Search:

Type: Posts; User: LaVey666uk; Keyword(s):

Search: Search took 0.00 seconds.

  1. ahh.. cool, back onsite in the morning so will...

    ahh.. cool, back onsite in the morning so will try again.
    thx for your prompt response :D
  2. good tut, what would cause the following output...

    good tut, what would cause the following output (not a full capture?):

    asleap 2.2 - actively recover LEAP/PPTP passwords. <jwright@hasborg.com>
    Captured LEAP exchange information:
    username: ...
  3. Replies
    36
    Views
    15,322

    to bring this back on track... get yourself a...

    to bring this back on track...

    get yourself a book.. this one is a nice reference:

    http://www.amazon.com/Network-Security-Assessment-Chris-McNab/dp/059600611X
  4. Replies
    20
    Views
    8,197

    if its a netgear.. check out the type and google...

    if its a netgear.. check out the type and google for the default logon account, then try http://192.168.1.1 in your browser.. might find its not been changed :P
    if that fails and you feel you can...
  5. Replies
    12
    Views
    22,310

    thats only gonna do a UDP scan of the host and...

    thats only gonna do a UDP scan of the host and reveal little more than udp services, this should be done as well as the tcp scanning...

    nmap -sS -sV -vv <ip>
    nmap -sU -vv <ip>

    I would...
  6. Replies
    12
    Views
    22,310

    this is your box right ?? :rolleyes: have you...

    this is your box right ?? :rolleyes:

    have you tried the other glaringly obvious services first ?
  7. Replies
    0
    Views
    3,608

    My WepAutoCrack script..

    I know airoscript is there... but i wanted to create an automated wep crack script and practice my shell scripting as still noob to this!

    anyway version 0.1 (not 100% fully working!) but posted...
Results 1 to 7 of 7