...

    the reverse_tcp meterpreter worked..i guess I need to learn more on how these exploits are working. thanks.
  16. port scan to find systems without a certain port open?

    Does anybody know of a tool or technique to find systems that do not have a specific port open? I am wanting to find systems on our corporate network that do not have port 8081 open. This signifies...
  17. Replies
    4
    Views
    879

    Metasploit rport question

    I am having trouble understanding what is happening when I launch exploits from metasploit. I have used a few different exploits with the meterpreter/bind_tcp payload. I am pentesting against my...
Results 1 to 17 of 17