Search:

Type: Posts; User: The Dan; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    1
    Views
    2,619

    Someone with experience with Yersinia?

    Hi guys!

    Well, I believe if you are reading this topic you should (at last I hope :) ) know how to use yersinia much better than me.

    I was looking at the Yersinia man-page...
  2. Replies
    4
    Views
    3,643

    Hi KMDave, secure_it and williamc, Thanks for...

    Hi KMDave, secure_it and williamc,

    Thanks for the answers.

    I think I was not much clear, nmap do not recognize it is not a problem, I just commented. I know it's a cisco concentrator vpn at...
  3. Replies
    4
    Views
    3,643

    Tool to brute force Cisco VPN (tcp/10000)?

    Hi!

    I'm pen-testing a network which have a vpn from Cisco 3000 series, it's a concentrator where ipsec connections are tunneled over TCP port 10000.

    Someone have experience with this?
    ...
  4. Discussioni: WPA/2 cracking speed

    by The Dan
    Replies
    8
    Views
    2,794

    Hello I do not know but about it. But your...

    Hello

    I do not know but about it. But your client use TKIP over WPA?

    I did see there is a flaw in TKIP which allow to decrypt very fast any PSK if it's being used. However I do not know which...
  5. Replies
    4
    Views
    2,528

    Hello ipndrmath, Which Linux are you using?...

    Hello ipndrmath,

    Which Linux are you using? What kernel?

    Maybe you have the gcc protection or VA protection enable?

    Please, execute the following command and paste results here:

    cat...
  6. Replies
    5
    Views
    4,920

    Hi cybrsnpr Thank you for reply. I did...

    Hi cybrsnpr

    Thank you for reply.

    I did think in use dsniff package (arpspoof) but I got no sucess. In theory I should only setup a one way arp spoof and disable ip_forward, not?

    Like this:
  7. Replies
    5
    Views
    4,920

    Hi KMDave How are you? Sure, I work for a...

    Hi KMDave

    How are you?

    Sure, I work for a security company and one of my jobs are internal penetration tests, as I already had explained it here in another post I was believing it was clear.
    ...
  8. Replies
    5
    Views
    4,920

    Arp poisoning / Redirecting to my own machine?

    Hi

    I need to arp poisoning / redirect clients in some how the traffic from the LAN goes to my own machine (not forward to just sniff). Let me explain, I'm inside a network and I want to setup a...
  9. Replies
    4
    Views
    2,528

    I'm not a exploit specialist and I had not played...

    I'm not a exploit specialist and I had not played with stack overflows for a long time, but I believe it's happening because you are returning to the wrong place. I believe you are overwriting your...
  10. Replies
    3
    Views
    4,253

    Framework to test robustness of browser and AV?

    Hi guys,

    Some time ago (maybe more than 1 year) I remember I seen two nice projects, however (yes, I'm dumb sometimes :) I never had put it into my bookmark.

    One of this projects / tools was a...
  11. What is the fastest way to massive detect old windows?

    Hi,

    When doing internal penetration tests, one of the most interesting points is look for old OS who doesn't have more patches, like Windows NT 4.0 and Windows 2000.

    I in general do it via...
  12. Hi Thank you all for help, however I was not...

    Hi

    Thank you all for help, however I was not able to obtain access via the SQL Server, appear that is unfrequently admin log into this server. It's used only as database server.

    Only for...
  13. Hi operat0r, Thank you for reply. Nice your...

    Hi operat0r,

    Thank you for reply.

    Nice your articles (the link to video using ettercap to replace images is not found - http 404 error code).

    As I spoke, I tried to poison the network,...
  14. PTH Toolkit, Low Level KL and ideas to own a internal DC.

    Hi guys,

    Let me resume the history, I'm doing a internal penetration test (yes, this time I can use my laptop :D ).

    The network is big and have several classes, I'm in a network class where the...
  15. Replies
    6
    Views
    2,926

    Hi =Tron= Thank you, the FastTrack information...

    Hi =Tron=

    Thank you, the FastTrack information was the key, for who also want some example:

    H T T P://forums.remote-exploit.org/showthread.php?t=15879

    It appear to be a nice tool, should be...
  16. Replies
    6
    Views
    2,926

    Someone have used Metasploit integrated with nmap?

    Hi,

    Today I was reading a presentation from HD More and I seen that since version 3 Metasploit can integrate with nmap, to automate the exploitation process. :)

    Someone have used it?

    I...
  17. Replies
    30
    Views
    12,284

    Hi pureh@te, Lolll! I thinked it was a big...

    Hi pureh@te,

    Lolll! I thinked it was a big news from Defcon... hehe :)

    Are this David FPGA hardware really much more faster than nowdays computer with this graphical cards for cracking...
  18. Hi guys, Thank you for all help. I was not...

    Hi guys,

    Thank you for all help.

    I was not aware of this "beer can", it is really incrediable! :)

    It worked (took some time, but worked). Amazing!

    I seen in the same site tricks to open...
  19. Replies
    30
    Views
    12,284

    Hi, Not exactly a graphic card, but this year...

    Hi,

    Not exactly a graphic card, but this year at Defcon a guy (David Hulton) was selling some small FPGA boards, with a good price. In the flyer, it claims to be able to crack password 10 times...
  20. Hi, Thank you all for replys. I spoke...

    Hi,

    Thank you all for replys.



    I spoke with the contractors and it's allowed. However I was unable to lockpick the device. It's a secure pad-lock more or less like this (don't know the name...
  21. HELP - Escalate privilege in (well configured) Windows.

    Hi,

    I'm pen-testing a different environment, my pen-test is internal (more like insider).

    All I have is a PC from the company (without any tools, only Windows) connected to the local network....
  22. Discussioni: Client Isolation

    by The Dan
    Replies
    7
    Views
    3,704

    Hummm... it's very interesting. At Defcon...

    Hummm... it's very interesting. At Defcon Wireless network the same happens, you are unable to see any other laptop. Is it Client Isolation?

    I looked at google and couldn't find a way to bypass...
  23. Replies
    1
    Views
    830

    Run backtrack from Win and Update packages?

    Yo guys,

    I have some doubts, can you give some hints? :)

    a) I know I can install new packages in BackTrack downloading RPM files and converting to .tgz and than install it. But it's not very...
  24. Non Working Hardware: Attansic L1 and Intel QuadCore (6600)

    Hello,

    I'm new user, so I'm not able to post in the right section, if moderators could please move it to the right place.

    I would like to report that BackTrack 3 is not able to detect and have...
Results 1 to 24 of 24