Search:

Type: Posts; User: aerokid240; Keyword(s):

Page 1 of 6 1 2 3 4

Search: Search took 0.00 seconds.

  1. Discussioni: SSH Not working

    by aerokid240
    Replies
    3
    Views
    2,696

    Re: SSH Not working

    Use netstat to determine whether port 22 is listening. If not, follow Thorin's suggestion.
  2. Replies
    12
    Views
    8,961

    Re: Privilege escalation on win7

    Easiest way my be to use meterpreter's priv escalation module.
  3. Re: Giving a Presentation On Backtrack 5 To Master's Degree Students. Suggestions?

    Just a suggestion. Demonstrate the importance of using secure passwords or pass phrases that meet the typical security requirements, like length, alphanumeric with symbols, not reusing the same...
  4. Re: Firefo Not Connecting To Server IN BT5 Using Proxychains

    Try using your own proxy. For example, on another machine or virtual machine, setup 3proxy's http proxy server and make sure this machine has an active internet connection. Then on your backtrack...
  5. Re: [Sharing] : Solving msfconsole & msfupdate issue after update metasploit to 4.5.0

    Thanks for sharing this info. Has helped me also. :D
  6. Replies
    1
    Views
    1,094

    Re: Victim uses proxy server (MITM)

    MITM attacks are generally done in a LAN evironment, not over a WAN.
  7. Replies
    2
    Views
    1,179

    Re: Backtrack Series Commentary

    Either you "blow the 6 grand", as you put it, or take the time to learn it (this can be years).
  8. Re: Metasploit - The Penetration Testers Guide, Problem! Please Help!

    More details please. I quickly went through this book with no issues so i can assume that you may have done something wrong.
  9. Re: fatback: recovering deleted files from truecrypt encrypted usb flash drive

    fatback will work on the block device, the sdb1 partition in your case, which is encrypted. Because everything here is encryption, fatback will be unable to properly parse the fat32 partition...
  10. Re: machine hacked - want to see if i can find entry point

    In addition to what daedalus1776 said, using the "last" command should show you a listing if the last logged on users and the duration they were logged in. If you can identify an unusal root login...
  11. Replies
    6
    Views
    2,547

    Re: A new tool: RndPasswd

    How does the program generating random giberish help you in brute-forcing a long password? Have you heard of the program crunch or how does your program extend the capabilities of crunch? I'm just...
  12. Re: Idea "can we have WPS hanshake file to crack offline"

    Its an online only attack. If it was possible to turn this into an offline attack, it would've (or will) been done for obvious reasons.
  13. Replies
    11
    Views
    3,166

    Re: John Cracked Sam File - Unknown Users?

    Are you sure fgdump isn't in BT5r2? I'm pretty sure it is. ("/pentest/windows/...") i cant remember the rest and i dont have my BT machine with me to check. You can search for it this way, updatedb...
  14. Replies
    2
    Views
    4,482

    Re: Will Reaver work on WPA routers without WPS?

    No it will not. See aircrack-ng for your solution.
  15. Replies
    15
    Views
    9,131

    Re: Defending against WPS attacks

    Here's an idea. I'm not that experienced with kismet but if you can have it log to syslog or a file, you can use a tool like swatch to continuously "tail" a file looking for certain data. When it...
  16. Replies
    11
    Views
    3,166

    Re: John Cracked Sam File - Unknown Users?

    If i remember correctly there is a registry setting that determines whether a particular account is hidden at the login screen. I'm sure you can find out what this key is from goggle. Hope this helps.
  17. Replies
    11
    Views
    3,166

    Re: John Cracked Sam File - Unknown Users?

    Log into XP as a user with admin rights. Go into control panel -> Administrative tools -> Computer management. Look for "local users and groups" (or something similar). From here, everything should...
  18. Re: Ettercap: No poisoning between [host] -> [router]

    The reason why you might not be getting the credentials is because the form fields might not have been defined in the etter.fields file located at /usr/local/share/ettercap/ directory.
  19. Replies
    1
    Views
    872

    Re: OpenVAS - how to rescan for a single vuln?

    Of course. You have to configure it. Create a new, empty, scan policy and only add the plugin/test that you will like to perform. The "full scan" is one of the default scan policies that comes with...
  20. Replies
    5
    Views
    2,645

    Re: Ettercap ARP poisoning inquiry

    Dennis00 beat me to it :) . Ettercap will spoof a certifacate for https on the gmail website. Once the victim browser accepts that certificate, ettercap should be able to parse the username and...
  21. Re: Is it outdated? "Metasploit - the penetration tester's guide"

    Just FYI, BT5r2 postgres sql server is called metasploit-postgres in the /etc/init.d directory. You can start it by typing,

    Essentially, it will do the same thing, so you can proceed with the...
  22. Replies
    7
    Views
    7,063

    Re: Getting passwords to display in Ettercap

    The code that you copied only shows variable declarations and what happens if a particular file cannot be opened/read. Nothing more. Perhaps you didn't copy the entire code branch that you intended...
  23. Re: Scan all hosts associated and notassociated and get IP's

    Airodump will capture wifi frames from the air. For your purposes, you will definitely want to set a filter for a particular AP while capturing with airodump. If the access point is open (not...
  24. Re: Scan all hosts associated and notassociated and get IP's

    Can you simplify your question? Im trying my best to understand exactly what you are asking.
  25. Replies
    7
    Views
    7,063

    Re: Getting passwords to display in Ettercap

    I'm still not 100% sure if i understand what you are saying but maybe the problem is that you are lazy :) ? Are you sure you understand what the dissectors do?
Results 1 to 25 of 135
Page 1 of 6 1 2 3 4