Search:

Type: Posts; User: imported_pynstrom; Keyword(s):

Page 1 of 6 1 2 3 4

Search: Search took 0.00 seconds.

  1. http://airdump.net/fixing-slap-get-in-backtrack-3/

    http://airdump.net/fixing-slap-get-in-backtrack-3/
  2. Replies
    4
    Views
    976

    Use ifconfiglo is the local loopback, in...

    Use

    ifconfiglo is the local loopback, in ifconfig output look at Link encap:
    look for one that says Ethernet, in my experience the wired ethernet card is usually eth0.

    ifconfig eth0 up
    rm...
  3. Replies
    5
    Views
    1,171

    If your looking for information on wep with...

    If your looking for information on wep with nonopen authentication your looking for WEP SKA (Shared Key Authentication).
  4. Replies
    15
    Views
    1,864

    As with most things, if it works outside it will...

    As with most things, if it works outside it will work inside, provided you do not live in a Faraday cage.
  5. Replies
    4
    Views
    2,099

    Check out these videos: http://vimeo.com/1554155...

    Check out these videos:
    http://vimeo.com/1554155
    http://vimeo.com/1983922
    BeEF works fine for me. You can also use an ettercap filter to place the beef script tag into the target browser without...
  6. You could check this out:...

    You could check this out:
    http://www.gnucitizen.org/blog/router-hacking-challenge/
  7. Replies
    2
    Views
    1,090

    There's are some easy to follow step by step...

    There's are some easy to follow step by step examples here:
    http://books.google.com/books?id=NQUQc-rE0lwC&dq=grey+hat+hacking
    Click "Preview this book".
  8. Discussioni: baby steps

    by imported_pynstrom
    Replies
    4
    Views
    1,020

    https://www.securinfos.info/old-softwares-vulnerab...

    https://www.securinfos.info/old-softwares-vulnerable.php
    http://www.oldapps.com/
    http://www.oldversion.com/

    However, metasploit does not contain very many exploits that have a SP3 target.
  9. Replies
    2
    Views
    3,034

    This C code should work, the payload here is...

    This C code should work, the payload here is (windows/exec CMD=calc.exe EXITFUNC=thread) encoded with the generic msf encoder.

    unsigned char shellcode[] = ...
  10. Replies
    6
    Views
    1,094

    I use Gparted live...

    I use Gparted live http://sourceforge.net/project/showfiles.php?group_id=11584
  11. Replies
    6
    Views
    1,094

    You need at least two separate partitions. One...

    You need at least two separate partitions. One fat32 and one ext2 or ext3. The changes folder should be located on the ext partition.
  12. Replies
    16
    Views
    2,210

    http://wiki.remote-exploit.org/index.php/HCL:Wirel...

    http://wiki.remote-exploit.org/index.php/HCL:Wireless#USB_Dongles
  13. Replies
    2
    Views
    951

    If you are trying to update aircrack-ng, this can...

    If you are trying to update aircrack-ng, this can be done using fast-track. Or with the commands:

    svn co http://trac.aircrack-ng.org/svn/trunk/ aircrack-ng
    cd aircrack-ng
    make SQLITE=true
    make...
  14. Replies
    1
    Views
    1,544

    I believe squid has the capabilities you are...

    I believe squid has the capabilities you are looking for, although I have not used it. Squid can be downloaded here:
    http://www.squid-cache.org/
  15. Replies
    5
    Views
    2,072

    Look into ARP poisoning. This will allow you to...

    Look into ARP poisoning. This will allow you to route all traffic between the victim pc and the router through your computer. There are several applications included with backtrack that are capable...
  16. Although there is a lot of valuable info on this...

    Although there is a lot of valuable info on this forum it is not the end all be all source for network security related information. Google is your friend.

    http://vimeo.com/1575771...
  17. Replies
    3
    Views
    2,459

    su -c "/usr/bin/bash" However this may not be...

    su -c "/usr/bin/bash"
    However this may not be needed as in backtrack you should already be running as root. Opening a terminal might do the trick.
  18. Replies
    4
    Views
    1,277

    Try searching scribd for books on metasploit:...

    Try searching scribd for books on metasploit:
    http://www.scribd.com/search?query=metasploit

    There are quite a few good books which deal with metasploit.
    Gray Hay Hacking;...
  19. Replies
    7
    Views
    1,466

    You could for example: Google "lilo", "lilo.conf"...

    You could for example: Google "lilo", "lilo.conf" or "edit lilo.conf".

    There are quite a few very good tutorials on this forum for testing wireless security, here are a few:...
  20. Replies
    2
    Views
    928

    There is a tutorial by pureh@te for installing...

    There is a tutorial by pureh@te for installing bt3 from the shell here:
    http://forums.remote-exploit.org/showthread.php?t=14751&highlight=dual+boot
    If you use this tutorial for dual boot just add...
  21. Replies
    1
    Views
    1,045

    http://forums.remote-exploit.org/showthread.php?t=...

    http://forums.remote-exploit.org/showthread.php?t=9618
  22. Replies
    5
    Views
    2,532

    Try specifying your targets. I have had better...

    Try specifying your targets. I have had better success when both or at least one target is defined rather that using all targets ( // // )


    ettercap -Tq -i <interface> -M arp:remote /target1ip/...
  23. Check your options!

    Check your options!
  24. Replies
    2
    Views
    1,520

    It's not "fixed". When you access the ssl site...

    It's not "fixed". When you access the ssl site and receive the warning there should also be a link allowing you to continue to the page anyway. Internet Explorer I believe used to just pop an alert...
  25. Replies
    2
    Views
    1,274

    BT3 includes a nice application that displays the...

    BT3 includes a nice application that displays the top processes and some other cpu related information called conky
Results 1 to 25 of 143
Page 1 of 6 1 2 3 4