«
Expand/Collapse
176 items tagged "General"
Related tags:
network [+],
bt4 [+],
Support [+],
quot [+],
google [+],
windows [+],
penetration [+],
bssid [+],
vulnerability [+],
vmware [+],
metasploit [+],
lan [+],
Discusion [+],
testing [+],
sql injection [+],
question [+],
password [+],
mac [+],
internet [+],
hdd [+],
error [+],
drive [+],
boot [+],
wlan [+],
wifi [+],
wep [+],
web [+],
use [+],
time [+],
thanks in advance [+],
system [+],
security [+],
sebastian fernandez [+],
productivity tool [+],
problem [+],
partition [+],
package [+],
nat [+],
magictree [+],
login [+],
krakow [+],
hey guys [+],
hacker [+],
fusion [+],
everyone [+],
ettercap [+],
directory [+],
course [+],
classifieds script [+],
classifieds [+],
china [+],
card [+],
airodump [+],
Software [+],
Discussion [+],
wpa [+],
work [+],
wireless networks [+],
wikileaks [+],
wifi card [+],
while [+],
way [+],
version [+],
ubuntu [+],
type [+],
txt [+],
tool [+],
startx [+],
site [+],
server [+],
root [+],
request [+],
remote exploit [+],
port [+],
policy [+],
podria [+],
pockets [+],
playstation 3 [+],
playstation [+],
player [+],
php [+],
persistent changes [+],
output [+],
oracle [+],
monitor [+],
microsoft [+],
meterpreter [+],
member [+],
m arp [+],
list [+],
lindo [+],
laptop [+],
issue [+],
iphone [+],
intel [+],
infosec [+],
informacion [+],
home [+],
hackers [+],
grub [+],
gig [+],
foro [+],
fatal server error [+],
encryption [+],
elearnsecurity [+],
drive cache [+],
download [+],
disk [+],
dell inspiron [+],
deb [+],
corriendo [+],
confidence [+],
computer science [+],
bt3 [+],
broadcom [+],
attorney [+],
arp [+],
app [+],
anybody [+],
alfa [+],
aircrack [+],
access [+],
read [+],
darknet [+],
zero day [+],
zero [+],
yahoo answers [+],
xss [+],
xrandr [+],
xorg [+],
x [+],
wrt [+],
wpa supplicant [+],
wpa key [+],
worm [+],
world [+],
workstation [+],
work in progress [+],
wordlist [+],
word list [+],
wireshark [+],
wireless signal [+],
winrar password [+],
winrar [+],
windows registry [+],
windows boot [+],
wikipedia [+],
wep keys [+],
wep crack [+],
welcome thanks [+],
weird stuff [+],
weird reason [+],
web hacking [+],
web application security [+],
wasent [+],
voip [+],
vmware workstation [+],
vmware tools [+],
vm player [+],
vm machine [+],
vlc [+],
vista [+],
virtual machine [+],
virtual drives [+],
video training [+],
video [+],
victim machine [+],
variants [+],
username [+],
user [+],
usd [+],
usb wireless [+],
usb memory stick [+],
usb devices [+],
usb [+],
urlsnarf [+],
unsupport [+],
unrar [+],
united states [+],
uninstall [+],
ubuntu repositories [+],
u.s. i [+],
u.s. [+],
tx power [+],
torrent [+],
toronto [+],
top [+],
todays [+],
today [+],
tjx [+],
tinfoil hat [+],
time microsoft [+],
til [+],
tiempo compartido [+],
the rise [+],
than iloveyou [+],
text shell [+],
tester [+],
terabyte hard drive [+],
target network [+],
target [+],
tar bz2 [+],
taiwan [+],
ta mapper [+],
system options [+],
system memory [+],
system boots [+],
system administrator [+],
synaptic [+],
sunbelt software [+],
sunbelt [+],
sudo [+],
stupid thread [+],
stopping [+],
station [+],
static ip [+],
static [+],
start [+],
standalone application [+],
ssid [+],
ssh [+],
ssd [+],
sr 1 [+],
spreading [+],
sparky [+],
source codes [+],
source [+],
sound [+],
sony playstation [+],
sony data [+],
sony [+],
something [+],
someone [+],
somebody [+],
solid state disk [+],
software sector [+],
social engineering [+],
small [+],
slides [+],
slackware [+],
sipdump [+],
sipcrack [+],
simple request [+],
simple [+],
signal [+],
side [+],
shut [+],
sha1 [+],
sha [+],
servey [+],
servers [+],
server error [+],
server connection [+],
sending [+],
seized [+],
security vulnerability [+],
security specialist [+],
security lab [+],
security experts [+],
security community [+],
security assessment [+],
seattle computer [+],
seattle [+],
search freedom [+],
sdc [+],
scripts [+],
script sql [+],
script kiddies [+],
script files [+],
script [+],
scribs [+],
screen [+],
school [+],
sans giac [+],
samurai [+],
salt [+],
rtt [+],
router [+],
rosa [+],
root shell [+],
root login [+],
root folder [+],
room quality [+],
room [+],
rj 45 [+],
rival [+],
rioters [+],
right direction [+],
rhce [+],
retaliation [+],
resolutions [+],
resolution problem [+],
resolution [+],
repositories [+],
releases [+],
released [+],
registry [+],
redes de internet [+],
recovery [+],
reading database [+],
rar [+],
range error [+],
range [+],
radeon [+],
quirk [+],
quiet weekend [+],
quiet 1 [+],
questio [+],
que es un hacker [+],
quality [+],
pyrit [+],
pxe [+],
pwb [+],
public ip [+],
protection mechanism [+],
proper location [+],
project ideas [+],
project [+],
program settings [+],
professional training [+],
professional certs [+],
productivity [+],
privacy policies [+],
priority 1 [+],
prefix [+],
pre [+],
portscan [+],
port 31337 [+],
poor attitude [+],
political [+],
police [+],
point web [+],
point [+],
pmks [+],
place [+],
phishing [+],
perpose [+],
permission [+],
period of time [+],
penetration testers [+],
payload [+],
patch [+],
pasword [+],
pass [+],
partions [+],
parallels [+],
pain in the ass [+],
output options [+],
out [+],
org uk [+],
opn [+],
openvas [+],
openoffice [+],
online [+],
omni antenna [+],
office router [+],
office [+],
oci [+],
ntfs partition [+],
nothing [+],
notebook [+],
nmap [+],
niche companies [+],
new member [+],
new malware [+],
new mac [+],
new kid on the block [+],
new [+],
networkmanager [+],
network security [+],
network interface [+],
network discovery [+],
network cards [+],
netwerk [+],
netiquette [+],
netiqueta [+],
netbook [+],
need [+],
necessary files [+],
nbsp [+],
natural progression [+],
national [+],
name [+],
my own [+],
msf [+],
mouth [+],
mon [+],
modprobe [+],
modes [+],
mode [+],
mobility radeon [+],
mobile radeon [+],
mkdir [+],
missing files [+],
min [+],
million [+],
military network [+],
microsoft patch [+],
microsoft acquisition [+],
metasploit framework [+],
messagelabs [+],
message code [+],
menu bar [+],
menu [+],
memory [+],
mcdonald [+],
mapper [+],
malware [+],
malicious code [+],
malaysian government [+],
magicjack [+],
machine [+],
macchanger [+],
macbook [+],
mac spoofing [+],
mac side [+],
mac address [+],
lukas lueg [+],
lukas [+],
loopback [+],
london riots [+],
london [+],
login root [+],
logical block [+],
location data [+],
livecd [+],
literature [+],
linux source [+],
linux partition [+],
lineamientos [+],
line thanks [+],
lilo [+],
lhost [+],
length [+],
last time [+],
last chance [+],
lab [+],
kismet [+],
kind [+],
kid on the block [+],
keyboard [+],
kernal [+],
kde [+],
jon [+],
jobby [+],
jacky [+],
jack of all trades [+],
iso [+],
ipadress [+],
ip list [+],
internet wireless [+],
internet menu [+],
internet explorer [+],
internal hd [+],
interface card [+],
intel pro [+],
intel graphics media accelerator [+],
intel 945 chipset [+],
installation [+],
insmod [+],
initrd [+],
infosec world [+],
informtico [+],
information systems management [+],
information security industry [+],
information [+],
india central [+],
india and pakistan [+],
incident database [+],
incident [+],
import sys [+],
import [+],
imagem [+],
imac [+],
ieee [+],
i ca [+],
hypervisor [+],
https [+],
http [+],
how to connect to a wireless network [+],
host os [+],
host ip [+],
host [+],
home directory [+],
hibernate [+],
hhd [+],
heydays [+],
hey everyone [+],
hey [+],
help [+],
hello everyone [+],
hardware drivers [+],
hard [+],
handshake [+],
handler [+],
hackers de software [+],
hacker web [+],
hacker training [+],
hacked [+],
guy [+],
grupo de noticias [+],
grub boot loader [+],
group [+],
greetings [+],
graphics card [+],
graphical mode [+],
graphic driver [+],
graphic cards [+],
graphic [+],
government [+],
good resources [+],
gnu general public license [+],
gnome [+],
gigabit network [+],
ghz [+],
germany [+],
generico [+],
generator [+],
general mills [+],
gateway ip [+],
full [+],
freeze [+],
free education [+],
france [+],
forwarding [+],
forum search [+],
foreign [+],
flash player 10 [+],
flash drive [+],
firefox [+],
fine [+],
federal grand jury [+],
federal authorities [+],
fatal [+],
fashion [+],
farmacia [+],
fantastic forum [+],
extracting rar files [+],
external hdd [+],
external hd [+],
export limits [+],
export [+],
explorer [+],
exploit [+],
example source [+],
everybody [+],
ethical hacker [+],
eth [+],
error code 15 [+],
entire system [+],
email [+],
eee [+],
easynote [+],
dual boot with windows [+],
dual boot [+],
drivers windows [+],
driver 1 [+],
driver [+],
driftnet [+],
dongle [+],
domain admin [+],
dock [+],
dns provider [+],
distro [+],
directory code [+],
dhcp [+],
dhclient [+],
device [+],
destination port [+],
desktop [+],
dell inspiron b130 notebook [+],
dell [+],
delema [+],
delay [+],
default system [+],
default [+],
dd wrt [+],
day [+],
datacredito [+],
database servers [+],
database [+],
data execution prevention [+],
data consolidation [+],
data breach [+],
d link router [+],
cyberterrorism [+],
cyber terrorism [+],
cyber army [+],
custom [+],
cryptography [+],
critical error [+],
crimen [+],
cpu core [+],
correo [+],
continuous improvements [+],
connectivity [+],
connectionnotestablished [+],
connection [+],
connect [+],
confirms [+],
configuring [+],
conclusive answer [+],
computing [+],
computer security expert [+],
computer [+],
command execution [+],
command [+],
com [+],
coliseum [+],
cold fusion application [+],
codename [+],
code [+],
co workers [+],
cloud [+],
clicks [+],
click [+],
cleared [+],
class [+],
cipher strength [+],
chntpw [+],
chinese hackers [+],
chinese [+],
chiba [+],
channel 11 [+],
channel [+],
cfdisk [+],
cause [+],
cannot [+],
california attorney general [+],
california [+],
cable side [+],
buzz [+],
busybox [+],
business [+],
building a shed [+],
budget [+],
bridge [+],
bootable usb [+],
book [+],
bomb [+],
board search [+],
board [+],
bluetooth [+],
blah blah [+],
bit [+],
bios settings [+],
bios boot [+],
bios [+],
bin [+],
bcm [+],
basic linux books [+],
bar [+],
band [+],
awus [+],
authors [+],
auth [+],
audio [+],
attorney general [+],
ati driver [+],
atheros [+],
atapi device [+],
assistance [+],
assignement [+],
arphrd [+],
anyone [+],
anonymous [+],
anonplus [+],
anon [+],
anna kournikova [+],
amp [+],
amazon [+],
alpha [+],
alot [+],
albert gonzalez claims [+],
albert gonzalez [+],
albert [+],
ahci [+],
advice [+],
adminstrator [+],
administration side [+],
admin [+],
activerecord [+],
acquistare [+],
acquires [+],
accused [+],
accurate estimation [+],
access point [+],
ability [+],
Skype [+],
Release [+],
Newbie [+],
500gb hard drive [+],
10min [+],
hacking [+],
news [+],
BackTrack [+]
-
-
18:08
»
remote-exploit & backtrack
Hi folks
I'm not an expert here but I have used backtrack many time to learn linux in the most fun way (hack to learn and not learn to hack). I have been using your tools since the early remote-exploit and I want to thank you very much.
