«
Expand/Collapse
296 items tagged "Newbie"
Related tags:
linux [+],
wifi [+],
vmware [+],
google [+],
ettercap [+],
NON [+],
someone [+],
salve [+],
handshake [+],
che [+],
wlan [+],
tutti [+],
screen [+],
laptop [+],
lan [+],
adapter [+],
BackTrack [+],
vulnerability [+],
sono [+],
password [+],
noob [+],
internet [+],
cms [+],
arp [+],
anyone [+],
aircrack [+],
wordlist [+],
wireless adapter [+],
wep [+],
thanks in advance [+],
question [+],
nbsp [+],
metasploit [+],
machine [+],
mac [+],
hey [+],
forum [+],
file [+],
error [+],
dual boot [+],
boot [+],
antenna [+],
alfa [+],
airodump [+],
wpa psk [+],
virtualbox [+],
virtual box [+],
startx [+],
shell [+],
sda [+],
rtl [+],
omni antenna [+],
nuovo [+],
nbsp nbsp nbsp nbsp nbsp [+],
mysql [+],
intel [+],
injection [+],
hey guys [+],
guide [+],
driver [+],
dictionary file [+],
compaq [+],
command [+],
chipset [+],
broadcom [+],
authentication request [+],
agn [+],
dei [+],
Angolo [+],
wpa wpa2 [+],
wireshark [+],
wireless connections [+],
wine [+],
wifi card [+],
wi fi [+],
whitepaper [+],
vista [+],
virtual machine [+],
usb wireless [+],
usb adapter [+],
underground [+],
una [+],
ubuntu [+],
txt [+],
time [+],
target [+],
table [+],
ssl [+],
sound [+],
something [+],
somebody [+],
social engineering [+],
setup [+],
sending [+],
security [+],
saluto [+],
root [+],
research [+],
realtek [+],
rainbow [+],
program [+],
port [+],
per [+],
penna [+],
passphrase [+],
partition [+],
packet [+],
ndiswrapper [+],
name [+],
mount dev [+],
modprobe [+],
mitm [+],
mike [+],
meterpreter [+],
message [+],
make [+],
long time [+],
login [+],
locked [+],
kernel 2 [+],
kernel [+],
john [+],
iso [+],
insight [+],
image [+],
hxxp [+],
hello everyone [+],
hash [+],
handshake problem [+],
fatal server error [+],
eth [+],
encryption [+],
ebay [+],
dvd [+],
download [+],
disclosure [+],
dhcpcd [+],
device [+],
dev [+],
dean [+],
dbi [+],
database [+],
continuation [+],
com [+],
code [+],
channel [+],
cerco [+],
cap [+],
can [+],
bt3 [+],
box [+],
awus [+],
authentication [+],
attacker [+],
attack [+],
arpspoof [+],
arp spoofing [+],
anything [+],
anybody [+],
amp [+],
acer [+],
access [+],
Wireless [+],
quot [+],
usb [+],
Area [+],
zydas [+],
zombies [+],
zombie [+],
youtube [+],
yagi antenne [+],
yagi antenna [+],
yagi [+],
xxx [+],
xauthority [+],
x. [+],
wusb [+],
wpa key [+],
world alot [+],
workstation [+],
words of wisdom [+],
wireless usb adapter [+],
wireless usb [+],
wireless network card [+],
wireless network adapter [+],
wireless extension [+],
wireless adapters [+],
wireless 2200bg [+],
windows xp service pack [+],
windows xp exploits [+],
windows machine [+],
windows [+],
window button [+],
window [+],
win [+],
wicd [+],
whick [+],
whats [+],
wep wpa [+],
wep keys [+],
wep key [+],
welcome thanks [+],
week [+],
webmaster forum [+],
webmaster [+],
web shell [+],
web [+],
way [+],
wanna [+],
wan ip address [+],
walmart [+],
vulnerable systems [+],
vpceb [+],
volevo [+],
virtual [+],
video [+],
victimb [+],
victim machine [+],
version [+],
vdi [+],
vbs [+],
vaio [+],
usr [+],
username [+],
user [+],
use [+],
usbs [+],
usb network adapter [+],
usb dongle [+],
upload [+],
unsupported [+],
unix c [+],
unix [+],
uni [+],
tv dish [+],
tutorial [+],
ttyusb [+],
trojan program [+],
trojan [+],
triad [+],
traget [+],
track [+],
traceroute [+],
tp link [+],
touch [+],
toshiba satellite [+],
toronto [+],
torino [+],
tool [+],
tls [+],
tl wn [+],
title [+],
time reader [+],
time poster [+],
tightvnc [+],
thumb drive [+],
threat modeling [+],
threat [+],
thread [+],
thank [+],
tg3 [+],
tftp [+],
testare [+],
test network [+],
test machine [+],
tempo fa [+],
tempo [+],
tecnologie informatiche [+],
teach [+],
tastiera mouse [+],
tastiera [+],
target windows [+],
target domain [+],
target code [+],
tar bz2 [+],
syskey [+],
syntax problems [+],
support amd [+],
sum [+],
sulla sicurezza informatica [+],
suggestion [+],
sucessfully [+],
stupid question [+],
string constant [+],
string [+],
stick [+],
step [+],
stealth scan [+],
sslstrip [+],
ssid [+],
sqlmap [+],
sql server 2005 [+],
spoonwpa [+],
spoonwep [+],
sp4 [+],
sp3 [+],
sp2 [+],
sony vaio vgn [+],
sony vaio [+],
sony laptop [+],
sony [+],
somtimes [+],
something simple [+],
solo 3 [+],
solo 2 [+],
solo [+],
social engineer [+],
smc2835w [+],
smc [+],
slow connections [+],
slack [+],
size [+],
site [+],
sicurezza [+],
shot 1 [+],
shells [+],
services menu [+],
service gt [+],
server x [+],
server [+],
sense [+],
sendmail [+],
sendemail [+],
scusate [+],
scum bag [+],
scripts [+],
script [+],
screen resoultion [+],
screen feature [+],
screen error [+],
scoperta [+],
school [+],
scherzo [+],
scheda di rete [+],
scappare [+],
sbin directory [+],
sayings [+],
saril [+],
samsung q1u [+],
sage advice [+],
s.o [+],
s driver [+],
rule [+],
rtt [+],
rpm [+],
routers [+],
router password [+],
router [+],
roof gutter [+],
rjb [+],
reverse [+],
reti [+],
rete domestica [+],
remote option [+],
remote exploit [+],
registry [+],
reference book [+],
reconnaissance [+],
reboot [+],
realtek rtl8187 [+],
read this [+],
rats [+],
random question [+],
ralink technology [+],
r57 [+],
quindi [+],
questo [+],
qualcuno [+],
qos [+],
pyrit [+],
proxy software [+],
proxy [+],
provato [+],
proof of concept [+],
proof [+],
promiscuous mode [+],
professional pen [+],
problema [+],
pro rat [+],
presento [+],
presentazione [+],
presario [+],
preme [+],
potreste [+],
posto [+],
ports [+],
portal [+],
port mapping [+],
port 1863 [+],
pop [+],
poison [+],
poisions [+],
point [+],
pmks [+],
php files [+],
php [+],
phone [+],
persistenti [+],
persistent database [+],
persistent [+],
perpose [+],
penetration [+],
pcmcia [+],
payload [+],
path [+],
patch [+],
passwords [+],
password list [+],
password database [+],
password column [+],
partnership share [+],
partition table [+],
package [+],
p.s. if [+],
orload [+],
orinoco gold [+],
org version [+],
ora [+],
nvidia 9800gtx [+],
nvidia [+],
nuova [+],
number combinations [+],
number [+],
nubuntu [+],
notebook adapter [+],
noobish [+],
nice [+],
nic works [+],
nic [+],
newby [+],
new member [+],
new dell [+],
networks [+],
networking [+],
network wirelessly [+],
network security course [+],
network penetration [+],
network mapping [+],
network interfaces [+],
network hack [+],
network bridge [+],
network admin [+],
netpc [+],
netgear wireless router [+],
netgear router [+],
netbook [+],
netapi [+],
nessus [+],
nat [+],
n81 [+],
n draft [+],
mysqld [+],
mysql server through socket [+],
my question [+],
my handshake [+],
my backtrack [+],
multiple times [+],
msnms [+],
msn [+],
mouse pointer [+],
monitor tv [+],
monitor aoc [+],
monitor [+],
money [+],
module assignment [+],
modifiche [+],
modem [+],
mode [+],
missing something [+],
mismatch [+],
mishap [+],
mini [+],
microphone [+],
metre [+],
metaexploit [+],
message encryption [+],
memory test [+],
member [+],
medusa web [+],
medusa [+],
md5 sum [+],
mbr [+],
mb ring [+],
marvell yukon 88e8036 [+],
many thanks [+],
manipulatio [+],
managed mode [+],
mail [+],
machine learning algorithms [+],
machin [+],
macchanger [+],
mac addresses [+],
mac address filtering [+],
mac address [+],
m nic [+],
logitech usb headset [+],
login root [+],
location base [+],
localhost [+],
local mysql server through socket [+],
load testing [+],
lmr 400 [+],
lm hash [+],
live ed [+],
listing [+],
list [+],
linux question [+],
linux kernel [+],
linux distro [+],
linux desktop [+],
linksys wrt54g [+],
lilo [+],
libero [+],
lib [+],
leo [+],
lavoro [+],
laptop toshiba [+],
lappy [+],
lap [+],
lan device [+],
lab [+],
konsole [+],
knowledge [+],
knopix [+],
key generator [+],
kernel source [+],
kernel panic [+],
kdm [+],
kde [+],
kanotix [+],
jump drive [+],
jump [+],
jobby [+],
ive [+],
issue [+],
isp [+],
iscritto [+],
ipad [+],
ip ports [+],
ip address [+],
internet connectivity [+],
interface [+],
intel r pro wireless 2200bg network connection [+],
intel pro [+],
installazione [+],
init [+],
information [+],
info [+],
index [+],
imparato [+],
il tempo [+],
iam [+],
hwug [+],
https [+],
html url [+],
html [+],
hp compaq nc 6220 [+],
hp 510 laptop [+],
how [+],
hostos [+],
host unreachable [+],
host architecture [+],
holaz [+],
hire [+],
high speed [+],
high performance [+],
hidy [+],
hi anybody [+],
hexagonal [+],
hello world [+],
hello community [+],
headset [+],
hd space [+],
hard drive [+],
hacking xp [+],
hacker computer [+],
hacker [+],
hack [+],
guida [+],
gui [+],
gt network [+],
grz [+],
grub problem [+],
grub [+],
great forum [+],
grazie [+],
graphical mode [+],
graphic card driver [+],
gpsd [+],
googling [+],
googled [+],
good luck [+],
git [+],
gig [+],
ghz [+],
getter [+],
getopt [+],
germany [+],
geometria [+],
generator [+],
gb ram [+],
g mini [+],
function [+],
fritz [+],
framework [+],
forum group [+],
forum entries [+],
fixvesa [+],
first steps [+],
fios [+],
finally [+],
filter [+],
filesystems [+],
file sizes [+],
filchev [+],
fiber optics [+],
feture [+],
fellas [+],
feature [+],
fdisk [+],
fatto [+],
fastweb [+],
fast track [+],
fare una presentazione [+],
fare [+],
fake website [+],
external switch [+],
external antenna [+],
external [+],
exploits [+],
expired certificate [+],
expierience [+],
exe files [+],
exe [+],
exchange server [+],
everyone [+],
everybody [+],
every [+],
ethernet device [+],
ethercap [+],
essid [+],
error reading [+],
error error [+],
envronment [+],
enterprise [+],
enrico [+],
english [+],
englisch [+],
encode [+],
empathy [+],
ehi [+],
eager little beaver [+],
dual core processor [+],
dual booting [+],
dual boot with windows [+],
dsniff [+],
drivers dell [+],
driver lan [+],
driver developers [+],
drive space [+],
drive [+],
dr dos [+],
dorm [+],
dopo [+],
dongle [+],
domain thanks [+],
domain [+],
distinction level [+],
display [+],
disperato [+],
disk encryption [+],
