Search:

Type: Posts; User: sl33p; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    22
    Views
    10,242

    Re: [Projeto] Revista BackTrack-Br

    também estou a disposição! abs
  2. Replies
    13
    Views
    16,853

    Re: Backtrack 4r2 and Virtualbox Guest Additions

    Many of the VirtualBox Additions features doesn't work for BT4-R2 running on kernel:


    root@bt:~# uname -r
    2.6.35.8

    Including:

    - Auto-resize window
    - Copy/paste between host and guest OS's
  3. Replies
    33
    Views
    301,262

    Re: Getting BROADCOM Wireless to work in BackTrack!

    Hi,

    I am not able to build the wl.ko module when I try to perform the manual method.
    Here is the result:


    root@bt:/usr/local/src/broadcom-hybrid# make -C /lib/modules/`uname -r`/build...
  4. Replies
    3
    Views
    10,617

    Re: DAVTest: Test fast and exploits for WebDAV Servers

    Just tried out and the following error appeared:



    How do I install "HTTP/DAV.pm"?
    I guess that's a missing perl module.
    I'm running BT4, the first one, not the R1 edition.

    Thanks in...
  5. Replies
    7
    Views
    3,589

    how to detect an external IPS or firewall

    Hi guys,

    I am performing an authorized blackbox pentest (without any previous knowledge of the attacked network).

    I need to know how to detect an external IPS/Firewall, because I think that...
  6. Discussioni: Official hello thread

    by sl33p
    Replies
    1,439
    Views
    202,182

    Sticky: Re: Official hello thread

    hello guys!

    Avid to learn as much as I can... :)

    sl33p
  7. Replies
    102
    Views
    715,460

    Sticky: Re: How to Start Networking in Backtrack

    alternatively, in an 'old school' way of doing things on a Debian-based system, one could run:

    #ifup eth0 (or whichever interface you wanna start)

    instead of running the startup script...
  8. Replies
    4
    Views
    5,311

    Just as a note, I solved the problem by...

    Just as a note, I solved the problem by isntalling firewalk version 5.0 found on Google, and following the instructions here:
    ...
  9. Replies
    7
    Views
    4,165

    Thanks for your attention. 1. What would be a...

    Thanks for your attention.

    1. What would be a routing loop? How could I certify this behavior?
    2. As far as I understood, what hping does: it sends a SYN-TCP packet with a TTL of 1 to obligate...
  10. Replies
    7
    Views
    4,165

    can the TTL increase through the network path?

    Hi folks,

    Many of you know how important is the analysis and planning of the targeted environment before the attempt of a successful penetration test.

    I got the idea, and I am trying to draw...
  11. Replies
    4
    Views
    5,311

    Hi guys, I've set up a 'Persistant Changes'...

    Hi guys,

    I've set up a 'Persistant Changes' USB due to my need for security tools like firewalk running everytime I boot BT.

    But... I couldn't even run the ./configure. It gives me the same...
  12. Replies
    1
    Views
    846

    Encrypting Data on a DVD

    Hi there!

    I'm searching for an efficient method to encrypt a DVD so that the person who receives it would simply insert the password I previously set and visualize its contents.

    So far, I tried...
  13. Replies
    7
    Views
    1,923

    [Linux Console] Screenshot command?

    Hi guys,

    As long as I was misinterpreted on my LinuxQuestions.org post:
    h t t p://w w w .linuxquestions. org/questions/linux-newbie-8/linux-console-screenshot-command-760837/#post3713800

    I...
  14. Replies
    27
    Views
    5,532

    Ok Lupin, sorry! The method is yours. :rolleyes:...

    Ok Lupin, sorry! The method is yours. :rolleyes:

    In fact, what I need to prove is that some files inside the disk were deleted, you know?
    Like, I don't need to wipe the whole partition. Just...
  15. Replies
    27
    Views
    5,532

    Thanks guys for these bunch of tools. I have now...

    Thanks guys for these bunch of tools. I have now lots of options.
    No, I don't wanna destroy the disk, it's gonna be used again... :)

    Special thanks to Lincoln who came out with this method...
  16. Replies
    27
    Views
    5,532

    Linux tools to wipe out a hard drive

    Hi guys!

    Here is the thing:

    There's confidential information in a client's system that could lead to major problems if this should fall into the wrong hands. ;)

    I have to make sure the data...
  17. Replies
    4
    Views
    2,410

    thanks guys, I'll try to do the .bat and run it...

    thanks guys, I'll try to do the .bat and run it using SQLCMD.

    As a note, the following example illustrates how to connect to a named instance of the SQL Server using Hostname and PORT number.

    ...
  18. Replies
    4
    Views
    2,410

    SQL Server brute forcing?

    Hi guys,

    I have a simple but important question.

    I'm performing a pentest to one specific server and discovered with nessus that SQL server is running on the 1433 port. The remote SQL Server...
  19. Sticky: Tks!

    Hey -=Xploitz=- !

    Thanks for the nice and easy-to-follow video. I switched my AP to WPA-PSK encryption now, so I'm gonna try out the WPA one.
    Hopefully I'll have success...

    I would also...
Results 1 to 19 of 19