Now sorry for the dump question. But I have seen an AP router on the net with usb that can be used in conjunction with the Alfa wireless like a bridge.
Now I got a friend who is building a shed at about 900mt 1km (clear line of sight and no other wifi to interfear with) away from he's house and I was thinking to put wrt54g on one side with a pannel antenna and on the otherside an Alfa wireless 1w attached to this bridge AP.
Now before we spend any money I would like to know if it's possible to make it works with my WRT600n router with DD-WRT. Why ? because I got everything and I could try that tommorow. I asked our friend google but he doesn't know eather.
Does any one know if it's possible use my WRT600n usb to work with Alfa?
Also if you had to plan something like that would you use the band B/G or the Band A? I had look around and apparently Band 5.8mhz travel futher?
p.s
Excuse my english :-)
-
-
13:47
»
remote-exploit & backtrack
I've made myself a problem I cant figure out. . .
Code:
cat ~/.scribs/bin/ds1
#!/usr/bin/env python
import sha
import sys
SALT = sys.argv[1]
PASS = sys.argv[2]
HASH = sha.new(sha.new(SALT + PASS).hexdigest()).hexdigest()
print HASH.upper()
I have written this in python and am try to crack the pass with john, but am not sure how to tell john to encrypt with sha1 twice.
here is a sample hash:
B2CDFEA7E83FD36763E55C0FC6577D039BE005A2
Which is 'saltpass' in plain text.
I can crack it with:
Code:
for pass in `crunch 1 4 abcdefghijklmnopqrstuvwxyz0123456789 -t @@@@`;
do echo salt$pass:`ds1 salt $pass` | grep B2CDFEA7E83FD36763E55C0FC6577D039BE005A2;
done
How should I go about testing it against john? Is adding a new format and recompiling the only solution?
-
-
13:45
»
remote-exploit & backtrack
Hello, friends.
Do you know about any manner to increase the (allways short: 10 or so) number of Static DHCP List that routers use to have?
I am talking about the IP assignement that a certain MAC connecting to the local network will have.
Thanks :).
-
-
19:41
»
remote-exploit & backtrack
Hi everyone, I feel like a bit of a goose regarding this issue but after searching and searching I still can't find my answer so I was hoping someone could shed some light on this for me.
The problem I am having is that when I try to output an nmap scan using metasploit for example:
msf> db_nmap -v -sV 192.168.238.100 -oA /home/output
I only get the grepable output and not the other major outputs, if I specify that I want xml output it wont produce any output at all.
However if I am using nmap as a standalone application all the output options and formats work as they should.
I'm running Backtrack 4 R1, with Metaspolit 3.4.2-dev and nmap 5.35DC1.
-
-
18:45
»
remote-exploit & backtrack
Hi!
This is a simple request, can we please have the ability to use https with the forum?
I like this place, I'ld like it to be safe from sniffing.
Thanks :)
-
-
14:18
»
remote-exploit & backtrack
Sorry its been a while since i been here as well as use BT4-pre Final.
My question is that or may i say my concern is, i have alot of things customized and stored on my vmware with bt4-pre final installed. And since i haven't used it for a while i forgot how to use a few things....
But if i open it up as of right now, those things would comeback to memory.
Q: if i were to upgrade to backtrack 4 final, can i or will i still be able to keep everything on bt4 pre final intact ?
-such as notes, personal .sh scripts, settings, etc...
cause i dont want to upgrade and forget how to do this, that, and the third. I remember updating the kernal on bt4-pre and that was a pain in the ass, but i got through.
-
-
15:20
»
remote-exploit & backtrack
Hey guys,
I installed my backtrack 4 final on my laptop and it was containing windows vista , in vista i was able to connect to my wireless connection easily , but when i removed vista and installed backtrack , i couldn't connect to any because it didn't even find any wireless !
I googled for that and found a lot of commands , like ifconfig wlan0 up and dhcpcd and so on , but when i enter ifconfig wlan0 up , it says that there isn't wlan0 network to up it ! ( im also using wicd manager and every time i click on Refresh it says that there isn't any wireless connection , so this issue - as i think - is about finding the wireless connection and then i think it's easy to connect if i found it )
This is my issue about the wireless , my question is how can i scan and find the wireless connection and connect to it .
Regards
Jacky
-
-
4:21
»
remote-exploit & backtrack
Hello there,
(I used the board search, before :) )
So, i have one question:
Is there a tool on backtrack that supports faster password recovery via solid state disk and rainbowtables? Because i read of special prepared rainbowtables (on h-online[dot]com), which are able to have a better performance in recovering NTLM passwords.
Thanks in advance,
tiger
-
-
11:44
»
remote-exploit & backtrack
Hello guys I just needed some advice as I know alot of profesionals live on these forums and may be able to help me.I was looking to get into it security and i am lucky enough to get free education in order to pursue that.I was researching and I would like to know if going for a degree in computer science and information would be a good start for this.Thanks in advance for any help.
-
-
8:06
»
remote-exploit & backtrack
I just installed kde4 using synaptic, but kde3 seems to still be everythings default.
System options, themes, window manager, everything is still kde3.
How can I remove kde3 completely?
-
-
9:11
»
remote-exploit & backtrack
This may be more of a kde issue but it is doubtful.
after running apt-get install openoffice.org-core I have no openoffice in my kmenu to launch i dont want to have to load openoffice programs from command line
thanks to anyone who can help
-
-
4:09
»
remote-exploit & backtrack
Hi,
I have just create BT4 on my HDD using the install.sh on the desktop.
Everything worked fine. Booting and BT4 is working.
But the
Hibernate ("suspend to disk") does not work.
"suspend to RAM" does work well, but to DISK its doesn't.
What should I do?
thanks
dani
-
-
7:55
»
remote-exploit & backtrack
I am having issues booting backtrack from grub4dos on a NTFS partition. Is this possible? It boots but then pauses at the following screen..
well I cant post links until i have posted 15 times..
basically it says
Loading, please wait...
sd 6:0:0:0: [sdc] Assuming drive cache: write through
sd 6:0:0:0: [sdc] Assuming drive cache: write through
It just freezes here.
-
-
8:23
»
remote-exploit & backtrack
hey guys i need help in this any one have any idea about how does Access Point Web-Based login works and how to hack that ? i want to know how does exactly that work ?and as well as to hack it
-
-
14:00
»
remote-exploit & backtrack
Hi,
Opened the Backtrack 4 Final Imagem in VMWare Fusion (mac) and everything seems ok but the resolution.
The maximum it allows is 1024x768 witch is not the native screen resolution.
Already tried to reinstall the vmware-tools but no differences.
Thank you in advance
-
4:20
»
remote-exploit & backtrack
Ok, upon testing Metasploit and not getting sessions when I should have been, I have concluded it may have something to do with Port forwarding not being enabled.
I know how to forward ports, type 192.168.xx.x into my browser, supply my login details, and then go to port forwarding and configure, however my only unsurity is, officly i have two different Ip's between my primary OS machine and my VM machine when I switch onto backtrack, example my OS ip is 192.168.xx.xx and my BT IP is 10.0.2.xx so when i Type 192.168.xx.x into my primary OS browser and forward ports will the changes apply when I boot my Backtrack also, or is a different process required for that?Hope you can provide some clarity.
-
-
22:19
»
remote-exploit & backtrack
tengo una duda a ver si alguien me podria explicar mi duda
resulta que cuando hago el proceso de aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface) me sale que esta read pockets y estan corriendo los numeros de pockets pero pockets send me sale 0 y nada mas
aver si alguien de este lindo foro me podria explicar el por que? o si algo estoy hade antemano gracias y saludos a este lindo foro
-
22:19
»
remote-exploit & backtrack
tengo una duda a ver si alguien me podria explicar mi duda
resulta que cuando hago el proceso de aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface) me sale que esta read pockets y estan corriendo los numeros de pockets pero pockets send me sale 0 y nada mas
aver si alguien de este lindo foro me podria explicar el por que? o si algo estoy hade antemano gracias y saludos a este lindo foro
-
14:25
»
remote-exploit & backtrack
Hey guys, I'm trying to figure out how to ssh into a Metasploit reverse tcp handler running on my home machine. I case that's a little confusing, I have a machine on my home network with a Metasploit handler running. I can ssh into the box, but I'd like to be able to control that specific console. I don't know if this is possible or not and lots of searching hasn't gotten me anywhere, so here I am... Any help would be appreciated :)
-
-
15:38
»
remote-exploit & backtrack
I am using a laptop and it has a Broadcom network adapter.
When I open Kismet, it says something like "no networks detected".
What can I do to make it detect networks? There are plenty of networks, including mine in the area. If you need any more information, let me know. If you need information from a terminal, tell me what to type.
also, how would you connect to a wireless network? the program in the internet menu that says something like network manager does not open.
-
-
17:47
»
remote-exploit & backtrack
Hi
To me, some metasploit auxilliary/modules of oracle such as oracle_login, dbms_export_extension don't work any more.
The warnings are such as "OCI" error (ruby-oci8). Even though I've successfully installed it in new fresh Ubuntu ruby, I can't still run oracle modules
According to my knowledge, BT4 has already had ->
metasploit com/redmine/projects/framework/wiki/OracleUsage
Metasploit Framework - OracleUsage - Metasploit Redmine Interface
Any ideas?
-
13:06
»
remote-exploit & backtrack
I am wondering if I am able to install from standard Ubuntu 9.10 or 10.04 (when released) Repositories on a BackTrack 4 (final) Hard Drive install? I want to use BackTrack4 as my primary OS, but I am guessing I may want some other programs that I use from the Ubuntu Repositories as well. I would like to install them from the Repositories for consistency, if possible. So basically I am asking if I add Ubuntu repositories into BackTrack4, will they work and/or will I run into any major issues? I know its Ubuntu based, but wasn't sure if the kernel was different or other issues which may cause serious issues.
Thanks,
Sparky
-
5:30
»
remote-exploit & backtrack
I ran bt3 on my laptop it works except for sound and i cant start a network tried the /etc/init.d/networking start and nothing, i tried bt4 final i get a fatal error no screens found etc.... on startx but wireless and lan work i ran it after startx failed. iam using a laptop with ati mobility radeon hd5470. what should if do, its weird that the older version is able to run with my graphics card but in the new one it wont.
thanks
-
5:12
»
remote-exploit & backtrack
How you find ideas for articles, I am always lack of new ideas for articles. Some tips would be great
-
-
23:13
»
remote-exploit & backtrack
Not sure where to post this but I wanted to ask if anyone has heard of National Clicks?