dish antenna [+],
dish [+],
digits [+],
dictionary word [+],
dictionary text [+],
dictionary files [+],
dictionary [+],
dictionaries [+],
dhcp [+],
dhclient [+],
detto [+],
desktop system [+],
des [+],
depth explanation [+],
demostration [+],
della [+],
dell wireless [+],
dell utility [+],
dell studio [+],
dell recovery [+],
default margin [+],
default gateway [+],
debbi [+],
deb packages [+],
deb [+],
db connection [+],
database path [+],
data packet [+],
darklords [+],
dab hand [+],
curser [+],
cuda [+],
crunch crunch [+],
critical flaws [+],
cracking wep keys [+],
cpu core [+],
course [+],
couple [+],
could [+],
cosa [+],
core command [+],
cookie [+],
converting [+],
controller. my [+],
controller ethernet [+],
connection attempt [+],
connected computer [+],
configured [+],
computer thief [+],
computer [+],
compatibile [+],
compatability chart [+],
compaq presario [+],
compability [+],
command shell [+],
comandi [+],
column [+],
cmq [+],
cmov [+],
clue [+],
ciao [+],
chip usb [+],
chiaro [+],
check [+],
channel 11 [+],
cdrive [+],
captive [+],
cant [+],
cannot [+],
california [+],
c fires [+],
buonasera [+],
buffer space [+],
buffer overflow [+],
bssid [+],
bruteforce [+],
brute force method [+],
broadcom 802 [+],
bootable usb [+],
boot time [+],
boot screen [+],
boot record [+],
boot options [+],
blah blah [+],
bios settings [+],
bios [+],
belgium [+],
bel [+],
beef log [+],
beef [+],
base web [+],
base [+],
background job [+],
background [+],
backdoor [+],
awuss [+],
avvio [+],
aver [+],
autopwn [+],
authentication issue [+],
attena [+],
attack signatures [+],
ati radeon x1650 [+],
ati mobility [+],
ati [+],
atheros wireless [+],
atheros [+],
asp auditor [+],
ascii table [+],
ascii [+],
arrivato [+],
arpd [+],
arp requests [+],
arp poisoning [+],
arp cache [+],
area code [+],
apps [+],
apache [+],
answer [+],
anche [+],
amd turion [+],
amd athlon 3500 [+],
alpa [+],
algoritmo [+],
aiuto [+],
airo [+],
aireplay [+],
aircrack ng [+],
airbase [+],
ahoy [+],
adsl alice [+],
adobe [+],
adn [+],
administrator account [+],
address [+],
adaptor [+],
account [+],
access point [+],
access 2 [+],
Software [+],
Howto [+],
General [+],
Discussion [+],
802 11b [+],
4ghz [+],
bt4 [+],
wpa [+],
problem [+],
card [+],
network [+],
xnn,
xhydra,
wpn,
wpa supplicant,
work,
wont work,
wireless lan cards,
wireless lan card,
wireless connection,
wireless chip,
wireless cards,
wiki,
whilst,
wepkey,
vwmare,
vw tools,
vmware thanks,
vlc,
victim,
using linux,
unwanted visitors,
unwanted guests,
type login,
type,
texas instruments pci 1410,
texas,
telnet,
target network,
synaptic,
swiss army knife,
svn,
suitable place,
stupid,
sta,
spoon fed,
source mac,
silly thing,
security tests,
screens,
scapy,
ruby,
rock,
right,
resolution,
replay attack,
regular expression tester,
regex,
realtek semiconductor,
reading package,
read,
ralink,
quot quot quot quot,
python mode,
prob,
power,
porte aperte,
poor internet,
place,
ping,
perl regexp,
pentest,
pc,
passwordlist,
parameters,
p.s.,
p.s,
os linux,
opendns,
none,
network gateway,
netgear,
n00b,
msfconsole,
mon,
mkdir,
mirror mode,
mini pci card,
media players,
md5,
manipulations,
live usb,
linux modules,
linksys,
libssh,
library,
lee,
layer 2,
layer,
kopete,
keys,
keyboard,
kernel drivers,
iso file,
iptables,
internet conditions,
hardrive,
harddrive,
gigabyte,
gigabit ethernet controller,
general md,
gateway,
g laptop,
full power,
fragmentation,
foreach,
flashdrive,
final 4,
few words,
everything,
ethernet,
enought,
eeepc,
eee pc,
dual monitor,
dst,
distro,
different things,
dhcp leases,
dhcp clients,
devel,
destination port,
dell c640,
dat,
csv,
connection,
command cat,
chris,
chipset driver,
chip set,
cat,
bridge connection,
boot menu,
beta,
belkin router,
b pci,
avalible,
atheros communications inc,
ascii charset,
apears,
and,
algorythm,
16gb flash drive
-
-
15:43
»
remote-exploit & backtrack
Hi, i can easily crack my WPA password which i set to a dictionary word recently.
However i now want to change the password to password123.
I have heard john the ripper can add 123 ...etc to each individual passphrase so I would like to do that.
After catching the handshake I notice that there are 4 packets called 'KEY'
Is this the 4 way handshake?
If so how to i get the 'hash' or password information from my handshake and transfer it manually to my windows machine to experiment with. Or what do i need to copy over?
Thanks
-
-
11:31
»
remote-exploit & backtrack
Could anyone tell me where Can I found drivers for LAN to my Sony ? I was install BT4 on SOny Vaio but LAN didnt work. I search but I couldnt found drivers for LAN and WIFI card.
Please help me.
-
-
10:56
»
remote-exploit & backtrack
I am trying to install BT4 and i get this message. Just take a look at the pic. How can i solve? thanks in advance.
-
-
13:25
»
remote-exploit & backtrack
Hello,
I plugged my logitech usb headset into the pc running BT3 and it wont let me hear any sound.
If i click Kmix it shows realtek my sound driver as the output, is there anyway i can change this to the headset being the output?
THanks.
-
-
22:40
»
remote-exploit & backtrack
I'm running BT4R1 on a VirtualBox. How do I set up ettercap to arp poison my network when the VirtualBox is translating the IP on the network? IE, the laptop's host is 192.168.1.1 on the network, but the VirtualBox BT thinks it's IP is 10.10.etc.etc.... how do I get the 10.10 to see the other 192's on the network?
-
-
9:08
»
remote-exploit & backtrack
I wanted to get feedback on this subject. I'm taking a class at school where we compromise a box via buffer overflow and then setup a backdoor.
One of the ways I thought of was to check rc.local for any scripts. If there was one, then I would include my backdoor in there with something like
while true; do nc -lp 6666 -e /bin/sh; done
Maybe even renaming nc as something else. But then it would be easily visible to administrators by using lsof -i or netstat -antp. So instead have the script connect to me once it gets run. But then what if the box gets rebooted only once a year. Plus lsof and netstat will still show the established connection. I wanted to see what you guys thought.
Where would you setup your backdoor and why?
-
-
22:08
»
remote-exploit & backtrack
I did an apt-get update && upgrade.
One update was wine, which I use.
Now wine is broken, messed up. Something went weird.
I tried uninstalling, re installing. But it didn't work.
Is there a way to re install it from the live cd?
If so I need step by step commands.
I'm a noob, please don't kill me..
-
-
14:44
»
remote-exploit & backtrack
Hello,
I have any old pcmcia "smc2835w eu" laying around and I've tested and it works fine with windows and linux.
But I need a bigger coverage, I have been looking around and cant see anyone that has adapted a external antenna to this card!!
has anyone done it?
Is it possible and how can it be done??
thanks
-
-
9:55
»
remote-exploit & backtrack
hi,i have simple question.plz if anyone do something like this tell me.
i want to use one virtual machin on BT4(ubuntu8.10).i want to instal win xp on it.i try VirtualBOX ose,not working .i try Vmware ,not working.i Try Qemu.when i click on Lunch Button Nothing Happen.
i Really tired of contact by Error.every app i said,have problem with Kernel.
i hope some one can tell me how can i solve my problem.:confused:
-
-
12:02
»
remote-exploit & backtrack
Ok. Here is the story..
Installed BackTrack using VMware, by downloading the .ISO not the VMware Image. Got confused by downloading the VMware imagine first..
In any case, installed it, booted up, 'ifconfig -a' but nothing is there except "eth0" and "local loopback", altough I have two wireless adapters. One being Realtek RTL8187 another being DW1501 Wireless card..
Sorry for being a noob, but how do you turn them on?
-
-
11:55
»
remote-exploit & backtrack
Hi guys, im a total noob so please dont flame...
I just bought this tl-wn422g with an atheros chipset and its USB.
I get it in the list of usb
but it is not in the ifconfig
how can i get it to work?
-
-
9:10
»
remote-exploit & backtrack
My friends in the next dorm put up a WPA secrued network and said if i can guess the password they'll buy dinner(not believing i can). I dowloaded alot of dictionaries and none of them contain the passphase. :(
Is there anything I can do, short of brute forceing which takes way too long, to get this?
Thanks
-
-
11:40
»
remote-exploit & backtrack
Salve a tutti!
Sono riuscito ad ottenere un HASH e una password in chiaro, credo che siano in DES(UNIX). C'è un modo per ricavare l'algoritmo di hashing?
Grazie,
Fandonius
-
-
21:23
»
remote-exploit & backtrack
Hello,
where does ipad keep its screen unlock paswword hash in file system?
thanks
-
-
10:29
»
remote-exploit & backtrack
Hey guys im trying to get wpa handshake but no matter wot commands i try i cant get one and i dont know why.
I have intel3945 wireless card and i can crack wep fine with it.
Can someone tell me what am i doing wrong or give me another command to try. I remember last year when i tried i did get a wpa handshake once
Thanks
-
-
8:15
»
remote-exploit & backtrack
Ciao
Ho installato Backtrack 4 final su una penna usb con unetbootin
Tutto sembra essere andato a posto. La connessione funziona ecc ecc.
Ma sembra che le modifiche che ho apportato, al successivo avvio vengano tutte perse.
Avevo impostato la tastiera in italiano e scaricato i pacchetti desktop-extras per leggere i file multimediali e salvato qualche link in firefox..tutto perso.
Cosa devo fare per rendere l'installazione di nuovi programmi e le varie modifiche persistenti?
Grazie
-
-
22:03
»
Packet Storm Security Misc. Files
Whitepaper called A Serious Newbie's Guide to the Underground v2. This is a continuation of ratdance's original Newbie's guide to the underground.
