Another great video mate
Yep another good vid tut.
Nice tune also.
Just one question one you have the remote shell can you call upon it at any time or once you close fastrack does access to that machine also close.
Once fast track is closed I personally don't know how to save the session so what I do is scroll back through the logs and note which exploits worked. Then I can open a metasploit console and use the exploit I know works with more exotic payloads such as the meterpreter .dll.
which is my next video I'm working on today. It will be a few parts. I will use windows to build a vnc backdoor and use metasploit to up load and execute it.
Some one else may know how to save the sessions in autopwn but I do not.
Thanks for the quick reply pureh@te.
Looking through the logs is a good enough answer for me.
in ezpawn i will launch autopawn via directly a msfconsole so you won't have pb to save your session after it ends........
Watch your back, your packetz will belong to me soon... xD
BackTrack : Giving Machine Guns to Monkeys since 2006
Thanks for the tutorial pureh@te. Its a shame it does not work on my xp sp2 i have following ports open
Starting Nmap 4.50 ( http://insecure.org ) at 2007-12-30 16:31 GMT
Interesting ports on testbox.home (192.168.1.64):
Not shown: 1705 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS webserver 5.1
139/tcp open netbios-ssn
445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
3389/tcp open microsoft-rdp Microsoft Terminal Service
5800/tcp open vnc-http RealVNC 4.0 (Resolution 400x250; VNC TCP port: 5900)
5900/tcp open vnc VNC (protocol 3.3; Locked out)
MAC Address: 00:16:010:7C:0B (Buffalo)
Service Info: OS: Windows
No sessions never mind.
I also noticed in video when you do
bt ~ # cd /pentest
bt pentest # ./fast-track.py
-bash: ./fast-track.py: No such file or directory
I am using bt3 i had to do cd /pentest/misc then fast-track.py
(just incase anybody cant find it lol)
Thank you again
That's because I was using backtrack 2 not 3 and when I installed fast track when rel1k first released it that's just where I put It. Thanks for pointing that out to people using bt3.
I am running bt3 and when i run fast track like the video my autopwn stops when it gets to here.
[*] Binding to 12345778-1234-abcd-ef00-0123456789ab:0.0@ncacn_np:192.168.1.64[\lsarpc] ...[*] Bound to 12345778-1234-abcd-ef00-0123456789ab:0.0@ncacn_np:192.168.1.64[\lsarpc] ...
it does nothing for about 5 minutes. Then my bt3 crashes and i have to reboot. Does anybody else get this. I might try on my bt2