Search:

Type: Posts; User: bobg2010; Keyword(s):

Search: Search took 0.00 seconds.

  1. Re: Vmware Fusion 3.1.2 patch for VMware Tools required for use with BT5 VM

    Hi SocialCred,

    I was wondering if you could tell me if you had to do anything else, besides those links you provided to get audio working?

    I have a Mac book Pro. running the lastest version of...
  2. Replies
    10
    Views
    3,561

    Re: Choosing the correct exploit

    My question was.

    "If I want to use some of the prebuilt .rb files from the exploit directory what is the best way to call them from metasploit? Do I have to copy them across to the metasploits...
  3. Replies
    0
    Views
    1,975

    Pivoting Nessus through Metasploit issue.

    Hi,

    I'm new to backtrack and I'm trying to pivot Nessus through metasploit.

    I have my attacker computer on the same subnet as victim 1 ( 192.168.10.0/24)
    victim 2 in connect to victim 1 but...
  4. Replies
    10
    Views
    3,561

    Re: Футболки, тру&

    Thanks it doesn't. but thanks anyway.
  5. Replies
    10
    Views
    3,561

    Re: Choosing the correct exploit

    Thanks to both of you, your feedback is very much appreciated.

    I'll definitely have a look at SHODAN and down the track once I have the basics out of the way at developing my own exploits( I have...
  6. Replies
    2
    Views
    16,664

    Re: Exploit-db quick navigation tutorial

    Thanks for much for this... this is a great help.

    I'm a bit of a n00bie though and thought my question was relavent and thought I'd ask here. In the pentest/exploits/exploitdb/platforms folder...
  7. exploit-db scripts vs Backtrack Exploit scripts. N00bie Question.

    Hi,

    I have Backtrack 4 R2 installed and have started using it and going through tutorials on the web. I have a question which I haven't been able to find the answer for yet.

    What is the...
  8. Replies
    10
    Views
    3,561

    Choosing the correct exploit

    Hi Guys,

    I'm getting start in the Pen testing field of security and have been
    playing with Backtrack (4 R2).

    I'm working through the 'metasploit unleashed' and have been watching
    some video's...
Results 1 to 8 of 9