-
22:03
»
Packet Storm Security Recent Files
Whitepaper called A Serious Newbie's Guide to the Underground v2. This is a continuation of ratdance's original Newbie's guide to the underground.
-
-
13:37
»
remote-exploit & backtrack
Iam a newbie how to use backtrack4 tools,there is any reference book is
avialiable for the commands,or any websites
-
-
12:58
»
remote-exploit & backtrack
Salve ho grossi problemi con Nessus 4.2 la versione home.
Il problema è che riesco a scansionare i bug della mia rete quindi del mio ip, ma se voglio scansionare un'altro ip, o dominio che sia non riesco a farlo...
Cioè fà la scansione con completed ma esce come se non ci fosse riuscito...
Sto settando policies da non sò quanto tempo senza risultato apparte che se metto nei Preference :
seleziono l'opzione ping the remote host
Make the dead hosts appar in the reaport.
Alla fine della scansione mi esce il relativo dominio, ip che sia con un bug low che specifica esattamente quell'opzione...
Che cosa sbaglio? che devo configurare? Vi prego aiutatemi sono DISPERATO!!!
Uso windows xp e l'ho installato su di esso (anche se uso backtrack 4 pre-final ma non sono riuscito a metterci la chiave lì e l'ho installato su windows xp)
-
-
1:05
»
remote-exploit & backtrack
Scusate, mi potreste spiegare come diavolo far funzionare internet sul mio eeepc 1201N scheda di rete----> RealTek RTL8192SE, ho seguito la tua guida ma mi dice che dhcpcd non è installato e stessa cosa per pppoe-setup....Ho bt4...grz per gli aiuti..ho provato anche con network start ma niente
-
-
17:55
»
remote-exploit & backtrack
I've got a laptop running bt4 and an external monitor/tv that i would like to connect to via HDMI.
1. Is it possible?
2. What commands/programs could I use to accomplish this?
I don't expect any in-depth explanation, but if someone could at least provide me with the right tools to search for, it would be greatly appreciated
P.S. If you know of a guide, that would be fscking awesome.
-
-
18:25
»
remote-exploit & backtrack
Is there anybody can tell me where does pyrit stores the password database? I just ran pyrit -i dict import_passwords and I can see that the passwords are imported to a database path called "file:///" but I wonder where it is? :confused:
-
-
15:01
»
remote-exploit & backtrack
I run the command:
[[
pyrit -e [SSID] -f [Dictionary text file] passthrough | cowpatty -d - -r [.cap file] -s [SSID]
]]
and get the following:
[[
cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>
Collected all necessary data to mount crack against WPA/PSK passphrase.
Starting dictionary attack. Please be patient.
Using STDIN for hashfile contents.
Traceback (most recent call last):
File "/usr/bin/pyrit", line 6, in <module>
pyrit_cli.Pyrit_CLI().initFromArgv()
File "/usr/lib/python2.5/site-packages/pyrit_cli.py", line 61, in initFromArgv
args, commands = getopt.getopt(sys.argv[1:], 'u:v:c:e:i:o:r:b:')
File "/usr/lib/python2.5/getopt.py", line 91, in getopt
opts, args = do_shorts(opts, args[0][1:], shortopts, args[1:])
File "/usr/lib/python2.5/getopt.py", line 191, in do_shorts
if short_has_arg(opt, shortopts):
File "/usr/lib/python2.5/getopt.py", line 207, in short_has_arg
raise GetoptError('option -%s not recognized' % opt, opt)
getopt.GetoptError: option -f not recognized
fread: Success
Unable to identify the PSK from the dictionary file. Try expanding your
passphrase list, and double-check the SSID. Sorry it didn't work out.
0 passphrases tested in 0.06 seconds: 0.00 passphrases/second
]]
dmesg claimed there was a python2.5 error so I reinstalled that but it didn't help.
I really don't understand the program to the point where I want to mess with it. My googleFu hasn't helped; does anyone know what the problem is?
-
-
12:11
»
remote-exploit & backtrack
Hello,
This tools seems very powerfull. I'm currently trying it against a friend.
What i don't understand is.. What is the ip i have to give him exactly ?
First example, trying with internet explorer ms10-08 :
Quote:
[*] Exploit running as background job.[*] Started reverse handler on 192.168.1.2:443[*] Using URL: hxxp:// 0.0.0.0:8080/[*] Local IP: hxxp:// 192.168.1.2:8080/[*] Server started.
|
Assuming my Internet IP is : 80.200.115.30
Do i have to give to my target :
Code:
hxxp:// 80.200.115.30
Or
Code:
hxxp://80.200.115.30:8080
?
Because it doesn't seems to react against an internet explorer 6 unpatched
My second try was with a basic Credential Harvester Method :
Code:
[*] Social-Engineer Toolkit Credential Harvester Attack[*] Credential Harvester is running on port 80[*] Information will be displayed to you as it arrives below:
What i did give him was a site cloner of facebook just to try to grab his account detail but i see no information.
He is aware that i'm trying to do this to him, he just let me do it for fun so there is no way he is doing something else.
Thank you for reading,
omegear.
-
-
5:36
»
remote-exploit & backtrack
HI,
I'm in a network and every computer have windows xp sp3 installed with ie8 and there is no antivirus on the systems and windows firewall in enable.
I need to hack one of the computer and get shell from it and I am in a hurry to do that.
Can someone please tell me how can I do that using metaexploit.I have metaexploit v 3.3.3 and I use windows/smb/ms08_067_netapi and I use windows/shell/reverse_tcp payload but when I run exploit it crashed and disappeared by the way I choose the target windows xp sp3(number 4).
I use nmap and checked the target and I find out that these ports is open:80,139,135,445.
Please help me,I'm in a hurry.should I upgrade my metaexploit to a newer version?
I need help i's urgent
Thanks
-
-
7:55
»
remote-exploit & backtrack
Trying to get my BU-353 gps to work with BT3 USB.
I use:
gspd /dev/ttyUSB0
telnet localhost 2947
r
and this gives R=0, or R=1 alternating everytime I do "r"
also I do p, and this gives p=?
So, I dont think I have the device installed, or ttyUSB0 is incorrect.
If the device is installed it should be getting a fix, because I installed in in windows and BU-353 works fine with gpsinfo.
gpsd -V gives 2.37
Im hoping I can make this work, "plug and play", so I dont have to start making static changes to the USB setup. Also does BU-353 PnP work better with BT4?
-
-
0:29
»
remote-exploit & backtrack
Hello everyone. I just got my new ALFA Networks AWUS036H.
And I'd like to use it on usb, with backtrack 4 in a virtual machine.
Can someone please tel me how can I activate'it on the virtual machine and install the drivers ?
Do I need to deactivate the bridge with the physical machine ?
Thank you very much for your help and I hope I posted in the right place. :D
-
-
14:22
»
remote-exploit & backtrack
hello im relatively new ive been building a uni project for the past couple of months which entails me compiling my own bootable OS with secuirty tools built in (very similar to backtrack) but theres one tool im having trouble finding
basically to pass at distinction level i need a trojan program like "pro-rat" for example that is linux compatible so plant on the system to report back to me
can anyone help?
thanks
-
-
7:46
»
remote-exploit & backtrack
-
-
14:51
»
remote-exploit & backtrack
Salve a tutti ho una scheda wireless usb (US300EX Lite) ma non riesco a connettermi a internet.Dando iwconfig e ifconfig me la riconosce come ra0 sembra tutto ok,mi trova le reti e tutto però nonmi connette.La cosa strana è che con l altra scheda mi metto in monitor mode,e vedo come se fossi connesso,cioe vedo il mio bssid access point e connesso ce la penna usb col suo mac e mi prende pure l handshake come se avessi effettuato l accesso solo che non sono connesso,non capisco dove è il problema.Ho smanettato per un bel pò con ubuntu e altre distro,e poi sono approdato su bt 3 e poi 4 e un po ci capisco ma qui non so come uscirne.Grazie a chi mi risponde,vorrei usare la usb su un computer che non ha la scheda wifi.
Bus 002 Device 004: ID 148f:3070 Ralink Technology, Corp. RT2870 Wireless Adapter
ra0 RT2870 Wireless ESSID:"" Nickname:"RT2870STA"
Mode:Auto Frequency=2.462 GHz
-
-
22:36
»
remote-exploit & backtrack
Okay, so I tried to use dsniff and ettercap yesterday to try and sniff telnet login activity on a virtual network I have made through VMs .. dsniff and ettercap just won't catch anything, even though wireshark was catching stuff like mad ..
I have the following setup in VM:
Victim (Ubuntu v7): 192.168.26.134
Server (Ubuntu v9): 192.168.26.142
Hacker (Backtrack v4): 192.168.26.129
Gateway (my physical computer - Windows 7): 192.168.26.1
Supposing that the Victim is telnetting into the Server, which commands to I run on the Hacker computer to capture the passwords ?? I tried all kinds of permutations for IPs with arpspoof yesterday and dsniff just didn't catch anything .. !! Can someone please tell me which commands do I run for using dsniff in the Hacker machine .. ? This really pissed me off yesterday ... I even had set that forwarding bit to 1, and still it didn't work ..
Also I wanted to know, would arp poisoning be needed if the victim, server, gateway and hacker machines are all connected in a private network through a hub ? I mean, in a hub, everyone can listen to all packets, right ? For a switch you may need arp spoofing, but when just a single hub is connecting all 4 machines, arp spoofing would not be needed, right ?
-
-
4:20
»
remote-exploit & backtrack
Hello,
I am studying Honeypots so I am trying to setup honeyd in BT4.
honeyd could be installed easily by using apt-get install
The problem is arpd :confused:
BT4 has arpd installed but it doesn't look the same like honeyd.org version
I tried to install arpd-0.2 but I couldn't install it. when I try to "make" I got the following errors:
arpd.c:268 error: expected ')' before string constant
arpd.c:285 error: expected ')' before string constant
arpd.c:294 error: expected ')' before string constant
After googling i found that starting from gcc 3.4 the compiler treats the "__FUNCTION__" as variable while previous compilers treat it as string?
I also found the following link:
http://aaaleonardo.blogspot.com/2009...os-52-via.html
but the step:
./configure --with-libdnet=/usr/local/libdnet --with-libevent=/usr/local/libevent
is not working even after installing the libdnet and libevent and changing the path to /usr/local/lib/...
there is something wrong with libevent and libpcap
how to solve this problem ?
does BT4 have a different tool with the same functionality ?
-
-
21:15
»
remote-exploit & backtrack
Hi,
There were guides for upgrading KDE to 4.2 for Backtrack 3. Are there plans for upgrading KDE to 4.4 for Backtrack 4?
-
13:50
»
remote-exploit & backtrack
hi
someone have a full .iso wit all program installed like Sponnwep2 spoonwpa aircrack gui?
would be very helpful if someone created a iso with all includes helping those who have no experience in this wonderful world..
Alot of tnx
-
13:26
»
remote-exploit & backtrack
I am having the same problem as the person in a post in the "wireless" area (thread name:
Low #/s) - that is, a problem with gathering enough packets.
I'm on a brand new Dell Studio 1555 (core i5, 4GB RAM) with an Intel wireless card with an Intel 4965/5xxx chipset (according to airmon-ng). From what I've heard, the card only recently got its driver added to the kernel, but it works fine with bt4 out of the box. I've run injection tests, and they have worked fine.
