Results 1 to 5 of 5

Thread: fast-track.py autopwn

  1. #1
    Just burned his ISO
    Join Date
    Dec 2007
    Posts
    3

    Default fast-track.py autopwn

    Just to clarify... i am a linux noob, and i am not guilty at all for using autopwn script... also i am using BT3 beta with the fast-track script

    When using the script, the host a personal firewall, and so i need to enable the -p0 option to nmap to avoid a fake dead host, but it gives me no chance to put any commands in...

    Is there any way to modify the script, or maybe when it asks for hosts i should put "-P0 xx.xxx.xxx.xxx"

    any clarification would be appreciated...

  2. #2
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    lol ....

    really ... ???

    it's a simple python script ! so text based ....

    open in kate ... edit save ...

    Rel1k should add an option for nmap command to use ...
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  3. #3
    Just burned his ISO
    Join Date
    Dec 2007
    Posts
    3

    Default

    thnx, im not familiar with the workings of python, because for the last 3 years ive been running perl exploits on cygwin... i finaly decided to convert to true linux

  4. #4
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    same as perl python is a interpreter. Should be obvious once you open the script.

  5. #5
    Member
    Join Date
    Feb 2006
    Posts
    167

    Default nmap

    All the nmap portions are really doing is taking what you enter and putting it into a predefined output. You can easily just type:

    -p0 192.168.1.1 in the field that asks you for the IP address without modifying the script at all

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •