Search:

Type: Posts; User: rastamouse; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.00 seconds.

  1. Replies
    4
    Views
    1,879

    Re: Penetration Testing course info

    I'm assuming you are referring to the 'Penetration Testing with BackTrack' course hosted by Offensive Security. The videos provided by them total about 8 hours in length, and you also get a ~350...
  2. Replies
    1
    Views
    2,557

    Re: Interactive remote shell

    I think the method you use, would depend on the environment you are interacting with. I wouldn't say there is a 'best' way - as sometimes certain methods will work and sometimes they won't. As long...
  3. Replies
    12
    Views
    8,490

    Re: Privilege escalation on win7

    In a word, yes. There are plenty of of priv esc modules in the Metasploit Framework for example.
  4. Replies
    1
    Views
    1,233

    Re: sslstrip and firefox-warning

    This is the default behavior of the browser, to alert users' to potential naughtiness that is occurring. Not sure if there is a setting in the GUI to turn it off, but you may find it if you type...
  5. Re: How to bruteforce wpa password with 3 pc's together

    http://lmgtfy.com/?q=pyrit+cluster
  6. Replies
    2
    Views
    4,679

    Re: backtrack 5 r3 guide?

    You could also try reading the man pages for the application. They often have longer explanations of each function.
  7. Discussioni: Deauth Question

    by rastamouse
    Replies
    3
    Views
    1,025

    Re: Deauth Question

    It isn't necessary to change the mon0 MAC in order to deauth. When I deauth clients, I usually use something like:

    aireplay-ng -0 1 -e {ESSID} -c {CLIENT MAC} mon0

    For some reason, I find it's...
  8. Replies
    4
    Views
    1,773

    Re: Alfa awus036h Radiation??

    As far as I understand things; a WiFi card like this operates at around 2W at max, which is 33dBm. This is also the max output from a UMTS/3G or GSM850/900 mobile phone. There are enough of those...
  9. Replies
    3
    Views
    2,380

    Re: protection against wireless DOS attack

    Ok, sorry. Assuming the person does not have a card capable of communicating on the 5GHz band, then this is true. I meant to say that the 5GHz band was not immune to this type of attack.
  10. Re: Hardware vs. Virtualization for a first time pen-test lab

    Sounds like it. An easy way to test them, is to boot up both VMs and try to ping them from each other.
  11. Replies
    5
    Views
    1,770

    Re: Determining which SSID is being sought for

    If you run something as simple as airodump-ng, it will show you 'probes' that wireless devices are transmitting. As you describe, this is the wireless client actively sending out broadcast probes...
  12. Re: losing internet connectivity when using arpspoof under BT R3 in Virtual machine

    Enabled IP forwarding?


    echo 1 > /proc/sys/net/ipv4/ip_forward
  13. Replies
    1
    Views
    1,079

    Re: Large-scale nmap scans - format and problems?

    I've tried to replicate what you are doing but I only came across an issue when my IP list wasn't parsed properly; but that didn't give me the error you have. Have you tried using a list with just a...
  14. Discussioni: Deauth protection?

    by rastamouse
    Replies
    4
    Views
    2,190

    Re: Deauth protection?

    Well as I alluded to in that thread, I don't think there is necessarily an easy solution for you and your neighbours. The deauthentication packet is part of the IEEE regs which is embedded in WiFi...
  15. Discussioni: Deauth protection?

    by rastamouse
    Replies
    4
    Views
    2,190

    Re: Deauth protection?

    There is another similar thread which has been raised here. When you say other electronic devices work, do you mean they can connect to your WiFi, or do you just mean they turn on and seem to...
  16. Replies
    3
    Views
    2,380

    Re: protection against wireless DOS attack

    The deauthentication packets sent by aireplay-ng are based on rules as stated in the IEEE regulations, so all WiFi devices must accept them. I'm not aware of methods to prevent these attacks, but I...
  17. Replies
    4
    Views
    2,187

    Re: Overcoming a Clever SSH Defense

    You could check out the Building A Module section of the Metasploit Unleashed set of pages.
  18. Re: Reflections about Backtrack, Aircrack, Metasploit and Hacking.

    There is a weakness in the implementation of Wi-Fi Protected Setup, which allows you to brute-force the PIN and obtain WPA/2 passphrases. Look into a tool called Reaver for details on that. There...
  19. Re: Hardware vs. Virtualization for a first time pen-test lab

    It would be a pretty epic fail for you to compromise your own host OS :p As you can see, my host computer is a Mac and I run BT5 and my target OS's as VMs. I'm not concerned about my BT5 VM putting...
  20. Re: Hardware vs. Virtualization for a first time pen-test lab

    In the main VirtualBox Preferences, go to the Network tab. There will probably be a host network called vboxnet0 already created. If not, add a new network yourself. When you create your VMs, go...
  21. Discussioni: Emesene n Such

    by rastamouse
    Replies
    12
    Views
    2,296

    Re: Emesene n Such

    Forgive me if I'm being dense, but I don't see the point in that article at all. It seems to be focused around transforming BackTrack into an everyday OS for general use, which is totally not the...
  22. Replies
    4
    Views
    2,187

    Re: Overcoming a Clever SSH Defense

    I'm not sure about Hydra, but the MSF ssh_login module has a STOP_ON_SUCCESS option. Presumably if you set this to false, the module will continue guessing passwords, even if it thinks it has...
  23. Re: Hardware vs. Virtualization for a first time pen-test lab

    Since you are just starting out, I would avoid spending lots of money if you can. It's just not necessary at this stage. You can set up a virtual machine environment on a single computer using...
  24. Discussioni: Rainbow Tables

    by rastamouse
    Replies
    2
    Views
    3,011

    Re: Rainbow Tables

    I'm not sure I completely understand what you are saying. Do you mean that the SSID for your network does not appear in the rainbow tables? If that's the case, you can't just add a folder into...
  25. Re: Backtrack 5 r3 hardrive partition/installation (Dual boot Win.7)

    I think I would start off by saying that if you are completely new to Linux, you are going to find using BT5 very hard indeed. It is a complete no-hand-holding OS, and perhaps not the best to learn...
Results 1 to 25 of 32
Page 1 of 2 1 2