Search:

Type: Posts; User: phoenix910; Keyword(s):

Page 1 of 10 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    5
    Views
    1,958

    This should really be moved to non-working...

    This should really be moved to non-working hardware ;)

    ~phoenix910
  2. Replies
    31
    Views
    19,818

    Thanks, I haven't actually tried this out yet,...

    Thanks, I haven't actually tried this out yet, but may do say later on :) Appreciate it!

    ~phoenix910
  3. Discussioni: milw0rm

    by phoenix910
    Replies
    17
    Views
    9,998

    Seems as though milw0rm is back, at least for the...

    Seems as though milw0rm is back, at least for the moment. From str0ke's twitter page:

    Twitter / str0ke: milw0rm's back up & postin ...

    ~phoenix910
  4. Replies
    14
    Views
    5,189

    @spacemonkey: Pivoting exploits is basically...

    @spacemonkey: Pivoting exploits is basically using an exploited host to act as a proxy to exploit other hosts. I.e., if you exploit an external firewall, and that's the only PC with access to the...
  5. Replies
    89
    Views
    38,984

    Never done it myself, but I assume that this is...

    Never done it myself, but I assume that this is exploiting a PDF's ability to interpret scripting? Haven't looked at any links yet myself, but that's just off the top of my head.

    ~phoenix910
  6. Replies
    44
    Views
    18,140

    You would probably have to exploit the fact that...

    You would probably have to exploit the fact that Windows allows a user to modify a process of which they are the owner - perhaps execute it in the memory space of explorer.exe (though I'm not sure if...
  7. Replies
    44
    Views
    18,140

    Good stuff - just let me know when it's ready,...

    Good stuff - just let me know when it's ready, and specify what tests you want done, and I shall complete them for you.

    ~phoenix910
  8. Replies
    44
    Views
    18,140

    Yeah, I got a VM lab, and I'm happy enough to...

    Yeah, I got a VM lab, and I'm happy enough to test for you if you like.

    ~phoenix910
  9. Replies
    89
    Views
    38,984

    Not that I know of - they aren't executables....

    Not that I know of - they aren't executables. Mind you, I haven't tried it. I'd just try binding the exe with the picture if that's what you want to achieve.

    ~phoenix910
  10. Replies
    89
    Views
    38,984

    Would have been easier to say that from the...

    Would have been easier to say that from the start, instead of "they're on the same network but they're not on the same network". If that's the case, and they can ping the WAN addresses, then just use...
  11. Replies
    89
    Views
    38,984

    Connecting A and B on the internal network should...

    Connecting A and B on the internal network should be no challenge at all - it's simpler than over a WAN. Where's the issue there? And to use port 80 in a reverse shell, you set up the Metasploit...
  12. Replies
    89
    Views
    38,984

    Yes, using port 80 is fine, and Metasploit fully...

    Yes, using port 80 is fine, and Metasploit fully supports pretty well any type of tunneling you can think of. These will help:
    http://hkashfi.blogspot.com/2008/04/bypassing-firewalls-with-port.html...
  13. Replies
    14
    Views
    5,189

    Scan switches I use are these: nmap -sS -sV -T 4...

    Scan switches I use are these:
    nmap -sS -sV -T 4 -P0 -O xxx.xxx.xxx.xxx

    Yes, I see port 80.

    ~phoenix910
  14. Replies
    14
    Views
    5,189

    Yeah, the steps are the same (as in my tutorial,...

    Yeah, the steps are the same (as in my tutorial, and for pivoting exploits), but because Metasploit/Meterpreter (can't remember which one - it's late here :P) supports intergrated nmap scans (such as...
  15. Replies
    14
    Views
    5,189

    Actually it does (everywhere I've read has...

    Actually it does (everywhere I've read has mentioned that capability, which is where I got the idea from), and I got it to work - I just realised that the other machine I was attempting to scan...
  16. Replies
    89
    Views
    38,984

    Yep :) ~phoenix910

    Yep :)

    ~phoenix910
  17. Replies
    89
    Views
    38,984

    Not quite - meterpreter isn't a backdoor in...

    Not quite - meterpreter isn't a backdoor in itself - it is a post exploitation tool; whether you get in via another method or the one we've used; the backdoor in this instance is our little...
  18. Replies
    89
    Views
    38,984

    I'll answer both questions in one :P Basically,...

    I'll answer both questions in one :P Basically, I'm generating the reverse_tcp into an executable file, because this can be sent inside an organisation, and the whole point to this tutorial was to...
  19. Replies
    89
    Views
    38,984

    Both work - trust me, I've tried em both ;) ...

    Both work - trust me, I've tried em both ;)

    ~phoenix910
  20. Replies
    89
    Views
    38,984

    You're welcome :) And TexRyker, I've never...

    You're welcome :)

    And TexRyker, I've never seen that issue myself, so I'd just say:
    a) Make sure the code is typed exactly right, and that there are no syntax errors
    b) Update to the latest SVN...
  21. Replies
    89
    Views
    38,984

    Well, I haven't written any majorly different...

    Well, I haven't written any majorly different guides specifically on that, only another similar explanation from a previous tutorial:



    But that's from one of my other Ettercap-related articles....
  22. Replies
    89
    Views
    38,984

    You need it to be on a separate local IP range,...

    You need it to be on a separate local IP range, as far as I'm aware, otherwise you'll end up scanning yourself.

    ~phoenix910
  23. Replies
    44
    Views
    18,140

    I use "links", as opposed to "lynx", but whatever...

    I use "links", as opposed to "lynx", but whatever floats your boat ;) Also, as per my tutorial, just execute "links" and make sure you're interacting with the process, then you can tell it to browse...
  24. Replies
    44
    Views
    18,140

    Well, actually, you are able to access the...

    Well, actually, you are able to access the routers setup page either through the routing feature that metasploit has (which enables you to port scan/access other machines on the network, as was...
  25. Replies
    89
    Views
    38,984

    In theory, and port that isn't being used by...

    In theory, and port that isn't being used by either OS should work - however, 80 is often used, as you figured in your example. My advice would be to just modify your firewall's security settings.
    ...
Results 1 to 25 of 232
Page 1 of 10 1 2 3 4