Search:

Type: Posts; User: hhmatt; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.01 seconds; generated 16 minute(s) ago.

  1. Re: Is it outdated? "Metasploit - the penetration tester's guide"

    This is an old command. Metasploit is changing almost everyday. But don't let this discourage you from finishing the book, there is a lot of good material in there. You should be able to just...
  2. Replies
    21
    Views
    9,944

    Re: How to generate 8 Digit Possible passwords?

    Haha, yes. Your result will be in a more accurate KB once you divide by 1024. But an OS has to go somewhere and you will lose space due to formatting. :)

    The time it would take to generate 23TB of...
  3. Replies
    21
    Views
    9,944

    Re: How to generate 8 Digit Possible passwords?

    I dug up my formula that I made up a while ago and I was wrong, my apologies.
    This is what I had. Now using bofh's. Would be trivial to subtract one or two for the last LF.
    ((x^y)*y)+(x^y)

    I get...
  4. Replies
    21
    Views
    9,944

    Re: How to generate 8 Digit Possible passwords?

    Ok.

    x^y calculates how many characters will be in the file. Each character should equal 1 byte.

    (x^y)/y calculates the number of lines in the file. The concept is to calculate all possible...
  5. Replies
    21
    Views
    9,944

    Re: How to generate 8 Digit Possible passwords?

    Thats because the formula is wrong.

    It should be:

    x = possible characters
    y = length of string

    Unix
    (x^y)+((x^y)/y)
  6. Discussioni: small buffer overflows

    by hhmatt
    Replies
    7
    Views
    2,554

    Re: small buffer overflows

    This is how we handle too small of buffer space.

    https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/

    Which is why they said it was harder but not...
  7. Discussioni: small buffer overflows

    by hhmatt
    Replies
    7
    Views
    2,554

    Re: small buffer overflows

    Small buffers are potentially more difficult because there is a lot less room for your shellcode. Useful shellcode won't fit inside a small buffer.

    NOP's are used during the return right before...
  8. Re: Is it possible to retrieve a specific page from Akamai's cache?

    I found this to be pretty interesting, thanks for bringing this up! :)

    I figured they would probably patch the TTL insertion or maybe it's in a different form like hex. It maybe possible to send...
  9. Re: Is it possible to retrieve a specific page from Akamai's cache?

    I haven't tried or tested any of this but at first glance I don't see why you couldn't. If that paper isn't completely out of date.

    I don't know if you missed this but this seems to be the most...
  10. Replies
    8
    Views
    25,608

    Re: enabling component called universe

    I think sickness stole that from thorin. lmgtfy is great!
  11. Replies
    1
    Views
    3,095

    Re: Rainbow Tables vs Dictionary

    Rainbow tables are better but you may want to try precomputed hashes instead. See airolib-ng.
  12. Replies
    4
    Views
    3,150

    Re: Pentest through a router

    I don't see what you're getting at but most routers aren't powerful enough to run pentesting tools. Most come with basic networking functions like ping and traceroute but nothing that will get you a...
  13. Re: getting backtrack 5 to connect wireless with a d-link wau 2340 usb wireless adapt

    man ifconfig
    man iwconfig

    or


    ifconfig -h
    iwconfig -h
  14. Replies
    20
    Views
    8,480

    Re: I found the key of WPA-PSK but....

    If you notice a post like this that seems like it's probably illegal activity then use the "report this post" button.
    The moderator's here do a good job, so let them handle these things. I'm not...
  15. Replies
    2
    Views
    3,299

    Re: BT5R1 won't boot from dvd

    Check your BIOS to make sure its set to boot to DVD first. Also if you burn a DVD at a faster speed than another drive can read it will not be able to read the disc.
  16. Replies
    20
    Views
    8,480

    Re: I found the key of WPA-PSK but....

    This is assuming they are a citizen of the U.S.

    @OP
    Sometimes cracking gives erroneous results. Try again.
  17. Replies
    10
    Views
    9,949

    Re: Dual-Boot BT5 and Windows XP BT is first!

    This is a simple fix it's just an annoying one.
    Make a backup then reinstall to your drive and restore!
    dd is built in to all linux distro's I believe.

    If you have the partition space available...
  18. Replies
    12
    Views
    4,530

    Re: Running irc as non-root

    This is the old forums but I think it's probably going to be similar to what you need to do to BT5 to run programs as a unprivileged user....
  19. Discussioni: Tullywacker Got Hacked

    by hhmatt
    Replies
    3
    Views
    2,221

    Re: Tullywacker Got Hacked

    Wtf? Nothing about this is a hack/hacker/hacking. It's just instant messaging packet manipulation.
  20. Replies
    2
    Views
    2,248

    Re: Phishing Scam "Windows Tech Support"

    What you are describing is illegal no matter how bad of people they are.
  21. Replies
    10
    Views
    19,703

    Re: Make backtrack as an AP

    You need to recomment redir_command_off.
    You may also want to flush your iptables and you can then reenter the command manually.
  22. Replies
    2
    Views
    2,229

    Re: Passphrase not in dictonary Problem - a bit unusual

    We're these files made in windows or linux? You may need something like dos2unix if they were made in windows. Also keep them below 2GB for aircrack-ng.
  23. Replies
    4
    Views
    1,295

    Re: Metasploit Linux/DOS question

    You're probably just missing edit.com from the \windows\system32 folder. You will just need to rip it from another xp box then put it in that folder and run it.

    However, I found out that my x64...
  24. Discussioni: bypassing mac filters?

    by hhmatt
    Replies
    21
    Views
    12,362

    Re: bypassing mac filters?

    This sounds like a job for SPIKE and wireshark!
  25. Replies
    6
    Views
    5,519

    Re: Snort Signature Evasion with Metasploit

    Cool video! Thanks for sharing. :D
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4