Page 1 of 2 12 LastLast
Results 1 to 10 of 20

Thread: packet injection

  1. #1
    Senior Member BigMac's Avatar
    Join Date
    Jan 2008
    Posts
    213

    Default packet injection

    So i was talking to a guy about packet injection. . . he sed he would inject hackit onto a test machine. . .
    I would like to learn how to do something like this But all the tutorials i find on packet injection are for cracking wep.

  2. #2
    Moderator KMDave's Avatar
    Join Date
    Jan 2010
    Posts
    2,281

    Default

    Just to make it clear: you want to inject packets to a machine or a whole program?

    What did you try so far? Do you understand the concepts of packet injection or do you just want to have an easy to follow tutorial?
    Tiocfaidh ár lá

  3. #3
    Senior Member BigMac's Avatar
    Join Date
    Jan 2008
    Posts
    213

    Default

    A hole program. . . any tutorials would help. . .

  4. #4
    Moderator KMDave's Avatar
    Join Date
    Jan 2010
    Posts
    2,281

    Default

    Just a question, how do you think the program gets executed once it is on the machine? It seems that you didn't take the time to read up on packet injection and what it is used for.
    Tiocfaidh ár lá

  5. #5
    Senior Member BigMac's Avatar
    Join Date
    Jan 2008
    Posts
    213

    Default

    http://www.security-freak.net/packet...injection.html

    everything els i find on packet injection is more related to cracking wep. . . im not interested in cracking wep. . .

    So i would like to read more

  6. #6
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    Have you completed that tutorial yet and understood what is happening?

  7. #7
    Senior Member BigMac's Avatar
    Join Date
    Jan 2008
    Posts
    213

    Default

    i have a hard time understanding what the guy is saying. . .

  8. #8
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    So you want us to figure it out and then take the time to walk you through it?

  9. #9
    Senior Member BigMac's Avatar
    Join Date
    Jan 2008
    Posts
    213

    Default

    I was hoping there was a more up to date tutorial on this subject that one of you guys had. . .

  10. #10
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by BigMac View Post
    I was hoping there was a more up to date tutorial on this subject that one of you guys had. . .
    Before you went through the tutorial you gave the link to, did you go through the tutorial that the presenter said you should go through first?
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •