Search:

Type: Posts; User: williamc; Keyword(s):

Page 1 of 12 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    1
    Views
    1,601

    Metasploit with a persistent handler

    This was previously working, so I'm at a loss. Basically, I want to run the following listener command:


    ./msfcli multi/handler payload=windows/meterpreter/reverse_tcp LHOST 172.25.x.x....
  2. Re: Social Engineer Toolkit (SET) problem with site cloner redirecting

    Getting a little closer to finding a solution. I ran the browser through an external proxy and it redirected after getting credentials. However, when it doesn't go through an external proxy, it just...
  3. Social Engineer Toolkit (SET) problem with site cloner redirecting

    The site cloner wont redirect to the legitimate site after entering credentials. There seems to be an issue with the POST request, as it reloads the cloned site and the error:
    "The connection was...
  4. Re: Bruteforce attack on a voicemailbox with spoofed caller id

    To caller ID spoof, I use "Caller ID Faker" and "SpoofApp". Both are available as APK's for Android. You could also setup an Asterix server, but that is a little more time consuming.

    I've used...
  5. Tutorial : Cracking LEAP networks with ASLEAP and John

    *I wrote this awhile ago, but it was lost in the transition to the new forums*

    We are assuming you've run kismet on the site and determined they are using LEAP. Kismet will create a .dump file in...
  6. Replies
    2
    Views
    5,445

    I put together a tutorial awhile ago. Check it...

    I put together a tutorial awhile ago. Check it out here:
    http://forums.remote-exploit.org/general-discussion/12942-tutorial-intranet-exploitation.html
  7. Replies
    2
    Views
    6,874

    There is also subdomainer: Edge-Security -...

    There is also subdomainer:
    Edge-Security - Metagoofil - Metadata analyzer - Information Gathering
  8. Discussioni: Tutorial Winlockpwn

    by williamc
    Replies
    45
    Views
    39,328

    Latidude: I've been experiencing the same issues...

    Latidude: I've been experiencing the same issues with the tool. I believe Microsoft may have patched this issue over the course of the last year. By patched I mean moved the memory location, as they...
  9. Replies
    11
    Views
    2,145

    Prefer the black/red color scheme. Was also proud...

    Prefer the black/red color scheme. Was also proud of my senior status! Hopefully they archive these forums, I use them extensively for pen-testing. Maybe they can migrate user accounts?
  10. Replies
    1
    Views
    2,126

    The Kismet output files can be opened by Excel....

    The Kismet output files can be opened by Excel. Use "text to columns" and a "," delimiter to created a easy to view Excel spreadsheet. Of course, if there is a script to make it easier, hopefully...
  11. tutorial

    Give this a try:
    http://forums.remote-exploit.org/tutorials-guides/13728-tutorial-cracking-leap-networks-asleap-john.html
  12. Replies
    4
    Views
    3,439

    Thanks for the recommendations! I'll try and use...

    Thanks for the recommendations! I'll try and use all of them to see which is the most comprehensive tool.
  13. Replies
    4
    Views
    3,439

    Identifying network shares

    I wanted to get feedback on methods to identify network shares. I'm performing a pen-test for a health care organization. One of their main concerns is open shares with PHI. I've been using the...
  14. Discussioni: Simple Clean Report

    by williamc
    Replies
    9
    Views
    1,860

    I'm more familiary with Kismet output. It will...

    I'm more familiary with Kismet output. It will save to an xml file, which you can open in Excel.
  15. Replies
    23
    Views
    3,472

    I have some concerns about your IT department....

    I have some concerns about your IT department. First off, if you've been implicated in an investigation, why are they coming to you with accusations? Any time a client hires us for an investigation,...
  16. Replies
    12
    Views
    21,389

    I've used Elcomsoft for NTLM cracking. They have...

    I've used Elcomsoft for NTLM cracking. They have a program for PDF with GPU acceleration:
    Advanced PDF Password Recovery : Recover PDF passwords and instantly unlock Adobe Acrobat PDF documents
    ...
  17. Replies
    3
    Views
    1,521

    Here is an article on how to modify binaries:...

    Here is an article on how to modify binaries:
    http://www.packetstormsecurity.org/papers/virus/Taking_Back_Netcat.pdf

    If you need a copy of a modified gsecdump, IM me and I can send you one.
    ...
  18. Replies
    4
    Views
    2,290

    You should download sqlping and give it a small...

    You should download sqlping and give it a small username and password dictionary:

    Free Tools

    William
  19. Replies
    39
    Views
    2,850

    You mentioned it's not in the corporate...

    You mentioned it's not in the corporate environment, but then say the rogue AP is in the IT department? Who's to say it isn't connected to the corporate intranet? You'd be surprised how lazy some IT...
  20. Nick, I think you'll find this posting helpful...

    Nick,
    I think you'll find this posting helpful in dealing with your Nigerian scammer:
    http://forums.remote-exploit.org/general-discussion/19591-nigerian-419-scammer-emails-have-some-fun.html
  21. Discussioni: RSH please

    by williamc
    Replies
    0
    Views
    1,542

    RSH please

    Found rshell running on port 514 during an assessment, however BT3 doesn't appear to have RSH installed. I found a debian package at:...
  22. Replies
    6
    Views
    2,259

    First thing to do is verify the PUT method is...

    First thing to do is verify the PUT method is enabled. You can do this with the curl tool:
    cURL and libcurl

    curl -I -X OPTIONS http://somesite.com

    Once you've verified the PUT method, you...
  23. Discussioni: Tutorial Winlockpwn

    by williamc
    Replies
    45
    Views
    39,328

    Nice. I'm looking forward to trying this out! I...

    Nice. I'm looking forward to trying this out! I contacted the original author about having it released with BT4, but so far no reply.

    William
  24. Discussioni: goog-mail.py

    by williamc
    Replies
    4
    Views
    6,705

    Hey floyd, any chance of you releasing your java...

    Hey floyd, any chance of you releasing your java version?

    William
  25. Replies
    10
    Views
    2,834

    I did a class project on this a few years ago....

    I did a class project on this a few years ago. Most of the Nokia 6310 phones are vulnerable. You may have some issues activating such an old phone. It would require an older SIM card. Make sure it...
Results 1 to 25 of 285
Page 1 of 12 1 2 3 4