Search:

Type: Posts; User: caturix; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    5
    Views
    3,430

    oops

    heh. I must have been drunk when I responded. I don't remember reading (or in this case) misreading your post.
  2. Replies
    5
    Views
    3,430

    DNS vuln

    You can also check it deom Dan Kaminsky's site. That is if the server you want to check is accepting requests from the outside and you just want a quick and easy answer.

    url not posted because...
  3. Replies
    1
    Views
    1,820

    usb with changes

    You might want to check what the device is when it comes up. If you add an addition mass storage device after you configured the stick it might not be referenced by the same /dev/sd??. Your...
  4. alfa driver

    You should be able to get what you need from this post.

    hxxp://forums.remote-exploit.org/showthread.php?t=15497&highlight=alfa+driver
  5. Replies
    5
    Views
    3,479

    challenge

    Could the point be to overflow it? Maybe you should try running it with an exceedingly large string and see if you can cause an error.

    I have zilch programming experience but we did something...
  6. Discussioni: Metasploit in BT3

    by caturix
    Replies
    9
    Views
    2,724

    metasploit

    I don't think you are going to make much headway with the back end by changing the front end...
  7. Discussioni: connect to internet

    by caturix
    Replies
    10
    Views
    3,559

    internet

    Wow. This wasn't that far down the list. What have you done besides running mozilla to verify your connectivity?

    hxxp://forums.remote-exploit.org/showthread.php?t=16023
  8. Discussioni: Using Nmap

    by caturix
    Replies
    17
    Views
    3,143

    nmap

    Surprisingly not all malicious attackers use the proper procedures or follow the rules when running scans. They can hop on open networks or maybe they are from countries with less stringent laws. A...
  9. Replies
    6
    Views
    4,900

    Internet access

    You may want to check to make sure that you are using bridged networking so your virtual adapter can pull its own IP address from your DHCP pool.

    For that matter you may want to make sure you have...
  10. Discussioni: Metasploit in BT3

    by caturix
    Replies
    9
    Views
    2,724

    "appears" does leave some room for question. ...

    "appears" does leave some room for question. Perhaps the action only appeared to fail and he actually pwned the box.
  11. Replies
    4
    Views
    5,983

    Grab images

    I hadn't tried with any other versions but wireshark has that ability already for http.

    I just verified it on 0.99.6a (I forgot I had it on this machine) but it works with the latest versions.
    ...
Results 1 to 11 of 11