Search:

Type: Posts; User: imported___CG__; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.00 seconds.

  1. Replies
    18
    Views
    5,338

    are you running that as system and its failing?...

    are you running that as system and its failing? admin and its failing or a user and its failing?
  2. Replies
    8
    Views
    1,688

    unless someone has intentionally shared the whole...

    unless someone has intentionally shared the whole drive you have to be an admin to access C$ ADMIN$ etc that's a windows default.
  3. msfcli and some bash can send the same exploit to...

    msfcli and some bash can send the same exploit to multiple hosts
  4. Discussioni: remote access

    by imported___CG__
    Replies
    14
    Views
    6,030

    samba can be used to access the computers

    samba can be used to access the computers
  5. Replies
    14
    Views
    5,113

    that looks correct when you do a route print...

    that looks correct

    when you do a route print do you see your route?

    i havent been able to get nmap to work successfully thru the pivot but i was able to get aux modules to work.

    for...
  6. Replies
    24
    Views
    11,231

    pay immunity for it

    pay immunity for it
  7. Replies
    1
    Views
    1,393

    'Refs' => [ ['MSB', 'MS06-014']...

    'Refs' =>
    [
    ['MSB', 'MS06-014']
    ],
  8. Replies
    2
    Views
    2,734

    just use sbd, it has most of that stuff built in...

    just use sbd, it has most of that stuff built in and is configurable

    http://packetstormsecurity.org/UNIX/netcat/indexdate.html
  9. Replies
    10
    Views
    3,622

    have you installed the netware client on your...

    have you installed the netware client on your victim host? Pretty sure its not installed by default.
  10. no he asked about proxy servers, but he did...

    no he asked about proxy servers, but he did mention "hiding his IP". So yes you sort of answered his question with idle scanning. But since the title of the thread "Tunnel traffic through proxy...
  11. Replies
    4
    Views
    1,259

    your SMBPIPE needs to be BROWSER for 2k boxes

    your SMBPIPE needs to be BROWSER for 2k boxes
  12. 1. none of that answers his question. 2....

    1. none of that answers his question.

    2. what's the fun (or challenge) in getting whitelisted...sheesh.
  13. couple of things on pentesting for a job -its...

    couple of things on pentesting for a job

    -its alot of long hours staring at the computer trying to find the one thing the admin missed
    -its alot of days away from home and alot of air miles, if...
  14. Replies
    5
    Views
    3,529

    yes even 1.4 is broke, the issue is the way...

    yes even 1.4 is broke, the issue is the way google is serving up the pages and the tool not being able to parse them correctly. I've talked to the dev and he fixed it but i dont know if they updated...
  15. Replies
    15
    Views
    6,066

    is there any benefit to running this over the...

    is there any benefit to running this over the browser autopwn script itself?
  16. Replies
    9
    Views
    4,182

    if you go back and read that documentation it...

    if you go back and read that documentation it will tell you that its a blackhole and doesnt forward traffic on
  17. we'll like it was mentioned, you have admin on...

    we'll like it was mentioned, you have admin on the server, so depending on scope you are done.

    assuming you want more, upload incognito and see if the domain admin or another server admin has...
  18. you can use a tool like socat to push A port...

    you can use a tool like socat to push A port through tor, but i dont know of a way to port scan thru it.

    so say you wanted to push IRC thru tor. assuming everything else is set up right you'd type...
  19. Replies
    9
    Views
    5,446

    the 15200 and 67108864 are your chain length and...

    the 15200 and 67108864 are your chain length and chain count.

    you really need to go read the Time-Memory Trade-Off paper for the math background on the chain length and chain count, using the...
  20. Discussioni: KARMetasploit

    by imported___CG__
    Replies
    7
    Views
    5,709

    while not an answer to any specific question i...

    while not an answer to any specific question i did some writeups on karmetasploit.

    http://carnal0wnage.blogspot.com/2008/08/playing-with-karmasploit-part-1.html...
  21. Discussioni: Metasploit

    by imported___CG__
    Replies
    5
    Views
    1,489

    http://www.metasploit.com/framework/support/

    http://www.metasploit.com/framework/support/
  22. Replies
    12
    Views
    5,373

    you could try dradis, its a pen test...

    you could try dradis, its a pen test documentation tool

    http://dradis.nomejortu.com/
  23. Replies
    4
    Views
    1,396

    kill it with the jobs command

    kill it with the jobs command
  24. Replies
    4
    Views
    1,169

    use quotes cd "Documents and Settings"

    use quotes

    cd "Documents and Settings"
  25. Replies
    8
    Views
    3,367

    have you enabled the netware client? that isnt...

    have you enabled the netware client? that isnt enabled by default.
Results 1 to 25 of 43
Page 1 of 2 1 2