também estou a disposição! abs
Type: Posts; User: sl33p; Keyword(s):
também estou a disposição! abs
Many of the VirtualBox Additions features doesn't work for BT4-R2 running on kernel:
root@bt:~# uname -r
- Auto-resize window
- Copy/paste between host and guest OS's
I am not able to build the wl.ko module when I try to perform the manual method.
Here is the result:
root@bt:/usr/local/src/broadcom-hybrid# make -C /lib/modules/`uname -r`/build...
Just tried out and the following error appeared:
How do I install "HTTP/DAV.pm"?
I guess that's a missing perl module.
I'm running BT4, the first one, not the R1 edition.
I am performing an authorized blackbox pentest (without any previous knowledge of the attacked network).
I need to know how to detect an external IPS/Firewall, because I think that...
Avid to learn as much as I can... :)
alternatively, in an 'old school' way of doing things on a Debian-based system, one could run:
#ifup eth0 (or whichever interface you wanna start)
instead of running the startup script...
Just as a note, I solved the problem by isntalling firewalk version 5.0 found on Google, and following the instructions here:
Thanks for your attention.
1. What would be a routing loop? How could I certify this behavior?
2. As far as I understood, what hping does: it sends a SYN-TCP packet with a TTL of 1 to obligate...
Many of you know how important is the analysis and planning of the targeted environment before the attempt of a successful penetration test.
I got the idea, and I am trying to draw...
I've set up a 'Persistant Changes' USB due to my need for security tools like firewalk running everytime I boot BT.
But... I couldn't even run the ./configure. It gives me the same...
I'm searching for an efficient method to encrypt a DVD so that the person who receives it would simply insert the password I previously set and visualize its contents.
So far, I tried...
As long as I was misinterpreted on my LinuxQuestions.org post:
h t t p://w w w .linuxquestions. org/questions/linux-newbie-8/linux-console-screenshot-command-760837/#post3713800
Ok Lupin, sorry! The method is yours. :rolleyes:
In fact, what I need to prove is that some files inside the disk were deleted, you know?
Like, I don't need to wipe the whole partition. Just...
Thanks guys for these bunch of tools. I have now lots of options.
No, I don't wanna destroy the disk, it's gonna be used again... :)
Special thanks to Lincoln who came out with this method...
Here is the thing:
There's confidential information in a client's system that could lead to major problems if this should fall into the wrong hands. ;)
I have to make sure the data...
thanks guys, I'll try to do the .bat and run it using SQLCMD.
As a note, the following example illustrates how to connect to a named instance of the SQL Server using Hostname and PORT number.
I have a simple but important question.
I'm performing a pentest to one specific server and discovered with nessus that SQL server is running on the 1433 port. The remote SQL Server...
Hey -=Xploitz=- !
Thanks for the nice and easy-to-follow video. I switched my AP to WPA-PSK encryption now, so I'm gonna try out the WPA one.
Hopefully I'll have success...
I would also...