Search:

Type: Posts; User: skidmarq; Keyword(s):

Page 1 of 4 1 2 3 4

Search: Search took 0.00 seconds.

  1. Discussioni: Nikto result

    by skidmarq
    Replies
    3
    Views
    3,018

    Re: Nikto result

    Study up on WebDAV...

    EDIT: I may even have a tutorial on these very forums if you search hard enough... :)
  2. Replies
    6
    Views
    2,820

    Re: fuzzer tcp ip and firewall

    Just out of curiosity, what are you trying to do exactly that would require a TCP "fuzzer"?
  3. Replies
    41
    Views
    12,983

    Re: Pen-test of a "secured" Windows-based laptop

    At the risk of taking this a bit OT, I must point out that those times seem very excessive, and by a lot...we're in the process of performing an enterprise wide whole disk encryption project (won't...
  4. Replies
    41
    Views
    12,983

    Re: Pen-test of a "secured" Windows-based laptop

    I do see a couple of angles you might use for privilege escalation....
  5. Replies
    41
    Views
    12,983

    Re: Pen-test of a "secured" Windows-based laptop

    I'm in agreement as far as the legitimacy of this but I'll give you the benefit of the doubt...with pre-boot authentication (encryption software such as PGP Desktop), you are not going to have much...
  6. Discussioni: Nmap issue

    by skidmarq
    Replies
    11
    Views
    3,642

    Re: Nmap issue

    What about the Windows side command I asked you to try?
  7. Re: What is the difference between a hacker and a script kiddy.

    I think it really just comes down to the amount of time and effort one is willing to devote to learning the craft...
  8. Discussioni: Nmap issue

    by skidmarq
    Replies
    11
    Views
    3,642

    Re: Nmap issue

    Why not log into the Windows box and perform a "netstat -bnv | find "21"" command.

    This should tell you the process attached to that daemon.

    You can also add a "--reason" argument to your Nmap...
  9. Replies
    41
    Views
    38,207

    Re: Writing Buffer Overflow Exploits using BackTrack

    I just wanted to say that your SEH tutorial is a masterpiece...thanks for taking the time to write that.
  10. Re: Handling multiple reverse shells with exploit/multi/handler

    Look into the exit technique used when creating the exploit payload...
  11. Replies
    9
    Views
    2,924

    Re: metasploit update goes wrong

    Quote from HD Moore (founder of Metasploit)



    Metasploit: Metasploit 3.0 Automated Exploitation
    Metasploit/UsingMetasploit - Wikibooks, collection of open-content textbooks
  12. Re: when "/etc/init.d/networking start" it just says that "no such device"

    Please plug in your ethernet cable and share with us the results of your "ifconfig -a" command...

    Is this a physical or virtual machine?
  13. Discussioni: Anti-Ettercap tools

    by skidmarq
    Replies
    11
    Views
    3,785

    Re: Anti-Ettercap tools

    The way port security works is that switch ports learn (statically or dynamically) which mac-addresses belong to what port. If they see a mac-address differ from what is stored in their CAM tables...
  14. Replies
    9
    Views
    2,924

    Re: metasploit update goes wrong

    I've posted this in at least three threads?!?
  15. Replies
    8
    Views
    1,316

    Re: Problem with metasploit

    Yossi, would you mind posting a brief synopsis of the solution so others can learn?

    Thanks!
  16. Replies
    53
    Views
    122,264

    Re: Metasploit db_autopwn using PostgreSQL

    Try the following...



    Let us know if that helps with the issues you guys are seeing...
  17. Replies
    3
    Views
    2,076

    Re: Fast track does not work

    There are two active threads discussing this very issue at the moment...

    http://www.backtrack-linux.org/forums/backtrack-howtos/28933-metasploit-db_autopwn-using-postgresql.html
    ...
  18. Replies
    4
    Views
    61,376

    Re: Using Chained Exploits - Metasploit/Meterpreter

    Unfortunately those methods won't always work...that's where the technique illustrated may come in handy!
  19. Replies
    53
    Views
    122,264

    Re: Metasploit db_autopwn using PostgreSQL

    Great write up, thanks! :)
  20. Replies
    3
    Views
    2,004

    Re: how to make autopwn in one script (metasploit)

    This is already built into the db_autopwn command, if I understand your question. The following will scan a host for HTTP daemon and then run all exploits that match the port.

    db_nmap 1.1.1.1...
  21. Replies
    4
    Views
    61,376

    Using Chained Exploits - Metasploit/Meterpreter

    Skid Rock: Using Chained Exploits - Metasploit and Meterpreter

    Quick little summary on the steps I used within the Metasploit Framework to go from user level access to system level privileges on a...
  22. Replies
    22
    Views
    15,459

    Re: Msf problem (no solution on earth)

    Here are the steps I used which worked for me as I can now use database features withing Metasploit. Your mileage may vary...note that creating the cert was required to overcome this error:
    ...
  23. Re: Backtrack 4: Information Gathering: DNS: Dnstracer - Trace a chain of DNS servers

    I love it, great write up and another tool to add to the arsenal...
  24. Replies
    5
    Views
    7,363

    Re: How to use ALFA Networks AWUS036H

    The drivers are already installed in BT4, it is a "plug and play" device.
  25. Re: Crack wep key - Injecting, but the ivs don't increase!

    Since it is just for a demonstration, have him hook his computer up to the wireless network while you are conducting your attack. Choose the arp attack and have him manually arp for something...this...
Results 1 to 25 of 87
Page 1 of 4 1 2 3 4