Can someone help me find it?
Overheard some co-workers talking about it all week but didn't have time to ask so I thought I would post it here to see if someone could help me out.
Seems to be getting alot of buzz right now.
Thanks
-
18:49
»
remote-exploit & backtrack
whenever i put certain commands into the konsole that use my interface wlan0 i'll get this error message :
Code:
root@bt:~# airodump-ng wlan0
ioctl(SIOCSIWMODE) failed: Device or resource busy
ARP linktype is set to 1 (Ethernet) - expected ARPHRD_IEEE80211,
ARPHRD_IEEE80211_FULL or ARPHRD_IEEE80211_PRISM instead. Make
sure RFMON is enabled: run 'airmon-ng start wlan0 <#>'
Sysfs injection support was not found either.
it just started happening in bt4, to get it to work again i have to disconnect the adapeter and reconnect it.
im assuming it's only doing this when i connect to my router by iwconfig wlan0 mode managed essid.. .... . .. ..
and when i disconnect it of course im disconnected from the router but im able to airodump-ng plus other things i couldnt.
does this message mean my adapter can't multi task or something?
-
15:46
»
remote-exploit & backtrack
Hello, when i type startx i get the following error:
Fatal server error: no screens found
i tryed "sudo dpkg-reconfigure xserver-xorg" but it doesnt work.
I have a notebook with an i5 M 540 and an ATI Mobile Radeon HD 5650
Its an EasyNote TJ75 notebook of Packard bell 6gb ram. My Screen-res: 1366x768
What now`?
-
-
18:00
»
remote-exploit & backtrack
Hello, could somebody please tell me how I'm able to totally reset my password? My laptop conveniently saved my password but I cannot remember it so now I need to totally reset it.
Regards
AssosutsmoosE
-
0:58
»
remote-exploit & backtrack
Hi guys,
I've slackware 64 bit installed in partition sda1.
The BT4's installation is in sda3.
Now, if I install GRUB from BT4, I can boot BT4 without problem... but I can't boot Slackware (I can see it, but if I start nothing happens).
Same with Slackware, after installing LILO and added BT4 I can boot slackware but not backtrack (this time, I start BT and it hangs on USB devices, I have nothing attacched and it seems like it stops at the card reader).
I've acer aspire 5735z
I used BT for a long time without problem, this is the first time that I dual - boot.
Hope you can help!
Thanks
-
-
15:19
»
remote-exploit & backtrack
I recently installed BackTrack 4 on my macbook pro. While the installation for backtrack completed successfully, the mac side had an error. When partitioning the hard drive, I made the BackTrack 4 the root and left the mac side of the hard drive to the default that it had been set at. After installing BackTrack the mac side of the computer was not seen. When looking at the partition in BackTrack I saw that the mac side was not recognizable. I do not think the partition was wiped clean, but at the same time, I have no idea how to get it back and running. Any help is greatly appreciated!
-
11:44
»
remote-exploit & backtrack
i type xrandr to see resolutions and it sais minimum 640x480 and max 800x600 but my monitor supports up to 1280x1024 and when i type xrandr -s 1280x1024 it says it cant find it on supported modes.
how to i change it above 800x600??
-
9:24
»
remote-exploit & backtrack
in bt3 it used to work fine but now im having some problems with them.
i have 3 scripts i just plug in when i want to network sniff
its:
Code:
ettercap -T -q -p -M ARP // //
Code:
driftnet -a -d /root/pics -s -p -i wlan0
Code:
urlsnarf -i wlan0
ettercap doesnt even want to start. it will say listening on eth0 for some reason and then this stuff and then FATAL: MITM attacks can't be used on unconfigured interfaces.
as for driftnet and urlsnarf, they dont even sniff the network! they only grab pictures and urls from the pages i visit on that computer.
is there something wrong here? something i need to install or what?
thanks for replies.
-
-
10:27
»
remote-exploit & backtrack
Hey guys!
I have to do some bachelor work at university and I thought about writing about "
Attacking Database Servers".
I mainly want to focus on Network Discovery, Common and Specified Attack Scenarios and Protection Mechanism.
I do
NOT want to focus on SQL Injection (I might add a little chapter on effects but not on how do SQL Inject an application), I really want to write about attacking the database servers as itself, not via an application.
I would be glad about every literature or input you know oh this topic, mainly about Oracle, MSSQL and MySQL.
I thought about The Database Hacker's Handbook: Defending Database Servers as main literature but everything else would be really appreciated since I need a lot of different literature.
Thanks in advance
-=R=-
-
-
5:51
»
remote-exploit & backtrack
Hello everyone my keyboard was working fine then all of a sudden it started acting up. Now when I boot into linux the keyboard works fine till I start the Xsever. At first I thought that the keyboard stopped working so I restarted it and still had the same problem. I ended up restarting it 8 times then I finally got pissed off and started to hit the keyboard now when I was done hitting it I kinda kept my hand on it and noticed it still types but I have to hold it for a long period of time for it to start typing. I have to hold the button for like 1-2 Sec for it to type one letter. Then i checked the keyboard setting and they where fine so any suggestions would be great.
Please Please get back to me on this I really don't want to reinstall it.
-
1:57
»
remote-exploit & backtrack
hi bt users
i am trying to give my username at login prompt as
bt login: root
i get a response incorrect login
how do i go around this
presently i am typing this thread via recovery mode which gave me a root shell and also took my password
why am i not allowed in normal login?
-
-
7:11
»
remote-exploit & backtrack
i have d-link dwl 2100 ap connected to biquied patch using low-loss coxial cable it works like charm can this be done to usb dongle so that i can put the antenna which comes with the dongle far to get better range or to extend it.if yes how long the coxial cable should be.the usb dongle gives 20 dbm connected 2 dbi omni antenna.?
if that can't be done.i have d-link dwl-2100 ap it acts as repeater also but thing is that you should put the root wep. i need to crack the root acess point wep.using my acess point as repeater then seat near my acess point with dongle connected to laptop.(the root acess point is mine) i have to do that.i wanna do this for eductianal perpose only. not for illegeal activites so i'm wondering is there a way to do that? if it works great .
is there a way since d-link have site serveuy ....site serveuy acts like airodump-ng in wifi . i'm trying to find a way to crack wep using the acesspoint since it have site servey (like airodump-ng in wifi)so can that be done?if yes how?if yes give me hints and i will do the rest,since d-link ap-2100 support injection and get good range.all devices are mine i wanna try them on myself to help you guyz latly i will do thread about some new ideas i tested and it work i will do them till i finish some stuff(school).
-
-
12:10
»
remote-exploit & backtrack
I've been playing around for the last few hours trying to get this working.
I've read many forum posts on different forums, but I still haven't got it working.
It doesn't help that all of the Fast-track websites are down, both "Secure State" and "The Pen Test".
I've done all sorts of weird stuff like create a user called "postgres", and I can't count many ruby libraries I've installed.
Here's some of the guides I've followed:
Automate Your Pen Testing with Fast-Track and Linux - www.enterprisenetworkingplanet.com
The Bored IT Guy » How to install Fast-Track 4.0 on Ubuntu
[ubuntu] How to: metasploit with autopwn [Archive] - Ubuntu Forums
Here's the versions I'm working with:
Metasploit v3.3.4-dev
Fast-track v4.0
When I run Fast-track, it tests for dependencies and everything comes back OK except for
pymills. I searched the web for
pymills and it seems to have disappeared into a black hole, seems like the Russians came and kidnapped the developers.
If I do:
Code:
python fast-track.py -i
Enter 2 for Autopwn.
Enter the IP address.
Enter 2 for Reverse Binding.
Then it loads Metasploit but here's what I get, check out the errors in red:
Code:
msf > db_destroy pentest
dropdb: could not connect to database postgres: FATAL: Ident authentication failed for user "root"
msf > db_create pentest
createdb: could not connect to database postgres: FATAL: Ident authentication failed for user "postgres"
[-] Error while running command db_create: Failed to connect to the database: FATAL: Ident authentication failed for user "postgres"
Call stack:
/root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1552:in `db_create_postgresql'
/root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1078:in `send'
/root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1078:in `cmd_db_create'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:239:in `send'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:239:in `run_command'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:201:in `run_single'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:195:in `each'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:195:in `run_single'
/root/metasploit/lib/rex/ui/text/shell.rb:144:in `run'
/root/metasploit/msfconsole:93
msf > db_nmap 192.168.1.111
[-] Unknown command: db_nmap.
msf > db_autopwn -p -t -e -r
[-] Unknown command: db_autopwn.
msf > sleep 5
msf > jobs -K
Stopping all jobs...
Anyone got any ideas?
-
9:05
»
remote-exploit & backtrack
hey guys, last night i tried to to try chntpw in backtrack 4 pre final when i wanna do the following step i must first mount my drive so i did so but it say to me permission denied.i also tryed to go to start>start menue>then to storge media then i reload it then i can see my partions ,i tryed to enter were windows is installed and a box poped up and telled me an error and told me to try command to mount it.i type it it's code:mount -t ntfs-3g /dev/sda1.............(i don't remmber all the command) and then it's says permission denied....i also entered the command code : df
it shows the drive and mounted on what i saw my windows partion and mounted in /media/sda1
i tryed to do the chntpw -i ...........................the mounted drive and were is the SAM file located it also says permission denied
i locked users in both f8 safe mode (adminstrator) and my other user i wanna rest them using this tool to see how it work help plz
-
-
9:04
»
remote-exploit & backtrack
I'm trying to create a standard user account since sometimes I do some work that doesn't require root. However, for some reason it doesn't seem to create the home directory for the user. I've tried
useradd -d /home/username username
and it creates the user just fine, /etc/passwd shows that the home directory should be as listed, but when you visit /home no directories are listed.
Furthermore, when I log in with the user and run startx, the desktop shows all items in / , as if / is the current home directory.
Does anyone know what the problem is? I tried just doing a simple mkdir /home/username as well to make the directory, but then other errors come up saying some files are missing in the directory for the user. I imagine if useradd creates the home directory, it would create all necessary files as well. However, it's just not creating it.
Also, I did notice that in addition to the home directory not being correct, when logged into KDE the menu wasn't nice either. There was no backtrack menu item with all the tools organized well - instead they are all in a lost+found menu item, but there are so many they don't all fit on the screen. Is there an easy way to get the menu working the same for additional users as it does for root?
Any ideas?
-
-
19:58
»
remote-exploit & backtrack
ok, given the audience and the nature of my gripe, i have no doubt that there will be an open season on this post, but as the title says; enough is enough.
i've been on the boards for a while... mostly lurking, mostly learning. i used to post a bit here and there, when i thought i could actually contribute something. for the most part, i tend to keep my mouth shut because i feel that if i can't contribute to the thread, i should just hush. i try to learn what i can from the excellent tutorials and anecdotal stories.
this has been said before and i've read all the tired excuses for the poor attitude and general snobbish, elitist pain-in-the-arse behavior that is exhibited by certain members and more importantly moderators. fact of the matter, it's all crap.
don't get me wrong, if some moron posts "how do i hax0rz my neighbor's wifi?" or whatever, i say release the hounds of hell. i enjoy perusing the idiot's corner for just such posts and i always get a chuckle out of pureh@te's interception of an otherwise stupid thread. between him and streaker69, they probably instilled enough dread to make me think six or seven times before opening my mouth.
but that's not what i'm talking about here. i came back this evening after being away for a bit and i am saddened by the ridiculous behavior of certain mods. it is as though there is some sort of competition between them to see which of them can single-handedly destroy the largest amount of threads for the most banal of reasons (asking a question that the mod finds "ridiculous" for instance). i won't name anyone, a simple search will answer that quick enough and besides, you know who you are already.
you guys should really be ashamed of yourself. i have picked on a poster when they needed a dose of reality, but i have also been patient with people who knew far less than I and were obviously not "ready for prime time". News flash... THAT IS WHY THEY ARE HERE. i have asked some questions that at the time confused me but in retrospect were fairly basic. when i discovered the answer, no matter how much of a moron it made me out to be, i posted it in good humour...in the hopes that it would help someone else in the future.
you guys need to grow up. you need to put this back into perspective and perhaps remember that you are wardens of this community, not errant bullies. having been here longer or having more knowledge on a subject doesn't give you license to be a dick. if anything, it enjoins you to care more, not less. perhaps you have groupies that are impressed with how you put this or that n00b in their place, i am not one of them and i would sincerely hope that i am not alone.
look, i don't want to go off on a tangent here and write the 'great american novel' or anything, i'm just saying that many decent people would probably become more involved with this community (myself included) if there wasn't such a foreboding aura of arrogance and general prickishness. i may very well be wrong, but i'm not entirely sure that mother would approve of all of this.
if someone is being stupid or asinine, by all means call them on it and keep our standards high. but stop screwing with people for just being wrong or perhaps behind the curve. saying "use the search bar" 50 times a day has got to get old, but so does reading your self-important and unnecessary flames.
speaking of flames, i guess i'm ready for what i strongly suspect happens next.
i'm done. go for it.
~b
-
8:57
»
remote-exploit & backtrack
So our budget has allotted for 3 business related certs per IT employee this year.
My current role is the jack of all trades IT guy (1 of 8) with most of my responsibilities falling in the realm of security. I have a INFOSEC BAS degree.
What 3 security minded certs are actually worth the money? Cost is an issue but we have a negotiable price depending on the cert. So In your experience what is worth having?
I was thinking SOX, Hippa and Sans Giac/GSNA .... any thoughts?
I have been thinking about an RHCE but it is not work related as we use UNIX and Windows primarily. Only a few of our systems are Redhat....
-
3:25
»
remote-exploit & backtrack
:mad:
Hi Guys ,
I have Windows Vista as my base operating system , then I loaded VMware and then downloaded the BT4 Final release.
My Lan card is a Intel(R) 82567LM Gigabit Network Connection. Then VMware has created 2 VMware Network Adapters.
I have tried the following to get the LAN working in BT4
1.I have tried setting the card to NAT , using the VMWARE program settings
2. Also tried using the custom settings choosing the vmware adapters.
3.tried using the ifconfig commands to assign an ipadress to the card manually.
Surely this shouldnt be that complicated ? What am I doing wrong here, can someone assist me please.
Thank you
-
-
18:08
»
remote-exploit & backtrack
Hey all, i recently downloaded the bt4-final.iso from backtrack-linux.org and burnt the image to a dvd+r.
I can boot the live cd fine, the problem is when i go to install it through the ubiquity installer i can get through
the entire install setup (i set the partitioner to use the entire disk) then click reboot.
The system begins to power down and when i am prompted to remove the disk from the tray and
press enter the disk doesn't eject. I'm not sure if that's a problem or not so when the system starts
to power back up from the reboot i eject it manually let it continue its boot sequence.
The system then boots to the grub boot loader. (I don't see the need for this in my situation because
im using the entire hard disk, and when i installed pre-final it didn't install grub and worked fine.)
Anyways to cut to the chase when the system boots to grub and i choose a option like bt4 final frame buffer 1024x768
grub gives me a error code 15:cannot find file...or something like that.
Is there any way to just not install grub so that it just boots bt4?
thanks in advance. ;D
-
-
12:45
»
remote-exploit & backtrack
Hello everyone I can't seem to find a good place to help me with VOIP testing. The reason I'm interested in VOIP is because I have three computers on my home network that use Magicjack and Skype. Now all I'm asking if someone can point me the right direction.
Thanks for your time.....
-
-
19:45
»
remote-exploit & backtrack
The monitor keeps going black til i move the mouse every 10 minutes, i cant find anywhere where to turn that off, getting really annoying while trying to watch a movie? Anyone know where the settings for that is?
-
-
22:19
»
remote-exploit & backtrack
My buddy is a computer science major and he set up 2 Wireless Networks Chiba1 and Chiba2, they have atleast 35% connectivity within a 10mile radius, when I airodump it shows him and his other comp using ALOT of bandwidth, but when you try to connect it always says limited connectivity!
Anyone else come across something like this before, got any suggestions, Its encryption is set to OPN, he said I wouldnt be able to figure out how he did it?
-
-
18:47
»
remote-exploit & backtrack
GrEeTiNgS, forums.remote-exploit.org!
-
9:33
»
remote-exploit & backtrack
How can i do this?
Is there such a program that can do this?
Of course the sudo apt-get command wont work (sudo apt-get install rar unrar)
I tried to install winrar but i get this error
Code:
rar: /lib/libc.so.6: version `GLIBC_2.7' not found (required by rar)
Can anyone help?
Thanks.
-
-
17:08
»
remote-exploit & backtrack
Well, I wont say much about this computer I'm dealing with, needless to say I can't modify the hard drive contents and I don't have access to the internals.
Booted up a copy of BackTrack 4 Final onto a computer after acquiring BIOS rights. We got the password to the BIOS, changed the boot order to CD and first booted to windows normally. Then we restarted and booted into BT4 to see what we could do. I got called away and when I came back my partner in crime was pale and was looking at the BIOS. The first HDD was no longer in the BIOS boot options, we get an error (more info on that error later) when we don't have a disk in the drive.
Loading up BT4, the hard drive is still visible. It's just not being picked up by BIOS.
Tomorrow we'll be playing around, our ultimate plan is to upload a back door, fix it and give ourselves remote access from our own computers, though if it goes on erroring out like this the HDD and BIOS are sure to be flashed.
So... Any idea what might be doing this? Any BIOS settings or even a linux setting that may have somehow played with the hard drive?
-
11:43
»
remote-exploit & backtrack
Hi
I have successfully install my hd5970 double GPU.
I can run pyrit only on the first of GPU, because if I use both GPU result in error
link to discussion hxxp://code.google.com/p/pyrit/issues/detail?id=123
Lukas (pyrit's developper) suggested me to change the source code of cpyrit.py line 375 from
Code:
for dev_idx in range(p.numDevices):
to
Code:
for dev_idx in range(p.numDevices)[:2]:
and now
Code:
root@bt:~# pyrit benchmark
Pyrit 0.3.1-dev (svn r228) (C) 2008-2010 Lukas Lueg hxxp://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Running benchmark (36830.8 PMKs/s)... /
Computed 35963.01 PMKs/s total.
#1: 'OpenCL-Device 'Cypress'': 32751.7 PMKs/s (RTT 2.7)
#2: 'CPU-Core (SSE2)': 520.0 PMKs/s (RTT 2.8)
#3: 'CPU-Core (SSE2)': 493.9 PMKs/s (RTT 2.8)
#4: 'CPU-Core (SSE2)': 498.5 PMKs/s (RTT 2.8)
#5: 'CPU-Core (SSE2)': 519.9 PMKs/s (RTT 2.9)
#6: 'CPU-Core (SSE2)': 484.0 PMKs/s (RTT 3.0)
#7: 'CPU-Core (SSE2)': 530.6 PMKs/s (RTT 3.1)
#8: 'CPU-Core (SSE2)': 476.9 PMKs/s (RTT 2.9)
My second GPU apparently is not working under pyrit. Now I'm trying to figure out whether it is a hardware failure or not and my question is if anyone can successfully run pyrit on ati hd5970 using both GPU
-
-
22:19
»
remote-exploit & backtrack
I have been out of the loop for about a year now. About 20min ago I installed BT4 on VM player 3.0.1 Everything seems to work fine. Sadly I have been damned to Windows 7 as a host OS at work. I would like to use the LAN eth0 for surfing on the host OS (Windows 7) while I am using BT4 final in the VM using my Alfa AWUS036H 500mW to connect to another AP. For some reason BT inherits the host IP. I take it this has something to do with NAT. Anybody know how this is fixed?
-
12:29
»
remote-exploit & backtrack
None of the built in meterpreter scripts in my BT4 installation work. I get this error when I try to run any of them:
meterpreter > run killav
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
meterpreter > run vnc
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
meterpreter > run metsvc
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
Has anyone seen this before or have any ideas?
Thanks,
C
-
-
20:59
»
remote-exploit & backtrack
One simple Question. I have a dell inspiron b130 notebook it has a IPW 2200 wireless card. Can I hack a wep network with BT4 final?? Thats all I want to know
-
12:02
»
remote-exploit & backtrack
hey everyone i am new to the board and wanted to introduce myself im rob and im a networking IT professional got 5 years exp and im trying to get my self fairly educated in infosec and penntesting.
-
0:48
»
remote-exploit & backtrack
sslstrip is failing when used in a proxy environment. For example, all the clients on LAN use someserver:8080 as their web proxy. I'm starting sslstrip with the following commands:
Code:
iptables -t nat -A PREROUTING -p tcp --destination-port 8080 -j REDIRECT --to-port 10000
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
echo "1" > /proc/sys/net/ipv4/ip_forward
arpspoof -i eth0 [gateway ip]
sslstrip -w debug.log -k -p -l 10000
Clients hang when trying to use SSL websites. The debug log contains repetitions of:
Quote:
2010-02-04 14:55:47,663 Sending request via HTTP...
2010-02-04 14:55:47,670 Server connection failed.
2010-02-04 14:55:47,670 Retrying via SSL
2010-02-04 14:55:47,674 Server connection failed.
2010-02-04 14:55:47,678 Sending request via HTTP...
2010-02-04 14:55:47,723 Server connection failed.
2010-02-04 14:55:47,723 Retrying via SSL
2010-02-04 14:55:47,729 Server connection failed.
2010-02-04 14:55:47,732 Sending request via HTTP...
2010-02-04 14:55:47,735 Server connection failed.
2010-02-04 14:55:47,735 Retrying via SSL
2010-02-04 14:55:47,814 Sending request via HTTP...
2010-02-04 14:55:47,899 Sending request via HTTP...
2010-02-04 14:55:47,955 Sending request via HTTP...
2010-02-04 14:55:47,964 Sending request via HTTP...
2010-02-04 14:55:47,974 Sending request via HTTP...
2010-02-04 14:55:48,047 Sending request via HTTP...
2010-02-04 14:55:48,059 Sending request via HTTP...
2010-02-04 14:55:48,062 Server connection failed.
2010-02-04 14:55:48,062 Retrying via SSL
2010-02-04 14:55:50,218 Sending request via HTTP...
|
Any ideas what might solve this issue?
-
-
15:51
»
remote-exploit & backtrack
Hi Everybody,
I'm a fresh member on this community. Just wanted to say hi! :)
-
14:35
»
remote-exploit & backtrack
currenly i have done nothing to my driver but i would like to know if i would need to patch or change my driver for better support with backtrack 4 final i will also be changing the tx power today and if i need to do anything to my driver im curently using rtl8187.injeting works but if i use to attacks at the same time pps decrease.
-
11:38
»
remote-exploit & backtrack
i have a his radeon hd 4830 which i want to set the resolution to 1920 1080 and i currently have backtrack 4 final installed on my hdd. if i run it on a virtual machine i have the option to change it to that resolution, but know installed in my hdd i cant set it that high.
-
-
13:17
»
remote-exploit & backtrack
I want to apply a patch to enable AHCI on my Dell inspiron.
I apply quirk-ich-force-ahci.patch patch to /usr/src/linux-source-2.6.30.9/drivers/pci/quirks.c
But now what to do next?
-
-
19:39
»
remote-exploit & backtrack
I recently purchased a new laptop with an Atheros AR9285 802.11b/g/n wireless card. I'm having a bit of trouble getting monitor mode / promiscuous mode working in wireshark.
First, I checked that it should be supported. I'm fairly certain monitor mode should work with this card using the ath9k driver.
Here are steps I have taken and results:
/usr/bin/start-network <- start it so I can use wicd
WICD - can connect to network no problem, using WPA
In wireshark, I can see a couple of things.
1. I can view a ton of management / beacon frames. Not really interested in these.
2. I can view traffic from local PC when connected to my network
3. I cannot view other traffic, even though I have promiscous mode checked in Wireshark.
I tried manually setting the card to monitor mode
ifconfig wlan0 down
iwconfig wlan0 mode monitor
ifconfig wlan0 up
iwconfig <- shows it is indeed in monitor mode
With it manually set, Wicd manager does not show anything, so I cannot connect to my own network. In wireshark (prom. mode still set)
1. Can see plenty of beacon frames still.
2. Cannot view my local PC traffic, obviously, as I am not connected to a network and cannot generate any.
3. Still cannot view any other traffic from other PCs. (Yes, I have another laptop and am generating traffic, so I know it exists)
Next, I thought it must be a driver issue, although I don't think any of the following changed anything (up until now, using default BackTrack 4 Final drivers - is it using ath9k ? Seems like it was). So, I proceeded to install latest driver...
1. downloaded driver compat-wireless.2.6.tar.bz2
2. extracted, make, make install
3. make unload (unload current modules, BT4 shows ath9k unloaded, so I assume it used that by default so reinstalling probably didn't do anything)
4. modprobe ath9k (start up ath9k module, which should work for AR9285)
After doing that, nothing changed. Same results as before. Does anyone have any ideas for my next step? ath9k says all supported devices (which should include AR9285) should work in monitor mode, but it just isn't working for me. I'm able to put it into monitor mode, and Wireshark doesn't complain (in Windows, Wireshark tells me it failed to put device in promiscuous mode), but I just don't see the results...
-
18:36
»
remote-exploit & backtrack
trying to use the ettercap for my wireless card instead of the RJ-45 port. My wireless card is set to eth1. RJ-45 port is eth0. I typed in ettercap -T -q -M ARP // // eth1. And even tried ettercap -T -q -M ARP // // eth0. the RJ-port works fine and I can poison my network. I just need it to be wireless instead of running a cord everywhere.
Plz HELP!
Thanks,
Jon
-
-
6:30
»
remote-exploit & backtrack
Hello i have one question.How can i check length of password or encryption wpa/wep/64/128/256bit.Tnx:confused:
-
3:35
»
remote-exploit & backtrack
Hi ,
I have a book in winrar format which is protected with password .It takes a very great deal of time when it is usually used the standard softwares for removing the password , you know . Do you know if exists another way that is faster and more reliable for removing the password ?
thank you in advanced ?
-
-
10:52
»
remote-exploit & backtrack
Hi,
I'm thinking about installing BT4 on my eee pc.
My problem is that that I have 2GB of HD and 4GB of SD.
How can I partition all to fit BT4 final?
Thanks
-
-
18:47
»
remote-exploit & backtrack
I tried the guide here
but everytime I try and install the ati driver I get
(Reading database ... 226943 files and directories currently installed.)
Unpacking ati-driver (from .../ati-driver_9.5-bt2_i386.deb) ...
Replacing files in old package libgl1-mesa-glx ...
Replacing files in old package xserver-xorg-core ...
dpkg: error processing /var/cache/apt/archives/ati-driver_9.5-bt2_i386.deb (--unpack):
trying to overwrite `/usr/lib/libGL.so', which is also in package libgl1-mesa-dev
Processing triggers for man-db ...
Errors were encountered while processing:
/var/cache/apt/archives/ati-driver_9.5-bt2_i386.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
root@bt:~#
this worked before on my machine runnin backtrack pre final, but now its not. I tried removing the driver, but it gives the same error. This happens if I try running this before I startx and afterwords. I've tried installing the backtrack-ati drivers, but same error. What am I doing wrong?
-
12:42
»
remote-exploit & backtrack
Son aquellas personas denominadas Delincuentes Informáticos...
Un Delito informático, crimen genérico o crimen electrónico, que agobia con operaciones ilícitas realizadas por medio de pcs o del Internet o que tienen como objetivo destruir y dañar ordenadores, medios electrónicos y redes de Internet. Sin embargo, las categorías que definen un delito informático son aún mayores y complejas y pueden incluir delitos tradicionales como el fraude, el robo, chantaje, falsificación y la malversación de caudales públicos en los cuales ordenadores y redes han sido utilizados. Con el desarrollo de la programación y de Internet, los delitos informáticos se han vuelto más frecuentes y sofisticados.
Existen actividades delictivas que se realizan por medio de estructuras electrónicas que van ligadas a un sin numero de herramientas delictivas que buscan infringir y dañar todo lo que encuentren en el ámbito informático: ingreso ilegal a sistemas, interceptado ilegal de redes, interferencias, daños en la información (borrado, dañado, alteración o supresión de datacredito), mal uso de artefactos, chantajes, fraude electrónico, ataques a sistemas, robo de bancos, ataques realizados por hackers, violación de los derechos de autor, pornografía infantil, pedofilia en Internet, violación de información confidencial y muchos otros.
Tomado de Wikipedia...
Que opinan?
-
8:05
»
remote-exploit & backtrack
This is related to backtrack because i use backtrack. And no one on yahoo answers answered. But if I major in Information technology, can I eventually land a job in network security. I realize i would have to get certificates but is this how one starts? is there a difference in IT and information systems management.
-
7:21
»
remote-exploit & backtrack
Hey, just want to say hi. I'm new here.
-
-
20:26
»
remote-exploit & backtrack
Hi
Obviously I'm a newbie here. I found this site through google search and I found this forum interesting so I drop by.
Thanks for welcoming me in advance!
-
-
5:39
»
remote-exploit & backtrack
I have switched from BT3 to BT4 on my Macbook Pro 2.1.
My wifi card is Atheros and is detected and working out of the box. In Bakctrack 3 when I used airmon-ng and airodump-ng the signal power was shown in positive dBs but now it's all negative.
It can still inject packets and sniff around but is this normal or should I update the drivers or smt?
Thanks
-
0:35
»
remote-exploit & backtrack
hello Everybody!!!
i have decided to install backtrack 4 on my laptops hard drive, as i was using BT3 off a live cd, now bt3 never gave me a problem with my wifi card which is an intel 3945. after i finished instaling bt4 i tried using my wifi and notice that it doesn't detect it, can anybody please help me out?? also i tried cracking my own wep with backtrack 4 just like i did on bt3 but notice the command ares different can anybody help me out if possible??
i used to use this command:
modprobe -r iwl3945
modprobe ipwraw
ifconfig wifi0 down
airmon-ng stop wifi0
macchanger --mac
airmon-ng start wifi0
airodump-ng wifi0
airodump -c -w --bssid wifi0
aireplay-ng -1 0 -a -h -e wifi0
aireplay-ng -3 -b -h wifi0
aircrack-ng -n64 -b (whatever the name was).01.cap
has any of this change on bt4??
sorry if my questions are too stupid but if i never ask i will never know
-
0:35
»
remote-exploit & backtrack
hello Everybody!!!
i have decided to install backtrack 4 on my laptops hard drive, as i was using BT3 off a live cd, now bt3 never gave me a problem with my wifi card which is an intel 3945. after i finished instaling bt4 i tried using my wifi and notice that it doesn't detect it, can anybody please help me out?? also i tried cracking my own wep with backtrack 4 just like i did on bt3 but notice the command ares different can anybody help me out if possible??
i used to use this command:
modprobe -r iwl3945
modprobe ipwraw
ifconfig wifi0 down
airmon-ng stop wifi0
macchanger --mac
airmon-ng start wifi0
airodump-ng wifi0
airodump -c -w --bssid wifi0
aireplay-ng -1 0 -a -h -e wifi0
aireplay-ng -3 -b -h wifi0
aircrack-ng -n64 -b (whatever the name was).01.cap
has any of this change on bt4??
sorry if my questions are too stupid but if i never ask i will never know
-
-
18:24
»
remote-exploit & backtrack
this wasent the question i was going to ask. i was going to ask why my wifi wasent working when it worked in bt4 pre final but as i was typing the question i remembered my wifi led never changed color with pre final so i tested it thats working fine i figured out on my own how to get the ethernet working.
so now my question is how do i install flash player 10 for youtube videos
theres a drop down list that says taz apt other linux filetypes ect
im not sure which type to pick
do i need to have bt4 installed for it to even download the file
and if so whats the easiest way to dual boot with windows 7
windows 7 will be on the 140 gb partion
and bt4 on the 10 gb partion
thanks for your time and effort in posting a reply
i seem to have forgotten alot i have learned which hopefully ill remember by exploring this great new final release
-
14:52
»
remote-exploit & backtrack
About my setup:
MacBook Pro Santa Rosa (mid 2007) 2.4 GHz Core 2 Duo
When I got my new 500gb hard drive, I partitioned it with 420gb for OS X, 40gb for Windows, and 40gb for Linux.
I then installed rEFIt and Windows 7 which all worked properly.
Last night I installed BackTrack 4 Pre-Final, resizing the Linux partition to 38gb to create a 2gb swap. Once the installation was done, BackTrack worked fine, and OS X still worked fine. Though when selecting Windows or Linux from rEFIt, I get the same Grub boot picker screen. First question: how can I get rid of this?
Second and more important problem: When I choose Windows from the Grub menu, I instantly get a Windows screen telling me there is an error with \Boot\BCD and that "an error occured while attempting to read the boot configuration data."
It would seem grub did something to mess up Windows' boot loader. When I insert my Windows 7 disc to try and repair it, the disc tells me something about it not being compatible with the OS installed.
Any ideas as to what I can do to get Windows to boot?
-
14:37
»
remote-exploit & backtrack
HI mate,
When i run for a long time the live cd, its suddenly quit from the programs and show a black screen where sometimes is freeze (like a critical error).
Last time it happen when i trying to update the exploit database is that playing any role..
Can anyone help me?
-
12:33
»
remote-exploit & backtrack
Hi all! I hope I am posting to the right section...
I am currently working on a program in C...
What I want to do is not only to call a system's .sh file, but edit the .sh file in a way that the user have the opportunity after running it to set his on variables.
