First of all i wanted to thank for such a great thing as backtrack is that let me know how easy was to get into my wireless network and how easy is to break my windows password.
After learning the WEP/WPA breaking and some minor things I was trying to understand the exploit attacks. After watching some of pureh@te's videos I've realized that fast-track should be most easy to use. Well I was sadly mistaken coz it doesn't work for me. All the testing I was making at my private WLAN on my own and family computers + one try on friend's LAN with his allowance. The thing is after I shut down the firewalls nmap finds plenty of interesting ports open. Thus i launch fast-track with updated metasploit, autopwn option and sqlite 3 and it finds sometimes even around 100 possibilities (while I found on the pureh@te's movie it was i think 27 and after that he had few shells) but it goes all [-]exploit failed no matter how many of them he finds and on the end i have always 0 shells. All the machines are running with winXP with different updates. One system has not been updates for ages and it still doesnt work for me. I would just like to know if it's my bad luck or my lack of knowledge (I believe so). Could you please post me the links I should read in this case?
I know my both pentesting and English knowledge is extremely weak but that's why I'm posting on Newbie Area
Thanks in advance
Good friend of the forums
Post some of the nmap results here so we can have a look. I'd recommend against running an automated exploit tool when starting out. You should learn about the services you have and look for specific weaknesses.
It is my experience that Fast track is only going to work on an unpatched system. Try partitioning 10-20 gigs of HD or make a virtual machine to dedicate to an unpatched box and I think you will be more successful.
definitely a patched box. Following 0tt0v0nc4t's idea, get yourself a copy of windows 2000 and you will pulling up a view shells.
I'm piggy backing Metasploit's Exploit repository, when exploits come out, especially for Metasploit, they are generally either already patched or patched a few days after its released. I hate to tell you this, but 0 days aren't as easy to come by on a everyday basis.