great tutorial thanks
yes...this is the problem...
great tutorial thanks
WHERE THERE IS A SHELL, THERE IS A WAY
Success is to be measured not so much by the position that one has reached in life as by the obstacles which he has overcome.
Hi Great video! I have a problem though when I attempt to brute force my router login. I get this error:
"192.168.1.1:80 No URI found that asks for authentication"
This confuses me because when you log into my router you do it through http.
Hello zimmaro, I am your shadow ! )
thanks for the video but all machines in my network are Windows 7 and 2003R2 or 2008R2 ! no luck!
good video but it will be better if you show us how we can export a report from OpenVas (greenbone) and import it to the metasploit!
and it will be awesome if you show me how setup openvas in backtrack 5r1, i have some problems with it!
if your machines are not vulnerable I can not do anything!
in bt5r1 (with Metasploit updated) autopwn function has been removed!
videos that are looking on the net (youtube, vimeo, securitytube ...)
i prefer nessus to openvas!
openvas I tried to use it in my first installation of BT5
now in the "fresh" installation of bt5r1 I saw some problems with my openvas!
you should ask in the right forum to people much prepare,expert then me !!!!!!!
remember: i'm a poor old goat who is trying to learn !!!
however, if you hear a solution could be linked to Ubuntu 10.04 you this but I DO NOT recommend it (out of repo):
i'm NOT RESPONSABILY if your bt5r1-BROKE
apt-get purge greenbone-security-assistant
apt-get purge openvas-cli openvas-manager openvas-scanner openvas-administrator
deb http://download.opensuse.org/reposit...xUbuntu_10.04/ ./ ####add this line to your repo###
apt-key adv --keyserver hkp://keys.gnupg.net --recv-keys BED1E87979EAFD54
apt-get -y install greenbone-security-assistant gsd openvas-cli openvas-manager openvas-scanner openvas-administrator
############copy & paste this "block in your terminal & wait######
test -e /var/lib/openvas/CA/cacert.pem || sudo openvas-mkcert -q
test -e /var/lib/openvas/users/om || sudo openvas-mkcert-client -n om -i
touch sudo touch /var/lib/openvas/mgr/tasks.db
chmod 600 /var/lib/openvas/mgr/tasks.db
bye zimmaro the G0at
the openvas-check-setup tool. You can find it here: http://www.openvas.org/setup-and-start.html
it works! i'm testing now!!!!!!!!!!!! (in my bt5r1 fresh install)
Execute the official wiki from this step onwards
openvasmd - rebuild
i make a screen-shot with my bt5r1(vbox) LOGGED today to openvas:
thank you very( much )^ 2! zimmaro
don't worry about my backtrack, it's in the virtualbox.
i will try this solution as soon as i can , and I'll inform you of the result ( if it works on my machine i will record a video for the public)
p.s : thanks for the screenshot.
If you want my advice use Nessus, in my opinion is better and interacts internally with Metasploit !!!!!!!!
root@zimmyhack:~# apt-get install nessus #install it from official repo
root@zimmyhack:~# /opt/nessus/sbin/nessus-adduser #add user+passwd(remember)
root@zimmyhack:~#firefox at http://www.nessus.org/register/ #obtain your home version register(nessus send you a mail with activation code)
root@zimmyhack:~# /opt/nessus/bin/nessus-fetch --register Exxx-Bxxx-Exxx-1Exx-54 #(register your activation code)
root@zimmyhack:~# /etc/init.d/nessusd start # start your nessus-"server"
if you want interact with metasploit:
root@zimmyhack:~# msfconsole -q #(my copy now is default 4.0.0 in bt5r1 if you not update MSF have AUTOPWN & 2 database aviable)
msf > db_driver postgresql #connect to database[*] Using database driver postgresql
msf > db_status #verify a status[*] postgresql connected to msf3
msf > workspace
msf > workspace -a myproject #add a "new-work-space"[*] Added workspace: myproject
msf > load nessus # NESSUS START INTERACT[*] Nessus Bridge for Metasploit 1.1
[+] Type nessus_help for a command listing[*] Creating Exploit Search Index - (/root/.msf4/nessus_index) - this wont take long.[*][*] It has taken : 125.384663903 seconds to build the exploits search index[*] Successfully loaded plugin: nessus )))))))
msf > nessus_help
Command Help Text
nessus_connect Connect to a nessus server
nessus_save Save nessus login info between sessions
nessus_logout Logout from the nessus server
nessus_help Listing of available nessus commands
nessus_server_status Check the status of your Nessus Server
nessus_admin Checks if user is an admin
nessus_server_feed Nessus Feed Type
nessus_find_targets Try to find vulnerable targets from a report
nessus_server_prefs Display Server Prefs
nessus_report_list List all Nessus reports
nessus_report_get Import a report from the nessus server in Nessus v2 format
nessus_report_hosts Get list of hosts from a report
nessus_report_host_ports Get list of open ports from a host from a report
nessus_report_host_detail Detail from a report item on a host
nessus_scan_new Create new Nessus Scan
nessus_scan_status List all currently running Nessus scans
nessus_scan_pause Pause a Nessus Scan
nessus_scan_pause_all Pause all Nessus Scans
nessus_scan_stop Stop a Nessus Scan
nessus_scan_stop_all Stop all Nessus Scans
nessus_scan_resume Resume a Nessus Scan
nessus_scan_resume_all Resume all Nessus Scans
nessus_plugin_list Displays each plugin family and the number of plugins
nessus_plugin_family List plugins in a family
nessus_plugin_details List details of a particular plugin
nessus_user_list Show Nessus Users
nessus_user_add Add a new Nessus User
nessus_user_del Delete a Nessus User
nessus_user_passwd Change Nessus Users Password
nessus_policy_list List all polciies
nessus_policy_del Delete a policy
msf > nessus_connect root:email@example.com:8834 #connect to "nessus-server with your CREDENTIAL[*] Connecting to https://127.0.0.1:8834/ as root[*] Authenticated
This video was made by the big sickness is a perfect guide:
regards zimmato the goat brain
Zimmaro, thanks for your advice but I'm living in IRAN!, i can't get activation code\registration key from my country, i must use VPN to activate nessus! ( in IRAN VPNs are not Allowed due to anti-censorship usages!)
for OpenVas i still prefer using backtrack4r2.
Last edited by bolexxx; 12-26-2011 at 07:25 PM.