For example:
In my C program in a point I say:
if (a==1) {system ("/home/alex/scripts/prog/macchanger2.sh"); system("/home/alex/Qt/hak/hak);}
Well, the problem is that the macchanger2.sh is something like this:
echo "Type your new mac address:"
echo
macchanger -m yy:yy:yy:yy:yy:yy wlan0
How can I tell the script to let the user type his preferable mac address and put it where yy:yy:yy:yy:yy:yy is?
I hope I were understandable enough....If not, plz let me know....
-
8:52
»
remote-exploit & backtrack
Hi Fellaz,
I've successfully exploited various win xp machines on my lan in lab environment using SET and aurora exploit but that is locally, how can these exploitz be used against other side of router on MY remote office pcs (ie.) want to try and pentest outside the local lan, will the exploit meterpreter session come back to me on my LHOST 192.168.0.8 address even if not on the same lan. if not how can it be acheived?
Pentest office : attack machine ip 192.168.0.8 public ip 96.xx.xx.xx
Remote office different lan: victim ip 192.168.1.9 public ip 92.xx.xx.xx
MY OWN btw victim machine both owned my myself.
both ip addresses differ 92.xx.xx.xx and 96.xx.xx.xx so how to metasploit past my remote router into the lan side.
As stated I own both networks but not Pwnd yet.
Googled and not found a thing apart from changing LHOST to public ip but thats just the router isnt it?
Kind Regardz DEE
-
-
18:13
»
remote-exploit & backtrack
Okay, so i've been searching for about 2 days and can't find a solution... It's getting frustrating. The things I have found aren't very user friendly in explanation or seem to be really out dated. I have a MacBook Pro running BT4 Final and can't get the right click working. Have tried messing with the xorg.conf file and just can't seem to get it exactly. Any help or links to some place that would explain it in the least confusing fashion would be awesome. :) Thanks in advance for any help.
-
15:23
»
remote-exploit & backtrack
Hi Everyone I am trying to get backtrack onto my 400GB external HDD.
I followed the usb install exactly the way it was done in the video provided by offensive security however when I go to boot I get to assuming drive cache: write through, then I get kicked down to busybox. I know this is caused due to missing files, how do I go about fixing this?
-
13:39
»
remote-exploit & backtrack
Hello
I am using Live DVD of BT4 final version.
When I try to use the sipdump or sipcrack commands, it says that those programs are not installed and you can install it using apt-get command e.g. "apt-get install sipcrack"
So executed "apt-get install sipcrack" and it reported everything is done however running sipcrack again, it still says that sipcrack is not installed.
executed "apt-get install sipdump" but it gave me error "E: can't find sipdump package"
Can anyone help please.
Any suggestions and ideas welcome.
Thanks in advance.
-
13:35
»
remote-exploit & backtrack
Son las personas que resuelven problemas sobrepasando los límites.
Existe una comunidad, una cultura compartida, de programadores expertos y magos de las redes, cuya historia se remonta décadas atrás a los tiempos de los primeros miniordenadores de tiempo compartido y los tempranos experimentos con ARPAnet.
Los miembros de esta cultura crearon el término "hacker". Los hackers construyeron Internet.
Los hackers hicieron de Unix el sistema operativo que es hoy día. Los hackers hacen andar Usenet.
Los hackers hacen funcionar la w w w Si eres parte de esta cultura, si has contribuido a ella y otras personas saben quién eres y te llaman hacker, entonces eres un hacker.
Los mentalidad hacker no está confinada a esta cultura del software. Hay gente que aplica la actitud de hacker a otras cosas, como la electrónica o la música de hecho, puedes encontrarla en los más altos niveles de cualquier ciencia o arte.
Los hackers de software reconocen estos espíritus emparentados en otras partes y pueden llamarlos "hackers" también y algunos sostienen que la naturaleza hacker es en realidad independiente del medio particular en el cual el hacker trabaja.
Sin embargo, en el resto de este documento nos centraremos en las habilidades y actitudes de los hackers de software, y en las tradiciones de la cultura compartida que originó el término "hacker".
Existe otro grupo de personas que se llaman a sí mismos hackers, pero que no lo son. Son personas (generalmente varones adolescentes) que se divierten irrumpiendo ilegalmente en ordenadores y haciendo "phreaking" en el sistema teléfonico. Los auténticos hackers tienen un nombre para esas personas: "crackers", y no quieren saber nada de ellos. Los auténticos hackers opinan que la mayoría de los crackers son perezosos, irresponsables y no muy brillantes, y fundamentan su crítica en que ser capaz de romper la seguridad no le hace a uno un hacker, de la misma manera que ser capaz de arrancar un coche con un puente en la llave no le convierte en ingeniero de automotores.
Desafortunadamente, muchos periodistas y escritores utilizan erróneamente la palabra "hacker" para describir a los crackers; esto causa enorme irritación a los auténticos hackers.
La diferiencia básica es esta: los hackers construyen cosas; los crackers las destruyen.
Si quieres avanzar mas... por favor lee
How To Become A Hacker de Eric Steven Raymond.
-
13:25
»
remote-exploit & backtrack
Netiqueta
Netiquette (o netiqueta en su versión castellanizada), es una palabra derivada del francés étiquette (buena educación) y del inglés net (red) o network, es el conjunto de reglas que regulan el comportamiento de un usuario en un grupo de noticias (newsgroup en inglés), una lista de correo, un foro de discusiones o al usar el correo electrónico.
Por extensión se utiliza también para referirse al conjunto de normas de comportamiento general en Internet. La Netiqueta no es más que una adaptación de las reglas de etiqueta del mundo real a las tecnologías y el ambiente virtual. Aunque normalmente los lineamientos de etiqueta han evolucionado hasta llegar a formar incluso parte de las reglas de ciertos sistemas, es bastante común que las reglas de etiqueta se basén en un sistema de honor, es decir que el infractor no recibe siquiera una reprimenda.
De la misma manera que existe un protocolo para los encuentros físicos con personas, la así llamada netiquette describe un protocolo que se debe utilizar al hacer "contacto" electrónico.
Sacado de: Wikipedia . org
XD
Que opinan?
-
5:49
»
remote-exploit & backtrack
Ok,.. So I goofing around and I been able to force handshakes on a WPA encryption.
Basically, I run the standard airodump with a bssid + .cap file recording it all...
Then run this:
aireplay -1 3000 -e (network name) -a (targets bssid) -h (your bssid) -0 1 -q 10 (interface card name)
This tricks the network to think I am already on the network and lets me on like a reconnect. At this point, I am on, but no access, but when this is used in conjunction with regular I guess wep methods and you keep hitting Ctrl+C and then "up" and enter and keep resigning on and off I been able to force hand shakes under a few min with this. Many times faster sometimes than WEP.
Add an extensive word list and BAM!
So what's good?
-
5:12
»
remote-exploit & backtrack
Ok,. tried playing a game,.. crashed, then crashed again, and again,.. well you see where I am going... Well I read I need to upgrade the Graphic Driver for this.. how would that be done? I have an Intel 945 chipset...
-
2:03
»
remote-exploit & backtrack
I've extracted the .iso and have been using grub to boot the kernel and initrd, but I'd like to make a few changes to the live cd. I've extracted the squashfs, copied my /root folder to save my configuration changes and compressed it again (while in backtrack to make sure I use the proper version of mksquashfs) and re-generated the manifest, using instructions from the ubuntu community docs on live cd customization (can't post link sorry)
However, the changes I made don't show up when I boot, its just a regular bt4 desktop and none of my personal files are on it. I'm positive that the right .squashfs is being used and that it's in the right place, so I'm guessing it's the manifest maybe?
If someone can help me along I'd like to write all this up into a tutorial because a lot of people here seem to be interested in customizing live cds but haven't been having luck with things like linux-live or reconstructor.
-
-
22:13
»
remote-exploit & backtrack
HI,
How can I change the version of my openvas to the latest release (version 3) in BT4 final? Should I uninstall the openvas2 (default in BT4) the install openvas 3 or theres another in BT4.
Thanks a lot
-
8:51
»
remote-exploit & backtrack
Hi Guy's !
I have some problems . Yesterday , I succesfully connected to my WEP netwerk.
But because WEP isn't that safe , i've switches to WPA .
No I Can't connect anymore.
I've tried:
/etc/init.d/networking start , it does some things, and then I do:
/etc/init.d/wicd start , to start wicd , then I can find my network. I've changed the advanced configuration of the network, and entered my WPA key.
(I've tried both options of WPA there , preshared key, and the other one, passphrase I think.)
When I click connect, it says: Validation authentification, and then is says:
'NOT CONNECTED'
I've tried alot! I Also tried the tut here, with the wpa_supplicant.conf file, but when I need to start dhcp , it says that it's not installed.
And I need a connection to install..
Really don't know what to do anymore :/. An1 can help?
I've tried to search the forums, but I really didn't find a solution.. sorry guys.
Thx!
EDIT: Owyeah, I was using a Netgear Wg111v2 , but now i'm using an Alfa AWUS036H . still no luck :(
EDIT: Got a working , wired connection now. Wanted to try the wpa_supplicant tutorial again (xploitz) , but still no luck :( . That's an old old tut voor Backtrack 2 I think. Can't get it working..
-
6:02
»
remote-exploit & backtrack
Hello
Could You be so kind and tell me how to make iPhone tethering via Bluetooth on BT4 final?
Regards
Lukanio
-
4:24
»
remote-exploit & backtrack
i found that directory
Code:
/opt/oracle
is oracle installed or can i install it from that directory?
-
3:39
»
remote-exploit & backtrack
Hey all,
BT4 Final works for me. I have issues with Ubuntu with hardware drivers, Windows is useless for everything... so I want to use BT4 Final as my OS for my laptop. The issue I have though is the only install process I can use is PXE. Ubuntu has good documentation on doing this so it wasn't difficult, but just about anything else I'm buggered!
Can anyone advise on how to get BT4 to install over PXE?
Thanks
-
0:32
»
remote-exploit & backtrack
Ok,.. I was happy as can be when I decided to put two operating systems on one internal hard drive, but sadly I have a new delema. The network I am dealing with is simply to far away from router to recipient. So what I have it this.. I have a partition on my internal HD with XP and BT4. Both work great, but the problem is I have to get a dongle and if I am going to do this I am just going to go back into VMware. Is there anyway to remove the partition and go back to the way it was before removing bt4 to later burn to an iso image etc etc...?
Thank you fro the help!
Z
-
0:17
»
remote-exploit & backtrack
Hi, I think this is a simple question, a request for a command. In the past I easily installed BT4 pre-final with persistent changes on a USB stick initially booting from a BT4 DVD. I am now trying to do it while booting BT4 from a bootable USB Memory stick. I followed the directions from the Infosec Ramblings website.
Following the directions, I first created the initial bootable USB stick using unetbootin and it works fine. I booted into BT4.
A dmesg command says the stick I want to make bootable with persistent changes is sdc (the one I booted from is sdb). Everything went fine when I created sdc1 and sdc2 etc. until I got to the "rsync -r" command. The instructions are for the case when you have booted BT4 from a cdrom. "rsync -r /media/cdrom0/*". I am not sure what command to put in when I booted from the memory stick. Every thing I tried lead to an error message. I am sure it is something simple, but I cannot figure out what it is. Any help is appreciated. Thanks in advance.
-
-
16:57
»
remote-exploit & backtrack
I have a X61s, and connected and disconnected the antenna at least 10 times, not more than 20-- and I currently get a weak wireless signal compared to other people (detail below). I am also running a X61s with some Lenovo software, so I'm not sure if the software is lowering the signal, but no matter what I do it still seems like I can't get it as high of a signal. Would removing the antenna connectors (cable at the 3945abg card) that many times damage it? I just bend the cable side up and the connector pops off.
