Search:

Type: Posts; User: mno@8; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    41
    Views
    13,063

    Re: Pen-test of a "secured" Windows-based laptop

    In a similar situation, I was able to create a macro for Word using meterpreter. This one was undetected by the McAfee running on the PC. I could access the protected PC via the shell of Meterpreter,...
  2. Replies
    9
    Views
    2,290

    This is the latest kernel available. Re-do the...

    This is the latest kernel available. Re-do the same process as for 2.6.30.5 and you'll get it.
  3. Replies
    9
    Views
    2,290

    Knowing that nothing is perfect in this world, I...

    Knowing that nothing is perfect in this world, I prefer knowing that the backtrack team is working on security tools instead of packaging the nvidia driver.
  4. Discussioni: Toshibo Qosmio X300

    by mno@8
    Replies
    0
    Views
    1,324

    Toshibo Qosmio X300

    Running backtrack booting on a USB disk on a Toshiba Qosmio X300-14F:
    CPU: Q9000
    4Gb Ram
    Wireless : Intel 5100 (injection working perfectly with latest kernel)
    NVIDIA« GeForce« 9800M GTX with...
  5. Discussioni: Building a portable lab

    by mno@8
    Replies
    0
    Views
    2,259

    Building a portable lab

    The goal: installation of BT4 pre-release on an external USB disk to create a portable lab environment with vmware.
    The first step was to install BT4 on a USB disk. I booted on a DVD than used...
  6. Replies
    10
    Views
    2,978

    If you suspect a problem with the graphic card, I...

    If you suspect a problem with the graphic card, I suggest booting on the live CD and check everything is owrking; If you cannot make it run from the live CD it might be useless to try from the...
  7. Replies
    6
    Views
    1,352

    ipconfig wlan0 down iwconfig wlan0 mode Monitor...

    ipconfig wlan0 down
    iwconfig wlan0 mode Monitor
    ipconfig wlan0 up
    or
    airomon-ng start wlan0
  8. Replies
    3
    Views
    2,418

    I used GNS3 some times ago to make some debugging...

    I used GNS3 some times ago to make some debugging on IPSec tunnel, mixing it with externally connected firewall (SSG) and VMWare intalled ubuntu. Thanks to this experience, I can say that, as GNS3...
  9. Replies
    39
    Views
    3,024

    This is the reason why I was not talking about a...

    This is the reason why I was not talking about a rogue access point but about an open evil AP
  10. Replies
    39
    Views
    3,024

    Fully agreed: in all countries that I know this...

    Fully agreed: in all countries that I know this is the case.
    I am just wondering about the otherside. If that false AP is bad as suspected, TMHO it is not illegal. If it is than all honeynets would...
  11. According to me that is really the basic when...

    According to me that is really the basic when using a dictionary attack: first build your dictionary according to your target: name, firstname, surname, known account on forum, birth date, pets name...
  12. I wonder if "what is your favourite music" is the...

    I wonder if "what is your favourite music" is the question to recover your password on your yahoo or gmail account... :-D

    No music on client site! When working from home, it highly depends on the...
  13. Discussioni: backtrack on usb stick

    by mno@8
    Replies
    10
    Views
    2,814

    If you are not confortable with command line and...

    If you are not confortable with command line and not sure about what you copied on the US, you may want to give a try to unetbootin. There are plenty of tutorial on how to use this tool but it is...
Results 1 to 13 of 23