As for low signal... I have a router running Tomato, and other computers in the same room get quality of ~60, and ~35-50 in the adjacent room (quality being dBi difference between noise floor and signal quality). However, my computer gets about 30-40 in room, and 10-20 in the adjacent room--and drops off much quicker a few rooms down.
If I want to fix it, what would I have to replace, or is there some other fix possible? (dip it in solder?)
-
9:15
»
remote-exploit & backtrack
Hello,
did a search but found no answer.
Anyways.
On using aircrack-ng GUI with windows vista. I browse and find the capture file and then run aircrack-ng.
The output in the aircrack-ng shows all the packets from the capture file, but i cannot view the top of this output, only the last 150 lines.
I need to veiw the top, to find the target network with the most IV's
any help?
-
-
6:58
»
remote-exploit & backtrack
Hello,
I've installed BT4 on a VMware Workstation.
But for some weird reason it can't see any of my network drives, I have both Ethernet and WiFi.
I tried to play with the VMware network setting for this machine, NAT and Bridge, nothing.
Also, I installed the machine as Ubuntu, I figured since both Ubuntu and BT4 are based on Debian it should be ok.
I tried to look through the forum but was unable to find anything related threads that can fix my problem.
Any advice?
Thank you.
-
5:51
»
remote-exploit & backtrack
i want a wordlist as we call it for a list of number from 1000000 to 9999999
but with a 101-prefix to the list generated, i.e 1011000000, 10110000001,...
1019999999 like that.
i searched and found many but with none i'm able to get to generate a list like this. someone can guide me, then it would be great. i want any program name and the correct argument to pass to get this sort of list printed.
-
-
15:45
»
remote-exploit & backtrack
I tried loading BT4 on my T500 and when I tried to use "startx" I get X
X: warning; process set to priority -1 instead of requested priority 0
and then it goes to Fatal server error:
no screens found
giving up.
xinit: Connection refused (errno 111): unable to connect to X server
xinit: No such process (errno 3): Server error.
I can't seem to load it up. If someone could help me with this that would be awesome. Thanks in advance.
-
15:27
»
remote-exploit & backtrack
has anyone uploaded backtrack 4 final to any sites for download?
i tried the torrent and it was corrupted and now ive tried downloading
from the site but the download is way to slow or the site goes down
and i have to restart the dl.
so, any mirrors?
-
13:53
»
remote-exploit & backtrack
Ok,..
I am brand new to backtrack and jumped on like literally days before BT4 came out. But here is my delema. I bought a USB 2 gig memory stick for BT3 works great! However, BT4 is said to have an 8 gig requirement. I don't feel like running back to the store and buying another usb memory stick, cause I have an External 1 terabyte Hard drive (which is plenty large enough). I would use this like a secondary HD on my laptop. However, I have a large amount of files on there already. Is there a way I can set BT4 up to run on the External HD on start up (I know how to boot it in bios) and not have the current files being damaged? Do I use the USB install that came with BT4 on the desktop? Also,.. how do I set up BT4 to be able to save settings and files on the desktop? I essentially would like to use BT4 as an operating system on it's own bypassing the internal HD. Any assistance would be helpful :)
Also,.. I just thought about this... Can I use the 2 gig jump drive to do a dual boot and just use the usb memory stick to hold the boot up logs, then use the external HD to use as operating hard drive? I read that if I install the whole thing on the ExHD it will erase everything on it cause it needs to format... woah I'm lost, lol... Help me out! Please and thank you :)
Z
-
9:22
»
remote-exploit & backtrack
Who had the idea to put all contents of ~ on the Desktop by default?
How do I disable that behavior?
I would like to see a clean desktop with files I put in ~/Desktop but not with everything within ~
Please help ...
-
8:29
»
remote-exploit & backtrack
I've BT4 final (iso) installed on hhd, I'm not be able to connect it by wireless.
PS. Sorry for the english errors: I'm italian.
-
-
9:45
»
remote-exploit & backtrack
well, i just recommended pwb class to an info sec friend at work :) if all works he will get to sign for this soon :).
now to convince my wife that it would make a great b-day present for me (as programming line hard to figure out how to make work pay) :)
sin-cerely,
Trol
-
4:29
»
remote-exploit & backtrack
Hi !
I've got a Little Question guys .
I've installed my Backtrack 4 on VM Workstation , works perfect so far !
No I wanted to crack my password, of my windows account with Chntpw .
But i've got a little problem :p.
I need to go to the 'disk' where my windows is on , like hda1 , or sda1 ,..
But like I said i've installed Backtrack on VM Workstation , and when I go into a terminal , en do Cfdisk , to see my drives (Right?) I only see the 'Virtual' drives , so not the drive Windows is on.
So my question , Is it possible to crack the windows password, with Backtrack on VM Workstation ? Or do I need to run the live CD ?
Thx!
-
-
23:59
»
remote-exploit & backtrack
Dear back|track users,
I have been experiencing a problem:
Previous search terms -
Searched google and BT for terms along the lines of:
mac spoof(ing) aireplay fake auth(entication) deauthentication packet
and any combination of those, but have not found a definitive answer that addresses the difficulty I'm experiencing.
Platform -
back|track4 pre-final live USB
card1: intel 5100 (bleeding edge driver from dec 2009)
card2: alfa AWUS036H (native rtl8187 drivers from BT4-prefinal)
target AP: Personal D-link router WBR-1310 (10 ft away)
NO MAC filtering set on target AP, WEP enabled
Description of problem:
Boot up BT4
airmon-ng start wlan0 (for alfa)
airodump-ng -c 1 mon0 (to fix the channel at 1)
aireplay-ng -1 0 -a $AP mon0 (attempt fake auth)
==> Fake auth success
change mac:
original mac: XX:XX:XX:XX:XX:BA
new mac : XX:XX:XX:XX:XX:BB (or any other change)
ifconfig wlan0 down; ifconfig mon0 down;
macchanger -m XX:XX:XX:XX:XX:BB wlan0
macchanger -m XX:XX:XX:XX:XX:BB mon0
ifconfig mon0 up;
airodump-ng -c 1 mon0
aireplay-ng -1 0 -a $AP mon0 (attempt fake auth)
==>
Sending Authentication Request (Open System) [ACK]
Authentication successful
Sending Association Request [ACK]
Got a deauthentication packet! (Waiting 3 seconds)
.
.
.
Got a deauthentication packet! (Waiting 5 seconds)
.
.
. etc.
This happens for both Intel 5100 and Alfa AWUS036H
When I attempt an attack on my office router (with permission, namely by me), the mac spoofing doesn't seem to result in dauthentication from router.
What can be done:
1) Injection test, aireplay-ng --test mon0, will result in successful injection on both spoofed mac and original mac
2) With original mac, most attacks on d-link are successful as per tutorials on this page and other sources, including attacks 2,3,4, and subsequent aircracks and dictionary/table attacks. Once connected and ARP poisoned, many other attacks also work as usual.
QUESTION:
+How can the router possibly know what my original mac address is? (Again, NO MAC filters on routers)
+Why does it allow fake auth if I use original mac, but denies authentication when I use other macs (both completely random, or pseudo random spoofing like changing the last digit) ?
+Is there a work around?
Thank you for taking time to read my question, I appreciate any questions regarding my setup or comments on how I can approach the problem.
C.
-
22:22
»
remote-exploit & backtrack
I've installed GNOME, I can not login
Graduated the following message:
the system administrator is not allowed to login from this screen
What is the solution ? :o
thank and reg
-
14:34
»
remote-exploit & backtrack
Hello im having trouble with some wifi cracking im trying the target networks are all on channel 13 i have 2 wifi cards on my laptop a IPW3945 built in jobby and a USB f5d7050b both are working fine on wlano and wlan1. However they wont go to a channel above 11 in airmon or airodump etc.. even using the channel flags i dont get an error but it just uses channel 11.
when i get to using aireplay-ng i get the error " WLAN0 is on channel 11, but the AP uses channel 13"
ive traced this error back to a driver issue the drivers built into bt4 are the US version and they only have 11 wifi channels here in the UK we use channel 13 all the time for some reason ( mainly as BT defaults to that on their equipment they give free with the broadband)
anyway i thought i had found the fix to this
Quote:
The key piece to sorting this out was adding this line to my /etc/modprobe.d/options and then re-starting my system (simple - brute force!):
options cfg80211 ieee80211_regdom="EU"
"iwlist wlan0 channel" previously only reported channels 1 to 11, but now shows all of them. No problems connecting to the AP now on channel 13:
steve@steve-laptop:~$ iwlist wlan0 channel
wlan0 13 channels in total; available frequencies :
Channel 01 : 2.412 GHz
Channel 02 : 2.417 GHz
( blah blah blah blah )
Channel 11 : 2.462 GHz
Channel 12 : 2.467 GHz
Channel 13 : 2.472 GHz
Current Frequency=2.472 GHz (Channel 13)
|
i did all the above and besides the fact i have 32 channels available none of them are 12 13 and 14
what am i doing wrong does anyone know ?? has anyone done this before to get to use channel 13 ?
thanks for your replies please keep them simple i am a total noob
oh forgot to add in windows both these cards work fine in the EU channel bands ..
-
-
7:58
»
remote-exploit & backtrack
The ps3 has bin hacked, it is still a major work in progress, you can read more
here
On the PlayStation 3
-
-
23:18
»
remote-exploit & backtrack
I wanted to use BT4 basically as a livecd that I can boot from my HDD and run from RAM, with persistent changes. I extracted the iso and copied it to it's own partition, and everything has worked great except for the persistence. I can't really figure out why this isn't working out of the box, maybe it's a grub2 error. I've been researching persistence and grub2, I'll post what I come up with but I'd appreciate help if anyone can see what I'm doing wrong.
/etc/grub.d/40_custom
Code:
menuentry "BT4 toram" {
recordfail=1
if [ -n ${have_grubenv} ]; then save_env recordfail; fi
set quiet=1
insmod ext2
set root=(hd0,12)
search --no-floppy --fs-uuid --set 5bda6579-1fe2-4099-8221-1a9f33f04164
linux /boot/vmlinuz BOOT=casper boot=casper toram persistent rw quiet fix-splash
initrd /boot/initrd.gz
}
-
22:14
»
remote-exploit & backtrack
Hi
I got a 8 gig flash drive, and want to put BT4 on it (temporarily), boot into it from my EEEPC and Install it permanently replacing my currently installed Ubuntu. It is a netbook and can't install from a CD.
How would i go about doing this?
-
21:21
»
remote-exploit & backtrack
I'm trying to hook up Backtrack 4 to my network. I have it installed via VMWare Fusion on an iMac. I started networking and wicd. No wireless networks are showing (some should, not mine), and I go to add a hidden network and type in the SSID. Do I have to be broadcasting instead? When looking at ifconfig I should see a wlan0 connection shouldn't I? There is nothing but the eth0 and lo.
-
18:14
»
remote-exploit & backtrack
I know it's a purely cosmetic question, but has anyone found a desktop app dock that works well with BT4 Final? Can't seem to find any on google or forum search that work with KDE3 debian
If this is the wrong section, i apologize, please move.
-
7:37
»
remote-exploit & backtrack
Hi there people,
I'm a newbie to the forums (fantastic forum by the way) and I'm having trouble with the ALFA AWUS036H 1000mw version (RTL8187L) picking up the WPA 4 way handshake. I've trawled the forum and google to no avail.
I've done the usual:
Airmon-ng start wlan0
Airodump start mon0
Select another computer on my home network and Deauth. I can see the Deauth'ing taking place in Airodump on the selected target and also succesfully running in Aireplay. I have also run the test in Aireplay just to make double sure (Injection Working).
I'm at a dead end on this and don't know if I've missed something really trivial or this is bigger problem - I've seen alot of posts mentioning trouble picking up the 4 way handshake and I just can't seem to get it working. :confused:
Any advice or help would be greatly appreciated :)
-
1:23
»
remote-exploit & backtrack
About every 3 minutes my internet just stops working.. (bcom 4318 + ndiswrapper = gooogle party all night long) .. and i might have over looked this on google but.. if I don't reissue the command "dhclient" about every 3 minutes my internet stops working.. has anyone else had this issue? OS is backtrack 4 final release.. no modifications to anything yet
-
-
8:44
»
remote-exploit & backtrack
I am deciding on which wifi card I should get. Either the 500mw or the 1000mw alpa networking booster card. Anyone here tried either cards. I search the forum and saw that some people were using the 500mw but want I to know if anyone has experienced better performance with the 1000mw or even the 2000mw adapter card?
Thanks
1. 500mw amazon.com/Adapter-Wardriving-Extension-Strongest-Market/dp/B000QYGNKQ/ref=dp_cp_ob_e_title_3?ie=UTF8&qid=1264171727&sr=8-1]Amazon.com:[/url] USB 500mW WiFI Adapter for Wardriving & Range Extension *Strongest on the Market*: Electronics
2. 1000mv amazon.com/Wireless-Original-Alfa-9dBi-Strongest/dp/B001O9X9EU/ref=sr_1_1?ie=UTF8&s=electronics&qid=1264434130&sr =1-1-spell]Amazon.com:[/url] 1000mW 1W 802.11b/g USB Wireless WiFi Network Adapter With Original Alfa Screw-On Swivel 9dBi Rubber Antenna *Strongest on the Market*: Electronics
-
-
16:53
»
remote-exploit & backtrack
I have a Lenovo G550 laptop in which I just recently installed BT4. None of my networking works at all (the network interface only shows a local loopback). I had Ubuntu on here before to try that package it worked but too clutery. On the 9.10 in cd/pools/restricted/b/bcm that package does make it so I can have wireless. I tried to install that and that was a no go also. So I come broken and needing help.
|Tags: broadcom,4312,BCM43,14e4:4315,rev 01|
-
11:27
»
remote-exploit & backtrack
Hi
I've only been using BT4 for a few days. I've managed to crack a few WEP keys and Ive managed to read around most subjects but I'm struggling with one aspect.
I'm using the simple WEP crack tut from aircrack-ng site
I dont have problem injecting the packets the problem seems to be capturing them then cracking them
OK the command I use is
airodump-ng -c 9 --bssid 00:14:6C:7E:40:80 -w output wlan0
I sometimes get this output
CH 9 ][ Elapsed: 8 mins ][ 2007-03-21 19:25
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:14:6C:7E:40:80 42 100 5240 178307 338 9 54 WEP WEP teddy
BSSID STATION pew lost pac's
00:14:6C:7E:40:80 00:0F:B5:88:AC:82 42 0 183782
I dont have a problem when there is one station the problem's I have is when more than one station is attached to the BSSID. Sometimes six. I can inject packets to one station but not them all. Although I can see the packets on that station being injected above the station list the total does not climb.
Hoping someone can understand what I mean
Thanks in advance
-
-
9:41
»
remote-exploit & backtrack
Hi,
I have several questions regarding backtrack, I did do research but so far it hasn't helped, also searched related problems etc.
I'm using backtrack 4 beta -> the live cd
first of all, I can't connect to a network..
I first tried using
Code:
/etc/init.d/NetworkManager start
And then just add a connection to my wlan0 (my router, a linksys)
I choose WPA, and gave in my key
but when it connects, the state just goes to 'configuring' and after a while it goes to disconnected..
I also tried it with a WEP key, same effect..
I just tried a different method
Code:
ifconfig wlan0 down
iwconfig wlan0 essid linksys key "s:<thekey>"
ifconfig wlan0 up
(I was under the impression that this was the way to do it?
So that's my first problem, I don't know how to connect to a wireless network..
Second problem is, I bought an MSI star key 2.0 but when I use the bluescanner, it can't detect anything, I think it's because it doesn't detect the device? (Is this normal? Or should I install a driver for it? )
Kind regards
-
8:04
»
remote-exploit & backtrack
В рекламе Ментоc, (где овцы на газонокасилках рассекают) играет песня, кто ее исполнитель и что это за песня?
-
8:04
»
remote-exploit & backtrack
В рекламе Ментоc, (где овцы на газонокасилках рассекают) играет песня, кто ее исполнитель и что это за песня?
-
3:56
»
remote-exploit & backtrack
Today i try install vlc (sudo apt-get install vlc).
But it did not install
Quote:
\/vlc_0.9.4-1ubuntu3.1_i386.deb[/url] 404 Not Found
E: Unable to fetch some archives, maybe run apt-get update or try with --fix-missing?
|
server error
this output after 50% download. What is the problem?
-
0:52
»
remote-exploit & backtrack
hi,
Code:
I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3.
geohotps3. blogspot. com
twitter. com/Geohot
Do you think its a fake?
-
0:39
»
remote-exploit & backtrack
As you know it's a great web application attacking and defending book, it has some example source codes included, the source of the contents is in somewhere that I can't post here right now due to the some reasons related to rules of this forum ... (15 posts needed to post links !)
unluckily it seems it's not available right now,
if anyone has it's source codes or find them with google or somewhere else please post them here, It's immediately for me .
thank you !
- Genius
-
-
15:32
»
remote-exploit & backtrack
Hello there .
when I want to start graphical mode i got out of range error in my monitor, I hadn't such a problem with my previous linux dsitributions such as debian or suse.
Is there any switch available for startX for solving this kind of problem or the problem is not there ?
any suggestion are welcome .
thanks .
- Genius
-
4:44
»
remote-exploit & backtrack
Ettercap just returns a message that it cant use a empty list of hosts.. But Im able to map my whole network. I am doing something wrong?
-
-
15:36
»
remote-exploit & backtrack
Hello all, this is the first post I have created, however I have been soaking up information from here for a long time. I searched the forum and google first so I hope this is not a dupe question in any way. With that said on to the question.
I am trying to use the windows/meterpreter/reverse_tcp payload across the internet. I have configured the payload to connect to my external ip on port 31337. I have forwarded the port in my router to a workstation running a exploit/multi/handler listening on port 31337. The handler never receives any traffic coming from the victim. After executing the exploit/payload on the victim computer looking at netstat I see a connection to the external ip on the correct port. Do you guys know what I am doing wrong or have any suggestions on how I can make this successful?
Thanks
-
12:36
»
remote-exploit & backtrack
Hi,
A quick question for our ubber security experts.
What is the best tool (or linux distro) for analyzing Windows Registry
(from live distro).
Sincerely,
Trol
-
6:44
»
remote-exploit & backtrack
:( This is probably posted in teh wrong location... Please move to the proper location if needed.
I have searched MANY places and can not locate any information. My company used cold fusion under apache... We failed a PCI scan because it says that our version of Cold Fusion is susceptible to XSS.... We have not failed any scans for actual XSS issues, we make the Coders test the code then I typically will test specifically for XSS...
1. How did they determine the version of Cold Fusion im running (third party scan)
2. How can I check this myself. I know specifically which files/directories they hit to find the info. But I cant for the life of me find how they got the version and rev. Any help would be greatly appreciated.
-
-
14:12
»
remote-exploit & backtrack
Hello this is a great thread. Probably one of the best i have seen so far. I am looking for a notbook to install backtrack 4 and all the other software that i will need. wireshark, cain and able and all the others if there are any. I have been watching
youtube videos to learn all what i need to do. Im now learning some basic linux books and what not. I am plaining on going to backtrack 4 Security Training. I want to be a ethical hacker. Im not going to cause problems and steal information. My goal
is to just see if i can do it. Have fun with this software.
I dont wanna to use VM and i dont want to use a cd to run backtrack. I would like to just install backtrack 4 to my laptop.
So i am looking for a notebook thats powerful enough to run these tools..I like the Acer line. Aspire® One 751h - 11.6"
here are the specs.
AO751h-1196 Genuine Windows® XP Professional ; Intel® Atom Processor Z520; 2GB DDR2 667 SDRAM; 250GB hard drive, multi-in-one card reader; 11.6" WXGA (1366 x 768) TFT display, Acer® CrystalBrite Technology; Intel® Graphics Media Accelerator 500; 802.11b/g WLAN, Bluetooth®, 10/100 LAN, webcam; sapphire blue chassis; six-cell battery; one-year limited warranty
What i have been reading so far is that i need xp not vista or 7. Is that correct? XP is the way to go for ethical hacking?
also can you tell me if this notebook work with backtrack4? I notice that some people on here say i need a nvidia graphic card? Is this correct? I hope not because that means i will have to look for another notebook
could you help a noob like me out so i can get started
thanks
I think there should be a sticky for noobs just starting out on what type of gear they should use instead of how to..just my two sence :)
-
14:01
»
remote-exploit & backtrack
I ran across a few articles about the Zero Day exploit on Internet Explorer.
From what I have read, the exploit gives the ability to insert malicious code in links and advertisements.
How does this exploit work exactly?
Any articles or explanations would be gladly appreciated!
-
11:24
»
remote-exploit & backtrack
Hello, today i have searched to launch BackTrack 4 Final on my computer and it give me this error during the launch...
Buffer I/O error on device hdd, logical block etc...
ATAPI device hdd:
Unrecovered read error
and other errors...
what is it ?
-
-
14:10
»
remote-exploit & backtrack
A few years ago i did the A+ and recently i took the MCDST as i managed to get it free as we setup a micorsoft testing centre. i am now working as a desktop support technician in a hospital and am learning alot. i am however becoming frustrated as i really want to learn more about group policy and the server/administration side of things which comes into play alot.
A few years ago i got a complete set of books which is windows 2000 MCSE i was just going to dig them out however is it woth my while reading them or have things changed too much now since server 2003.
I have no more training resource available so i guess im looking for pointers from someone with systems experience to learn about domains, workgroup enviroments and admin/group policy.
-
8:40
»
remote-exploit & backtrack
hi guys,
i am in need of some ideas, i am currently doing my degree in networking and i need to produce a project.
i want to do my project on network security using backtrack e.g wep crack and pentesing the system.
this project has to be 15,000 words write up, so i need some ideas of what to do to pad it out to 15,000 words as i dont think just pentesting the system will be enough.
hope you can help guys all ideas would be most apprciated thanks
-
1:12
»
remote-exploit & backtrack
Hello,
I am currently doing research into cryptography export limits and have searched Google extensively but have not found a conclusive answer to my question.
A while back the United States relaxed it's import and export laws regarding encryption which is why software such as Firefox and Internet Explorer could provide 128-bit ciphers outside of the U.S. I have however heard that the same does not hold true for software that is not freely available. What if I were to use RSA encryption? Would I have to limit the cipher strength if I would want to communicate with the U.S.?
Thanks!