Here is the output from airmon-ng:
Code:
Interface Chipset Driver
wlan0 Intel 4965/5xxx iwlagn - [phy0]
I first stop my wireless:
Code:
root@bt:~# airmon-ng stop wlan0
Interface Chipset Driver
wlan0 Intel 4965/5xxx iwlagn - [phy0]
(monitor mode disabled)
I then enable it with monitor mode:
Code:
root@bt:~# airmon-ng start wlan0 6
Interface Chipset Driver
wlan0 Intel 4965/5xxx iwlagn - [phy0]
(monitor mode enabled on mon0)
I test injection and it works fine.
I then start collecting packets, and find that I have a really low rate, and really low power (generally around -30) so I try to do packet injection. I get the "Association successful :-)" notification and plenty of ARP requests, and it says that I'm sending out loads of packets.
The rate of collection, however, remains completely unchanged.
I then go back to test injection, and it no longer works.
In other words, it's completely identical to the problem that the person in the thread I mentioned above has.
Help would be greatly appreciated.
-
12:29
»
remote-exploit & backtrack
hi :)
i had downloaded the last version of BACKTRACK (version 4) from its official website
Name: bt4-final.iso
Size: 1570 MB
MD5: af139d2a085978618dc53cabc67b9269
i booted from the DVD and i got the Boot screen from where i can choose from 5 Options.
i want to get into graphical mode so when i try to do it i got this error :
ldm_parse_tocblock(): Cannot find TOCBLOCK, database may be corrupt.
but it countinuous and many operations are done succefully. in the End the Command line appears "root@bt:~#" and wait for me te enter some Commands.
how should i proceed?
can anyone confirm the existence of the graphical mode in Backtrack 4?
how can i get it working on my laptop?
my laptop is HP DV7 3010eg (5 months old) very good condition.
Windows 7 german
PS: i tried to boot from Knoppix or Kanotix CD (i don't know wich is the official name) but i got an error that the Kanotix filesystem does not exist. but the CD works properly in teh Graphical mode on my Desktop PC without any problem.
Please don't forget my main object is to hack WIFI Passwords. just to know the ways how to do it and how it works to avoid the attacks from others :rolleyes:
thanks a lot
-
11:36
»
remote-exploit & backtrack
i made 10gb for bt4 final.. after a week i use bt4, i got pop out tell me the disk is full.. i dont know what to delete anymore.. im not store my file in /home but it still full..
actually how and why this problem occurs?
how can i add size of bt4 partition without reinstall it??
-
2:02
»
remote-exploit & backtrack
Hey all ... I've been experimenting with backtrack and metasploit for the past few days now, and I've succesfully managed to penetrate an Windows XP SP0 system using metasploit ... However, when I use the autopwn method in metasploit for scan an ubuntu 7.10 system, no sessions are automatically created, meaning no vulnerabilities were found .. Is this correct ? Are there no exploits in backtrack/metasploit for linux based OSes .. ?
Also, is metasploit's autopwn function a good way of scanning a network for vulnerable systems ?
-
-
12:27
»
remote-exploit & backtrack
Hi, newbie here (so don't bite me if I say something stupid :D, I have just started to learn.)
Ok, So I am right now dual booting slackware and windows 7, with slack installed later and being in MBR. So that Lilo boots up at boot time and asks me if I want to boot into windows or slack.
So far so good. :)
But I want to install BT to hdd, I ran it live and I thought I should install it to hdd, so my question is, if I installed BT now, will grub show all menu and let me boot into 'em. Or I should install BT First and then Slack so that lilo takes over the GRUB of BT if it is so will it show all my OS?
Please anyone help :( ...
I have googled but found nothing, this is only place I can get answer.
Any Help Is Appreciated...
-
10:20
»
remote-exploit & backtrack
Hello ..!
I'm new to the forum and not accurately know where everything is located, if they posted bad about it please move. The second is that it was not so I'm not. "Lazy" plow across and along the board, and, so to speak, "sh*t" - Namely, propagates to me about what the topic .. The course of events is as follows:
a) fires a computer,
b) Then, after loading all of a miracle, fires up the choice of systems, which of course I choose ubuntu,
c) fires up the box loader ubuntu is the first pick, which at the end of the sentence the words "(recovery mode)"
d) Then I load Ubuntu, and even here sometimes when loading the screen blinks (black background) per sec and then continue to load with a light jams
e) When the fires system after about 2 minutes, use type: Setting the bar, pulling the icons on the desktop, etc.., namely small things for now I'm trying to do, because just yesterday I installed Ubuntu and this is so, then I did not like it, and Here is why I am writing to you colleagues
Parameters of the PC (but I do not think it had an impact on it, because in the dad's laptop, which is much weaker hardware to move the walls Mesershmit):
AMD Athlon 3500+ 64Bit`s
ATI Radeon X1650
1.5 GB RAM
HardDisk: 120 GB
Thank you kindly in advance for your help and greet ...
Szpaner
-
7:23
»
remote-exploit & backtrack
Hi Folks,
Been looking at this area for quite some time, watched all the video's and decided to try it. Tried it on a Windows XP Machine, MacBook Pro and finally my Nokia N800. I also tried BT4 on each.
Worked really well, frightening how POP3 passwords just pop up! However, what I haven't been able to do it SSL e.g. Gmail etc.
Before I go any further, I would like to state that this is on my own test network which has both wireless and wired connections. I am using a wireless connection. The end goal is a demostration to a community that are installing an open Wifi network which I have already demonstrated WireShark in action.
My sequence is:
Start ettercap -G
Check Promiscuous Mode is checked, then launch Unified Sniffing, specify wlan0
Scan for Hosts
Add the router to Target 2 and then the computer(s) I want to sniff to Target One.
Start Sniffing
Open MITM and select ARP, then enable Remote Connection sniffing
After a few moments I get the POP passwords etc but nothing SSL.
I note most of the tutorials involve Virtual Machines and they do get SSL info with the same steps above, does this have a bearing on the operation?
I amn't worried about warnings in browsers as I don't intend to implement this, I just want to demo it. Preferably I'd like to run the whole operation with ettercap -G (and on the N800) if possible with the need for SSLStrip etc
Thanks for any info!
ironclaw
-
5:42
»
remote-exploit & backtrack
hey all i am new hire,
first sorry for my englisch i am from Belgium :)
bt4 works fine, but if i run bt4 with usb its go very fast..
now a create a bt4 virtual on my PC, but the problem is i can surf the Internet, but when i go to network he says not wireless found? isent only working with a wiffi usb stick?
wean i run bt4 on usb he reconnaissance my card and i triad to hack my one wifi en its work out for me
i stil not under stand way i can do that on virtual ?
very sorry for my English
-
3:31
»
remote-exploit & backtrack
mi sono appena iscritto al forum e approfitto di questo primo post per salutare tutti i partecipanti.
-
-
18:21
»
remote-exploit & backtrack
I have an ASUS P6T7 WS SuperComputer motherboard with 4 nvidia 9800GTx+ cards in it and I installed the aircrack-cuda program I learned about on these forums **.
I can rip through passwords using John The Ripper at about 200,000K/s but the program misses the password of a known .cap file that I have.
When I run aircrack-ng (normal) using a word list of all English words I can crack the capture easily, but when running the CUDA enabled version I get to the end of the list without ever finding the password.
Is this a Known issue or did I do something wrong?
I googled the problem but I always end up back at these forums with no answer.
I am new to forums in general so please be gentile if I did it wrong and just made an ass out of myself.
**howtos/23208-aircrack-ng-cuda-wpa-2-psk-hacking-backtrack-4beta.html][/url]
-
12:48
»
remote-exploit & backtrack
Hey guys, I've been reading around and i have come to the realization that my wireless card in my Dell Studio 15 (Broadcom 4312 [14e4:4315] [rev1]
), is not supported on this kernel. so I have been fudging around with the new linux kernel (2.6.33) in an effort to get it to work, i have found that it does work in DMA mode, but just slightly, after trying to connect to a AP the driver seems to break and will no longer scan for networks. This can only be fixed by re-installing the kernel. I have been using a pre-built *.deb to install the kernel, however i have just recompiled a kernel my self using:
Code:
make 0=/root/linux-2.6.33/build/kernel_out oldconfig
then continued to install it, but it has a kernel panic on start-up.
Any ideas?
-
11:57
»
remote-exploit & backtrack
Hello,
First time i want to greetings for all master here, i'm a newbie using backtrack. I need a little guide if u don't mind.
I try to pentest wpa2 and i get a handshake to bruteforce, but seems like a dictionary from backtrack cannot found the pasphrase, so i download a completed dictionary ..
and the problem is the dictionary that i download is too big to read by memory, and aircrak pass this dictionary. this dictionary size is 20 GB.
My question is how can i use this dictionary with aircrack ?. i try to view this with all editor and no one can open it. Thank you for your guide. :confused:
-
-
14:17
»
remote-exploit & backtrack
i downloaded an image of slax. Successfully burnt it to a bootable disc and can boot from it, but when I do I just get Calderas dr dos. How do I just boot the os?
-
14:08
»
remote-exploit & backtrack
Hey all ... Well I have a really strange questions to ask ... I'm a university student taking a Network Security course, and I have an upcoming lab in which our class would be split up into groups and would be issued ubuntu or Windows XP Service Pack 1 computers, and our task would be to exploit vulnerabilities in each others systems .. I know that the systems that would be given to us would have Ubuntu 7.10 or Windows XP Service Pack 1 installed on them .. although it would be just a bare OS install (i.e. no additional security patches are applied) .. any mods we need to apply to harden the system would be up to us .. So basically what I'm asking is for a list of ubuntu/Windows XP exploits which I can practice before the lab ...
I have come across one website which archives exploits, but all the exploits I've seen there assume
something about the victim OS ... e.g. the user needs to open some webpage to start the exploit, or it needs to open a site which is set as Trusted, or it needs to have some specific programs installed, etc ... We can't do this as the victim computers won't be under our physical control ... The only thing we know for sure will be running on all systems are the following services (this is part of the rules for this lab, that the following services need to run on all systems .. teams cannot stop these services to avoid getting compromised):
Service Port
------- ----
SSH 22
Telnet 23
SMTP (*) 25
HTTPS 443
MulticastZoo 446
XMPP/Jabber 5222
MySql (**) 3306
PhpMyadmin/pma
So basically I am in need of exploits which exploit vulnerabilities in any one of the above services ..
Thanks in advance ... :)
(here's to hoping that none of my class mates are reading this ) .. :P
-
11:52
»
remote-exploit & backtrack
Hey!
I have tried search on google for this one but don't know what to search for.
This is a GUI on *unix that will, in a mitm attack, redirect victimB msn conversation to you and you could chat with him without him notice anything.
Is this something anyone recognize?
Best regards TF!
Edit; I have set up a network, 3 computers with wlan access. 2 computers (victimA & victimB) are chatting using Msn messenger.
The third computer (thief) will the doing an mitm attack and make victimB's conversation redirect to thief and he then continue the chat without no one notice anything excepts victimA how never get any answer.
Also forgot to say that if there chatting using each others webcam you cold see it as a streaming movie.
//sorry for bad english.
-
9:29
»
remote-exploit & backtrack
iam trying to boot BT4 after everything goes well after starting up "startx" my LCD monitor goes blank and tells me unsupported image or resolution but i can hear BT4 sound start up !!
Monitor: AOC
Model :TFT1780ps
Thank u in advance !
-
1:24
»
remote-exploit & backtrack
Ciao a tutti sono nuovo del forum, era da molto tempo che volevo avvicinarmi a backtrack.
Ho aspettato fino ad adesso a registrarmi perchè solo ieri ho insallato backtrack sul mio nuovo netpc samsung.
Come primi passi ho configurato il wireless senza alcuna difficoltà, anche grazie al WICD :)
La navigazione è perfetta.
Quanto al crack delle reti mi interesso al momento solo delle wpa, perchè in zona non ci sono wep :)
Ho letto qualche guida ma non sono riuscito a trovare le soluzioni a 2 domande, perchè non chiare oppure io non le ho capite:
1. la cattura dell'handshake può avvenire solo se un client si connette all access point?
2. Dopo tanta ricerca non sono ancora riuscito a trovare una wordlist in txt! Per caso potete linkarmene una?
GRAZIE, LEO
-
-
15:04
»
remote-exploit & backtrack
volevo fare un saluto alla comunità due mesi fa il forum non era accessibile e ho dovuto un po' chiaccherare in chat sul canale di backtrack per risolvere alcuni problemi come avviare il network, con il nome di hispanico79, vi faccio un saluto a tutti e mi volevo presentare
-
14:20
»
remote-exploit & backtrack
Ciao a tutti,
sono un nuovo iscritto e mi ritengo il Newbie dei Newbie:) nel vero senso del termine cioè non capisco un accidente di ambiente linux:(...ma purtroppo leggendo quà e la questo mondo ha cominciato ad affascinarmi, quello che non ha mai fatto win, e quindi ho deciso di lanciarmi in questa avventura;)
Chiedo cortesemente il vostro prezioso aiuto per tutto, ma iniziamo con calma e poco alla volta, ripeto, per me linux è arabo
La prima cosa che vi chiedo oggi è: posso connettermi a internet con la mia chiavetta huawei della "tre" utilizzando BT4 in livecd? E, se si, come? Se, no, quali sono le alternative?
Per ora solo questo, spero tanto in qualche vostra risposta, non incazzatevi se per voi sono cose basilari, per me non lo sono.
Vi descrivo il mio portatile casomai potesse tornare utile:
Asus X59SL
cpu intel duo T5800
HD 250 GB
Ram 4GB
Wireless 802.11n
atheros ar928x wireless network adapter
controller ethernet sis191
s.o. win 7 ultimate
Grazie mille a tutti quelli che gentilmente mi risponderanno
-
11:05
»
remote-exploit & backtrack
My wireless card (atheros ar5007eg) is not discovered by BT4 and so I have been told to use ndiswrapper to resolve the problem.
I have ndiswrapper on my linux desktop so that I may use if for bt4 but I can't get it to work.
help.
-
7:25
»
remote-exploit & backtrack
I have read every thread that relates to my issue (for which there are a few) but so far no luck.
My wireless network card (Atheros AR5007EG) is not picked up by bt4.
I have looked into using ndiswrapper but as I'm not confident with the software I'm not sure I installed it properly.
please help.
-
3:25
»
remote-exploit & backtrack
Hi everyone
Can you please help me out?
What tools should I use to test the most critical flaws that this network may have?
I want to point out that the network is under a domain..
Thanks in advance
-
-
16:39
»
remote-exploit & backtrack
Hello,
I have an Intel WiFi Link 5100 AGN in my Sony laptop. It works in BT4 but in BT3 it doesn't show up for airmon-ng.
Anybody know why?
Thanks
-
14:18
»
remote-exploit & backtrack
I cant access bt4 final iam stuck in startx my lan n wireless works, i tried using bt3 i cant start a lan or wireless i tried using /etc/init.d/......, unless theres away around this please guide me thanks
-
12:15
»
remote-exploit & backtrack
Ciao ragazzi, mi scuso subito per l'ambiguità del titolo del post, ma non saprei come scrivere altrimenti. in secondo luogo ringrazio Reversal per il benvenuto in questo forum nel mio precedente post di presentazione...:)
Quello che mi preme chiedere è una delucidazione (neanche tanto tecnica per il moemento, se possibile) su questa distro.
Mi spiego con due domande:
1) uno dei miei esami all'uni è sistemi operativi, dove ci viene richiesto l'utilizzo di una distro di linux...la mia idea era quella di iniziare direttamente il mio viaggio dentro unix attraverso BT4, perchè come spiegato nell'altro post (e da quel poco che ho capito..veramente poco per il momento) avrei interesse a studiare anche tutto l'aspetto sulla sicurezza informatica. quello che volevo chiedere è, se BT4 mi permetta cmq di effettuare qualsiasi operazione che potrei effettuare tramite un'altra distro (suggerite ubuntu o knoppix) o se magari, vista la sua specializzazione, diventi un pò proibitiva (passatemi il termine) per operazione di altro genere...insomma, vi sto chiedendo (sempre con la massima educazione e ringraziandovi in anticipo) se potrei incappare in complicazioni di vario tipo.
So che magari sarebbe utile per rispondere a questa domanda, sapere su cosa andrei a lavorare sul mio progetto, ma anche io ho pochissime informazioni al riguardo.
2) la seconda domanda è veramente ancora più da principiante, ma da qualche parte bisogna pur cominciare :p
Mi chiedevo, se le conoscenze che acquisirò su BT4 siano riconducibili ad altre versione. Più semplicemente, una volta che io ho studiato e imparato una certa procedura X su BT4, questa procedura X risulterà più difficile, più facile o semplicemente identica da attuare, su un sistema operativo differente da BT4?
Grazie ancora per eventuali risposte..
Voprax
-
10:40
»
remote-exploit & backtrack
Hello,
I've been trying to get my USB adapter to work for about a month now and i could really use some help.
I'm on Windows 7 using VMware Workstation and BT4 Final with a Linksys WUSB600N V1.
When i go into BT4 my usb is shown in iwconfig/ifconfig/lsusb.
I can up my adapter with ifconfig ra0 up.. However it hangs for up to 2 - 3 minutes. After it is up i run WICD and attempt to to search for wireless connections. RARELY it will find any.. I have to close and re open it many times before it finds anything. Same issue with iwlist ra0 scan rarely finds anything.
When i do find wifi in WICD and i hit connect it will hang often saying "Taking down interface" and then after staying at "Connecting". I then have to close and reopen it many times in order to get it to connect. it takes me about an hour to get it to work.
is my usb shitting the bed or is there something making it hang? i'de really like to get this to work.
bridging works fine but you cant do anything with it brigded.
any help would be great.
-
7:39
»
remote-exploit & backtrack
Hi,
Trying and searching for days to resolve this. Im trying to get this to work as a favor for someone but no luck whatsoever. :)
using the ASUS wl-167 usb adapter.
I have a windows vista pc, where all is working fine as soon as I plugin the usb adapter, a popup shows and the internet works..(took me a while since I am not familiar with Linux...at all). Also, I see the icon on the bottom of my screen.
Now, i'm trying to do the same on my friends laptop which is a brand new HP with windows 7. however I see no icon, have no internet yet when I go to host virtual network mapping it does see the ASUS adapter. Whenever I plugin the usb adapter I get a message that The network bridge on device VMnet0 is temporarily down because the bridged ethernet device ...... Same setting as on the pc but just cant get it to work
BTW I set both up according to the youtube tutorial by kiwi12k.
I don't know if i'm giving enough information but please help me out with this one. Maybe there is a simple solution that i'm just not seeing.
thanx in advance
-
3:53
»
remote-exploit & backtrack
Hey guys. I know their are multiple topics on this subject. The problem im having is connecting to my WEP protected wireless net work. Iv used many console commands and the Wicd program. It connects for about 2 seconds then drops out.
Just so you know im not bullshiting about spending a fair while searching and reading other posts. Heres the links to the ones iv tried:
http://forums.remote-exploit.org/bt4...-wireless.html
http://forums.remote-exploit.org/bac...g-packets.html
http://forums.remote-exploit.org/new...-awus036h.html
http://forums.remote-exploit.org/bac...aged-mode.html
http://forums.remote-exploit.org/bac...ternet-bt.html
http://forums.remote-exploit.org/bac...-internet.html
http://forums.remote-exploit.org/bac...-internet.html
http://forums.remote-exploit.org/bac...ort-broke.html
http://forums.remote-exploit.org/wir...on-help-2.html
http://forums.remote-exploit.org/new...ack-suite.html
http://forums.remote-exploit.org/new...036h-help.html
http://forums.remote-exploit.org/liv...rtl8187-2.html
http://forums.remote-exploit.org/wir...rformance.html
http://forums.remote-exploit.org/new...-awus036h.html
http://backtrack.offensive-security....p/HCL:Wireless
http://forums.remote-exploit.org/bt3...-bt3-beta.html
http://forums.remote-exploit.org/gen...s-network.html
Ok so we got that out of the way.
Im using a Acer Aspire One netbook with BT4 final as the OS. The stock wireless card is what im using now. It connects fine and stays connected. When i want to use my Alfa 1w with the 9dbi antenna it connects for 1 second. Enough to load one page then drops out. Im using the rlt8187 drivers in managed mode.
Its doing my head in. Everything iv seem to try has failed.
How ever one of the links i provided had a update patch from 2006 i think it was i didnt think to install it due to it being 2010. Not that i knew how.
If you wish for error reports and so on please tell my what to type and ill post up the replies i get from commands because as you can see iv been through a fair few different commands and so on to be able to remember all the outputs and post them in here.
Thanks in advance. Jesse.
-
1:43
»
remote-exploit & backtrack
hi, im little newbie , sorry for my english , well the doubt is about i can´t install any distribution of linux in that machine, i´ll like to install it BT4 but only appears me SQUASHFS error: Major/minor mismatch , older squashfs 3.1 filesystems are unsupported , with all the options i put when i load the disc.
i send the information with a extern optical driver in usb to the machine
i´ve hearded that if i downgrade the bios i can get install ubuntu 8.10 but i want backtrack , or something like that , or gentoo, please if somebody can tells me how to i´ll appreciate it. cheers.:confused:
-
-
22:51
»
remote-exploit & backtrack
I didn't know where else to post this but.. Does anybody know of a good up to date Trojan or RAT compatible with Windows 7? Commercial or Non-commercial (preferably). Something that has reverse connect and full control as if I were there on the computer and optimized for slow connections.
Other than tightVNC I'm not really "in" on what are some good ones recently.
-
21:36
»
remote-exploit & backtrack
Hey Hey, Just wanted to drop a line, or two and say hello to the community. I am new to the forums and a little new to BackTrack (but love ubuntu), so we should get along good I assume ^.^
For other n00bs reading this thread, here is a couple of quick notes on your survival of using BackTrack, or linux in general!
1. I just installed and/or booted BackTrack and I can't get connected OMG! HELP!
* Answer: Kill yourself quickly....no no, just make sure you have eth0
set to default (ifconfig eth0 default) and run dhclient, or you
can manually set the settings (man ifconfig).
* NOTE: Also, if you are using VMWare, you will have to bridge the
connection, and see vmware.com/info?id=68 for that =)
(I have also tried this on Win7, works fine!)
2. I want to hack some neighbors wireless after installing this but I don't know how, can you help me?
* Answer: In order for me, or the community to help you, you must first
help yourself, and you can best do this buy either taking the
online course, or you can read each module and google
how-to's on each module assignment (or make up your own)
* NOTE: Google is your FRIEND, and I have plenty of times come
across someone saying, I can't find I cant find, but all it really
takes is effort, and alot of -"this word" -"that word" -"this too"
tags to really hunt something down to the tee!
3. I want to be super cool like haxdash and get all the sexy ladies!
* Answer: You must first shave your head, spin around in a circle 3
complete times, hit yourself across the face, and still keep
wishing to be like me until it comes true, or you pass out
unconscious and just have a dream of being cool like me!
=p=p=p=p
Anyway, I don't want to wear out this welcome to much, you other n00bs have some homework to do, and so do I (on BT that is, im way out of school thank god)
Good luck and may the Fu be with you!
-
17:48
»
remote-exploit & backtrack
Salve.
Stavo provando a testare la robustezza della pw della mia rete domestica.
Dunque, ho fatto un airdump mentre mi connettevo all'ap col mio notebook.
Nulla di fatto, anche disconnettendo e riconnettendo il notebook ripetutamente
E infatti, Wireshark NON trova i 4 pachetti dell'handshake, ma solo 2: quelli dal laptop all'ap.
Come mai?
Ho provato a fare un search ma non ho trovato nulla di davvero cogente con l'argomento...
Grazie.
-
15:29
»
remote-exploit & backtrack
Ciao a tutti, mi chiamo Davide e mi sono appena registrato! :)
Vi scrivo perchè ho provato a installare BT4 con la procedura grafica di "install.sh": creo la partizione per il dual boot con win7 però quando sono circa al 90% mi esce da kde elencandomi una serie di devices (tastiera, mouse, ecc) e alla fine il messaggio "Fatal server error: Too many input devices" e interrompendo quindi l'installazione.
Come posso risolvere?
Grazie mille
Ciao
Davide
-
12:39
»
remote-exploit & backtrack
My graphic card is ati radeon hd 4570. i was getting an "no screens found" error message after "startx" and i couldnt be able to get in backtrack. (both 3 and 4). i search this forum and found some fixes. it was the error from graphic card driver, and i install my card driver. AND THIS IS HOW TO:
(FOR THE USB BT USERS. the cd users must remaster their cd.s)
1. Go to ati's site and and download the linuz driver for your ati g.card.
h p:// support. amd. com /us / gpudownload / Pages/ index.aspx
"delete spaces"
2. you will able to download like this : "ati-driver-installer-8-01-x86.x86_64.RUN" . after download , rename it as "ati.run" and copy this file to your BT4/ROOTCOPY folder.
3. boot your BT and write "root-toor" (admin you know). after that, DO NOT "startx". write "cd ..". so you will be in the "rootcopy" folder.
4. then write:
bt ~ #chmod +x ati.run
bt ~ #./ati.run
5. then "enter-enter-enter.." until the installing starts.
6. now write startx and enjoy it. :))
-
9:46
»
remote-exploit & backtrack
ok well my first problem is i dont know how to get it to read my wifi card when i type airmon-ng stop wifi0 it says interface(eth1) chipset(unknown) driver(airo)
when i use my auditor live cd it reads my wifi card and it works ic an use kismet and things like that. but when i boot backtrack on my harddrive it wont read it.
my second thing is more of a question which is when im using my auiditor disc and i trying to send packects and capture them using airforge it says there is no buffer space to send packets or something. im sure these are pretty n00b questions but can somebody please help.
-
5:33
»
remote-exploit & backtrack
Hi Guys,
I found spoonwep2 and added it to backtrack 3, no problem, but now am desperately seeking spoonwpa2 and cannot find it anywhere.
Does anyone know where I can get the spoonwpa2.lzm file, or how I could extract it from Nubuntu, or if not, does anyone know if Nubuntu will support the RT878L Chipset?
Thanks
-
2:29
»
remote-exploit & backtrack
Hey guys. This probably isnt the best forum for this type of question but you may be able to lead me to one that might help.
Im currently using BT4 as my OS on a Acer Aspire One netbook.
Im using the Alfa AWUS036H wireless card with the 9db antenna.
When putting the wireless car outside my window and on the roof gutter i notice my old pay tv dish.
This is where i got the idea from. Since my wireless card is clearly not water proof and everything it rains i have to bring it inside.
I want to be able to make a connection from the dish to the wireless card. I can adjust the dish on any angle. The reason i want to do this is that i live on a large property way down the other end from where the main houses wireless system is.
Huge distance my i ad as i drive a car from my little granny flat to the main house.
I need to put the wireless card outside just to pick it up. Inside the house it doesnt pick it up.
What do you guess think of that idea and any ideas on how to go about it?
Im using the RTL8187 drivers not the R8187 drivers since im using it for basic internet.
Any help would be great and a How-to could be made up with crediting to anyone that helps.
Also i just though of its properly not made for a wireless band but could be converted to it somehow.
Thanks in advance.
I was just linked to a site where it gives step by step instructions on how to do it.
http://www.engadget.com/2005/11/15/h...-dish-antenna/
-
-
21:15
»
remote-exploit & backtrack
Hi!
I was using backtrack and I installed skype.
The microphone wasnt working (the audio did work) so I installed oss.
After that , neither the audio or the microphone worked.
What shall I do?
Please help
-
19:58
»
remote-exploit & backtrack
Hi all - its been a while...I've become a dab hand at cracking WEP keys using my AWUS036H but I have a tiny prob...I need to know the command line used to kick off connected clients so that when they reconnect I can get the ARP's rolling...it seems the ARP's only roll when the router is active... if the router is on, with an attached client, but the 'user' is not actually doing anything on the computer then the ARP's simply do not roll...all it takes is one single browser page refresh and off they go...so I want to be able to kick off a client forcing them to reconnect and thus am able to control when the ARP's start collecting...please help, I've been trying to figure this one command out for months!! - Thanks in advance :o)
-
15:48
»
remote-exploit & backtrack
I have a wordlist that doesn't seem to be compatible with aircrack-ng. When i try to brute force the cap file with it the words displayed include html/xml tags. it's 2.3gb in size and comes from this forum group. i'm running ubuntu 9.10 linux!
Can you advise on how to convert this dictionary file please
regards imcookie
-
15:36
»
remote-exploit & backtrack
So I am just trying to get into one of the AP I have set up around my house that is set to WEP. I am following the tutorial on the Aircrack-ng wiki and everything goes fine until I get to the fake authentication at that point I enter all the stuff they say including my normal hardware's mac address and I get out put like this:
Code:
18:18:20 Sending Authentication Request
18:18:20 Authentication successful
18:18:20 Sending Association Request
18:18:20 Sending Authentication Request
18:18:20 Authentication successful
18:18:20 Sending Authentication Request
18:18:20 Authentication successful
and it repeats then after a while it tells me the attack has failed. I have tried from different distances, across the house and right in front of the router but no go.
I looked for a bit on google and found a post here that talked about mac filtering, so I checked my router and it isn't enabled still though I took my netbook and connected it to the AP to get the mac address and then changed my computers to that address, turned the netbook off and tried to authenticate but again I get the same output and a failed attack.
Got any suggestions for how I can fix the issue?
Thanks for the help
-
10:06
»
remote-exploit & backtrack
Hi!
I hope you guys could answer me on this little question!
I know this has been asked hundreds of times but I want an updated answer not one from 2007 etc..
I know all are recomending the Alfa AWUS036H, but 802.11n is on it's way into the marked now so im wondering if there is anything else that have full support for everything (aireplay-ng options and stabilty + 802.11n(for the future))
So is this the adapter to choose AWUS050NH?
Also I dont want a 2000mw adapter cause it sounds hazzardly....
another question: is this just a hoax or is this the real deal --> h**p://cgi.ebay.com/ALPA-AWUS-036EH-USB-WIFI-G-54Mbps-Wireless-Network-Card_W0QQitemZ330412528015QQcmdZViewItemQQptZLH_De faultDomain_0?hash=item4cee1f118f]
-
9:57
»
remote-exploit & backtrack
I am relatively new to BT, and am currently using BT3.
Maybe this is more of a Linux question, but I'm a newbie at that as well.
I thought I would try to upgrade WireShark to the latest release. This, it turns out involved installing a few pre-reqs. One in particular is pixman. I had downloaded and went through the install of pixman-1.10.0. I then tried to rebuild the latest Wireshark, and get a message saying pixman-1.12.0 is required. So, I got that one and installed. Rebuilding Wireshark gives a message about find pixman 1.10.0.
So, the question is, how do I go about removing pixman-1.10.0 so that pixman-1.12.0 will be found by Wireshark? (at least that's what I'm assuming hast to be done.)
Thanks.
-
6:52
»
remote-exploit & backtrack
Ciao ragazzi e ragazze, ho scoperto questo forum grazie al blog italiano di backtrack :).
Mi chiamo Enrico ho 22 anni e studio scienze e tecnologie informatiche, che come quasi tutti i nomi pomposi, serve più che altro a riempirsi la bocca.
La verità è che in questa uni ci insegnano cose molto interessanti (sopratutto programmazione generale, e quasi tutta in java) ma ne tralasciano alcune, sotto ogni punto di vista. tra di queste, la sicurezza informatica. Ed è per questo motivo che mi sono trovato in questo forum. Perchè cerco una comunità o cmq qualcuno che mi dia i LA per capirci qualcosa :D:D
Quindi, se non l'avete capito, vi sto chiedendo aiuto!!! Anche perchè io ho veramente scarsissime conoscenze informatiche e generali. Spero che grazie a voi e con voi possa ampliare i miei confini :).
GRazie a tutti!
-
6:25
»
remote-exploit & backtrack
Salve a tutti, mi sono iscritto in questo bel forum per poter imparare. Vi ringrazio per la collaborazione. Non sono un exp.
-
5:44
»
remote-exploit & backtrack
Salve a tutti sono nuovo del sito e del mondo Back. Ho un note con W vsita (lo so che fa schifo...ma non ho mai installato un so). Vi descrivo cosa ho fatto:
Procedura seguita con Back 4 per .....WPA
1)airmon-ng (per identificare la mia interfaccia)
2)airmon-ng start wlan0 6 (per mettere la scheda intel pro wireless in monitor mode)
3)airodump-ng c 6 w wpa wlan0 (per sniffare le reti)
4)aireplay-ng -0 5 a BBSID c MCA wlan0 (per deautenticare il client che si deve ricollegare; in quel momento aireplay cattura lhandshake)
vi chiedo: quando cattura lhandshake:
-come posso trovare un dizionario per trovare la passw?
-come si carica su Back4?
-come si fanno gli ultimi passaggi?
Grazie per l'aiuto.:confused:
PS non sono un esperto!!!!
-
-
16:17
»
remote-exploit & backtrack
i have install bt4 in vmware (in my desktop pc).
i login with no problem.
when i type iwconfig say no "lo no wireless connections"
"eth0 no wireless connections". what i must now? i have connect usb wifi TPLINK 821N.
thanks
-
-
22:35
»
remote-exploit & backtrack
Does anybody know what chipset a microsoft brand wireless notebook adapter MN-520 has? i read that it should work with backtrack but idk for sure and i need to know if i should just buy a better one?
-
-
7:11
»
remote-exploit & backtrack
hi dears ,
Would you please help me how can i make my Own Rainbow Table like xxx.wpa file ?
i created my own wordlist now i want make my own rainbow table ....
Regards ~
-
-
8:55
»
remote-exploit & backtrack
Ciao a tutti,
scusate la domanda ma non so più dove cercare... e sono anche un pelo arrugginito sullo "smanettamento" di Linux...
insomma ieri ho installato BT4 tutto OK tranne la penna USB D-Link con chipset ralink rt73
praticamente tutte le distro che ho provato la riconoscono in automatico... ma perchè BT no? :(
quello che ho avuto il tempo di controllare sul pannello di controllo di KDE è che il device USB è riconosciuto (cioè mi dice che è una penna USB D-link con chip ralink rt73) ma non viene inserito nella scheda delle periferiche di rete...
avete un idea?
ps ora cerco un posto dove fare una presentazione ;)
-
0:59
»
remote-exploit & backtrack
Hello.
Probably it makes more sense for most users to have the BT4 VMWare Image
(bt4-final-vm.zip) run under VMWare with Windows as HostOS...
Are there any known problems if the HostOS is Linux/Debian?
Thank's a lot for any feedback!
John
-
7:23
»
remote-exploit & backtrack
Salve a tutti!
ho un problemino...
ho installato bt4 final su una penna usb con partizione per persistent live, ed utilizzo questa geometria.
Però... ho comprato una usb davvero minuscola per lasciarla attaccata al portatile nella sua custodia, per lasciarla sempre attaccata.
Ora questa genialata non funziona, non avvia il SO del pc quando scelgo boot first hard disk.
ho provato un sacco di soluzionima nessuna mi funziona.
Avete idee?
Grazie
-penna 8 gb: sdx1 da 5,4 Gb fat32 con bt4 installato tramite UNetbootin; sdx2 da 2,0 Gb ext3 con casper-rw.
-hd formattato ext4 con linux mint 8.
-
5:16
»
remote-exploit & backtrack
Hello all
every time i try to mount using
mount /dev/sda1 /mnt/sda
i get a /dev/sda1 cannot be found in /etc/fstab
however /dev/sda1 is listed by fdisk -l
any advice?
cheers
yoma
-
-
5:58
»
remote-exploit & backtrack
Hello All,
I have successfully burned the DVD .iso image, booted from the disc, and run the install script.
However when i go to boot from the hard drive, i just get a black screen, with a blinking white curser.
i have tried reinstalling multiple times, but same out put occurs. Keyboard isn't detected at this point.
Does anybody have any suggestions?
Thanks
Techevo
-
-
14:14
»
remote-exploit & backtrack
hey guys....
i wanna try this setup:
4 pcs connected to getter in LAN
all are pcs victims
and i wanna try to do mitm with ethercap to catch msn,or facebook password (i got permission to do that)
i need help from you guys to do that what exactly should i do ? with all recpect for moderators..and members
-
-
5:06
»
remote-exploit & backtrack
Hi all, i want to understand ASP-auditor results
ADN version matches -->
sometimes i have reslut ADN version matches windows server 2003 and somtimes sql server 2005
what does that mean ?
also i did not understand brute force results ?
a lot of questions because i did not know a lot about asp :rolleyes: and i want to understand results :confused:
Thanks;
-
4:37
»
remote-exploit & backtrack
need more post to post his
A cap file with WPA handshake i cant seem to finde the passphrase please help me with this one ..you can email me at
vladimirdevonshire@gmail.com
file located here-rapidshare.com/files/350969100/LPE-01.cap
-
4:37
»
remote-exploit & backtrack
need more post to post his
A cap file with WPA handshake i cant seem to finde the passphrase please help me with this one ..you can email me at
vladimirdevonshire@gmail.com
file located here-rapidshare.com/files/350969100/LPE-01.cap
-
-
11:16
»
remote-exploit & backtrack
Everytime I want to create a java based fake website with this tool, in the last phase the following error has been occured :[*] Error : you have something running on port 80 ...
i have checked it out, but there's no such a thing running on port 80 like apache . anyone knows where's the problem?
-
-
8:53
»
remote-exploit & backtrack
Salve a tutti,
volevo chiedervi una cosa... in pratica sono con 4 coinquilini e abbiamo solo 3 ip fastweb...
quindi quello che vorrei fare ogni tanto è giocare un piccolo scherzo facendo cadere la connessione a uno dei 3 e infilarmi io ^^
é una cosa possibile? purtroppo il router fastweb non è configurabile altrimenti saprei come fare ecco perchè chiedo a voi...
Spero di essere stato abbastanza chiaro... grazie
-
-
14:55
»
remote-exploit & backtrack
How do I save ONLY the packets from the DISPLAY FILTER in Wireshark on the fly.
I am using Wireshark to capture traffic from my wireless adapter.
Capture Filter is "port 1863"
Display Filter is "msnms contains plain"
Saving using multiple files.
Next file every 100 MB.
Ring buffer with 2 files.
I would like to get Wireshark to save only the packets after the Display Filter in a separate file automatically so that I dont lose them when the ring buffer maxes out and rolls over.
I would like the program to run continuously saving only packets from the Display Filter on the fly and discarding the rest.
Is there a program that will save the displayed packets to a separate file just before the ring buffer file fills up and clears?
Any way to make the output of the display filter of one wireshark program be the input for a second wireshark program running at the same time.
Is there a better capture filter that will give me only the packets I want?
Any ideas?
Thanks.
-
14:51
»
remote-exploit & backtrack
hi. im a complete noob a linux i found bt4 to be a very good version of linux and it got me very exited to use it so i down load it when i found this tutorial thewifihack.com/blog/?p=39 which is very straight forward but i got stuck because apparently bt4 doesn't come with spoonwep installed could some help me install it or i am missing something.
Thank in advance
ps. great forum :P
-
6:17
»
remote-exploit & backtrack
Hi,
I've installed Backtrack4 on my USB Drive after the tutorial "Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption"
I've installed all but when I try to boot is just says
"
Searching for Boot Record from USB RMD-FDD...OK
GRUB
"
And at this point nothing happens...
Can anybody help my?
Bober
-
-
12:45
»
remote-exploit & backtrack
Hi guys
Ive been having a look at the sendEmail prog and am trying to spoof a few emails.
I have seen this working in PureHates old video about the adobe exploit, where he used a spoofed mail from adobe.
I have tried sendEmail and get the following error.
ERROR => Connection attempt to localhost:25 failed
IO::Socket::INET: connect: Connection refused
I have looked around here and the web and some people say you have to start the SMTP server in Backtrack... So i try the following command.
sendmail start
and it just hangs not doing anything and i have to ctrl + c to get out of it..
any help or a punt in the right direction would be appreciated guys..
nice one
-
9:21
»
remote-exploit & backtrack
I have hp 6735s laptop. I created bootable usb memory stick and CD with bt3 on it. They are both working on hp 510 laptop, but they don't work on mine!
It says that the operating systeme is up, but it doesn't show desktop. It can't find server X, which is for graphics I think. I also tried to boot knopix from cd, and I get blank screen (it also works on other computers... porblem with graphic card again).
It seems that something is wrong with recognizing my graphic card (ati radeon hd 3200).
I tried commands: xconfig and startx, but it still doesn't help.
Can somebody help me with this?
Thanks! :)
-
-
8:05
»
remote-exploit & backtrack
Hello all,i'm newbie
I want to set up lamp in backtrack but when i finished , i can't use mysql
when i use mysql command in konsole
ERROR 2002 (HY000): Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (2)
can i help me ,plz ?
Thank for read Thread
-
-
21:46
»
remote-exploit & backtrack
Ciao a tutti,
Ho un problema con i drivers dell'alfa AWUS036H, cioè non riesco ad installarli e quindi wicd non mi vede nessun wi-fi, ho provato a guardare in giro ma non ho trovato niente di chiaro in italiano, qualcuno mi puo dare una mano o indirizzarmi in qualche guida?
Grazie in anticipo.
-
18:55
»
remote-exploit & backtrack
Hi, ALL
i want to know how i could upload web shells like c99 or r57 to a web and if there are more than way plz tell me step by step :cool:
-
14:23
»
remote-exploit & backtrack
I read ecsployt's quick tutorial on metasploit and it intrigued me..
i got to the end and read a few comments on how good and helpfull it was.
but i have to say i still dont have clue what is going on. can someone suggest some reading for someone like me, (lets say a total vegatable).
Thanks.:confused:
-
13:46
»
remote-exploit & backtrack
New to BT, new to linux = bad combo.
laptop has broadcom netlink bcm57780 etherlink pci controller built in. (confirmed using lspci).
ifconfig shows no eth0 or eth1. I tried /etc/init.d/networking start and neither come up. i also try ifconfig eth0 up and ifconfig eth1 up and also don't work-- no such device.
so i figure i didnt have the right driver. go to broadcom, find the driver, package comes back with an rpm package i download. after a while i figure out rpm doesnt work on debian so i run alien to convert the rpm. so i run "sudo alien -k tg3-3.99k-1.src.rpm" and when i do that i get some errors--
"dpkg-gencontrol: error: current host architecture 'i386' does not appear in package's architecture list (amd64)
dh_gencontrol: command returned error code 65280
make: *** [binary-arch] Error 1
find: 'tg3-3.99k': No such file or directory"
now I am at a bit of a loss for moving this forward. would really appreciate some sage advice on what to try next.
-
13:42
»
remote-exploit & backtrack
Not sure if this is a VB issue or a BT issue. I have BT2 and 3 iso's in VB running just fine except one small problem. I have searched the newbie forum for issues close to mine and dont seem to see any. My issue is that whn i start BT2 and 3 in a VB machine, the window used to autosize to fit the 1024x768 resolution. But then i updated from 3.08 to 3.14. Now what is happening is that the screen of bt2 and 3 are not auto fitted any more so i have to use the scroll bars on the right and bottom sides to move the bt screen around so i can see the task bar. This is anoying since i have to hit the right ctrl button continually to move the envronment to see any of the windows or task bar. I have posted in VB forums but no one has posted back and its been 3 days. Like i mentioned earlier in the post, it used to auto fit the bt screen in the box so i would not have to use the scroll bars. i have tried to look for an option in VB but cant seem to find one. Also i try to change the res of bt3 or 2 to 800x600 but it does not like that. haha.
thanks for the help. I am using bt2 for my labs from the professional pen test book by tom welhelm.
-
11:20
»
remote-exploit & backtrack
I am hoping you lot can help me.
I have a slight problem, I can use WepBuster in BT4 and it will see my WLAN card and won't have a problem with hacking WEP keys. Now my problem is, BT4 won't see my WLAN card so I can't connect to the internet within BT4 if that makes sense?
There must be something simple I am doing as WepBuster can actually see and use my card.
I have a: Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
Thanks for your help
-
5:00
»
remote-exploit & backtrack
hello,
I'd like to get a good wireless USB adapter with Qos(802.11e), that works well with backtrack 4 and support monitor mode as well as injection.
I you can recommend a good one I woud really appreciate it.
-
1:51
»
remote-exploit & backtrack
Hello everyone ,
I have been trying to set up a Fake Access point with airbase-ng but i am having problems with it.
Most of time , i can't see the access point in window , and in my n81
Sometimes , after playing with mtu vales i was able to see , but was never able to connect to it.
I have a intel 5100AGN card. can anyone give me any pointers ?
-
0:58
»
remote-exploit & backtrack
i have a problem with sqlmap
and the problem is that its too slow . specially when i m going to dump the db
any suggestion ?
i have 5mbps connection and using backtrack in vmware last version
-
-
22:57
»
remote-exploit & backtrack
When the attacker not associated with a WPA or WPA2 station and finds a client that is on one of these types of stations. The attacker can still find useful information in the packets such as Google search terms among other things.
What is this kind of attack called?
-
17:58
»
remote-exploit & backtrack
I finally get Backtrack installed, backtrack show up centered in the middle and doesn't use the whole screen. when I was running ubunto 9.10 didn't experience this problem. I've tried to install the nvidia-glx-71 drivers and got this error nvidia-glx-71: depends nvidia-71-kernel-source but it is not going to be installed. settingolution
changed the resilution settings but the picture got smaller, therefore it is set to what should be the correct setting.
Then I tried the fixvesa command, that didn't work. I also used the xconfig command which also didn't work.
any other ideas, suggestions on to fix this would be very helpful.
Thanks
-
17:03
»
remote-exploit & backtrack
I can connect to the network and ping other computers and gain access to the modem, but for some reason I cannot connect to the internet through the same modem?
When I try to set the default gateway it says that it cannot find the device.
-
11:54
»
remote-exploit & backtrack
i know this might sound pretty noobish to some of you professionals, but what is the best way to determine what exploits will work on a victim machine. i know nmap is good for finding ports but what is the method everyone uses to know what exploit to choose that will comply. i am running boxs with win xp sp2 and sp3 and my host with bt4 final.
-
9:29
»
remote-exploit & backtrack
i am beginner ... i am trying to crack wep key of a wi fi network ....its my home network and its key is a mobile no .... i did everything and got the pcap file of handshaking signal using airoplay-ng
its a .cap file ....now how to get the wep key from it since dictionaty attack wont work .....so tell me a brute force method to get it
-
8:44
»
remote-exploit & backtrack
i have d-link dwl 2100 ap connected to biquied patch using low-loss coxial cable it works like charm can this be done to usb dongle so that i can put the antenna which comes with the dongle far to get better range or to extend it.if yes how long the coxial cable should be.the usb dongle gives 17dbm connected 2 dbi omni antenna.?
if that can't be done.i have d-link dwl-2100 ap it acts as repeater also but thing is that you should put the root wep. i need to crack the root acess point wep.using my acess point as repeater then seat near my acess point with dongle connected to laptop.i have permission from my uncle(the root acess point is for my uncle) to do that.i wanna do this for eductianal perpose only. not for illegeal activites so i'm wondering is there a way to do that?
and one thing since d-link is an wirless acess point can i use it instead of usb dongle to crack wep ?i have permisson like i said before. any info would be helpeful. thanks man
i gooogle that and search in fourms too much but can't find answers for those question.
i'm familiar with BT3,BT4 prefinal ,BT4 final,unbunte,ophcrack.
before i finish on bt3 i got pwr in airodump-ng and in bt4 pre final but in bt4 it's zero why?is there anything to do to fix that? i have driver zd1211rw.
-
6:31
»
remote-exploit & backtrack
hi all;
i would like to ask about an automated tool that could list all subdomains for a target domain and not duplicate results :confused:
example:.edu.*
i tried goorecon but it displayed only 60 subdomains while i found manually through google 200 subdomains :rolleyes:
-
4:42
»
remote-exploit & backtrack
Hi..
I hv just installed backtrack4 in virtual box..
I can use internet with bt4..
In win xp i hv a proxy software which always promt me to choose a proxy server(which i hv previously defined.) when i start any internet based application(eg. Telnet,ftp,any internet browser etc.)..
Is there any kind of apps in bt4 which will let me allow to use socks proxy server like the above or nearly above..
-
1:10
»
remote-exploit & backtrack
Ahoy! hey everybody
Just signed up, thought i'd say a quick hello
-
-
21:26
»
remote-exploit & backtrack
Hi, I am doing some Pentesting at school with full permission of the target and the school. I am trying to either exploit it or use social engineering. I would prefer to try and exploit it because that would be more immediate. I looked in the exploit database but did not find an exploit. If either you can point me to an exploit in the database or some other form of exploit I would appreciate it. MITM is an option but I would prefer not to do that as I do not want to try it on a production network even though I am allowed to.
-
15:04
»
remote-exploit & backtrack
Is there a program for Linux that I can manipulate EXE files such as merging and changing icons and file sizes?
-
11:05
»
remote-exploit & backtrack
First off u wanna hi to all members here on the forum first i have been expirmenting with backtrack 4 final installed on my hdd been testing on my own ap for a few weeks first i satrted with gerix cracker and now im doing the attack through konsole like it much better as i can see what actually going on and could adjust packets being sent to get authencated as well as the sec of keep alive packets delay.i've been getting up to 250 pps injecting out of the box no other configs today i will be putting txpower to 35 and down to 1mb will the driver im currently using support the high power(rtl8187). But which driver would you recomend for me to use for injecting i dont care about going online jus injecting its currently using rtl8187. i have the 1000mw version. is there anything else i can do to improve injection. i have both 5 dbi attena and 9 dbi.
-
8:03
»
remote-exploit & backtrack
salve a tutti, sono lie.savant. uso linux da parecchio tempo ormai; la BT mi ha sempre affascinato molto, e ora che è uscita la nuova versione voglio mettermi giù di impegno e innamorarmene perdutamente. :D
-
7:10
»
remote-exploit & backtrack
hey guys i was hoping if someone could please tell me how to enable orload this driver on bt3 or bt4.
I have Atheros AR5B95
No matter wot i try it says no wireless extension
thanks
-
-
12:47
»
remote-exploit & backtrack
I am using Backtrack 4 and the card I have is a GIGABYTE GN-WI01GT AirCruiser G Mini-PCI-E and for the life of me I cannot get it recognized. I just installed BT4 last night and it was working a minute and I did airmon-ng stop wlan0 and I can't get it back up. I did the command to start /etc/init.d/networking when BT is loaded and I tried to start the NETWORK service. I also tried the following commands.
ifconfig wlan0 up
iwconfig wlan0 up
dhcpcd wlan0 up
/etc/init.d/networking start
/etc/init.d/networking restart
airmon-ng start wlan0
I am using wlan0 because thats what it was before this little mishap. Everytime I try those commands it tells me No Such Device. When I do iwconfig wlan0 isn't even showing up.
Thanks for the help.
Edit: The card uses AR5008 (Chipset AR5416)
Edit #2: Ok I guess I got it working again. I typed: modprobe ath5k then sudo ip link set wlan0 up and it started working again. I don't know if it did it on its own or because that command. Can someone confirm this?
Edit #3: Ok scratch that its not working, but it is showing up.
-
-
22:17
»
remote-exploit & backtrack
I've been playing with beef and ettercap, and I've been able to dns spoof my test machine into clicking on my beef hook, and I get a message in the beef log that a zombie has connected and gives some useragent info about it, but the zombie never appears in the zombie column on the left (or in the zombies menu, sometimes localhost will only show up there).
I've had this problem with both chrome and firefox as the victim browser, I get the feeling this is something simple but I can't figure it out, anyone seen this before?
-
17:28
»
remote-exploit & backtrack
Hello!
I want to use medusa web-form module to a page that is in https (port 445 not 80) and has an expired certificate.
I keep getting a message "cannot connect host unreachable"
what can i do?
Thank you!
-
-
1:23
»
remote-exploit & backtrack
Hello community!
Some guy I know is selling his few months old HP Mini 2140 for a funny price of 130eur and I'd like to buy it, but before I do that, I've decided to get some more information about it's wireless chipset and drivers.
Using google, I've found out that this little netbook uses Broadcom's chipset, but I couldn't found out which
vendor type/product code does it contain or
which driver to use, and if it's fully (with injection) supported, and under which kernel, because I've read Broadcom's driver developers removed the monitor mode for some or even all new drivers.
That's all I'd like to know and asap, so that thing won't get sold to someone else.. :)
Thank you all in advance and I hope my english didn't sound too retarded ;)
-
-
15:23
»
remote-exploit & backtrack
I am looking to get a new laptop for backtrack..I am fine with the basic hardware specs of this (ram, hd space, etc) but I do have some questions i hope you can answer...
http:[slash][slash]www[dot]walmart[dot]com/ip/HP-14.1-500GB-dv4-2049wm/12347227]Walmart.com: HP 14.1" Pavilion dv4-2049wm Entertainment Laptop PC with AMD Turion II Ultra Dual-Core Processor & Windows 7 Home Premium: Computers
here is the page from walmart. I mainly want to know if it supports usb boot in bios and how it runs on backtrack. Anyone have experience with this...?:confused:
-
10:07
»
remote-exploit & backtrack
ciao! Dopo aver letto molto su questo forum, ho deciso di iscrivermi. Mi chiamo Gianluca e sono di Torino, inizio a muove i primi passi con bt proprio adesso dopo aver raccolto un pò di documentazione qua e là... che altro dire? Presto inizierò a tediarvi con le mie domande... quindi abbiate pazienza!:D
Ciao!
-
3:46
»
remote-exploit & backtrack
HI!GUYS!
How to set up an IP address in FAST-TRACK (or backtrack) to let vulnerable machine reverse to connect it, I have used backtrack in VM , network is NET, so the IP address of backtrack is a LAN IP address, when the fast-track discovered a vulnerable machine, what it reverse-connected was LAN IP address!I want to use socks5 proxy to accept the date of backlink , how can I set up
an IP address which can provide the reverse connection in the fast-track?
PS:
1,How to set up a global socks5 proxy and multi-level proxy through DANTE ? Now I have an SSH host, how to do it?
2,I have a VM host with 192.168.30.128 , using the WIN2000 system. I would like to use FAST-TRACK autopwn module to test it, but my backtrack IP is 192.168.30.129, I want it to connect back to my backtrack, IP address is WANIPof my host.I use SSH to connect my host to be the SOCKS5 proxy.
3,So I try to add a new network card in the VM virtual machine, and set up it to be a static WAN IP address. The IP address of NIC 2 is still the DHCP's,and then we do port mapping in the virtual machine
As a result, when I try to detect it,the reverse connection is always pointing to my LAN IP address
4、I tried a VPN connection, but i still can not find it!And it still connects back to my LAN IP address.
5、I think it should be no less complex, if you can set up a shared IP address through the backtrack so that all software can choose it?
Look forward to your answer,Thanks
-
-
14:07
»
remote-exploit & backtrack
Buonasera a tutti, mi presento sono jammito.
uso ubuntu da qualche mese e appena scoperta l'esistenza di una distro come backtrack l'ho voluta provare subito (con virtualbox per ora)
ciao a tutti :cool:
-
7:45
»
remote-exploit & backtrack
Hi,
I am relatively new to these forums, and somewhat new to Backtrack.
I was wondering if somebody on here could help me with my Partition Table. I was trying to re-arrange it and make it neater and cleaner.
But, somehow Partition Magic in Vista told me it was all messed up and wanted to know if I wanted that fixed. So as an eager little beaver, who wasn't thinking I hit the "Sure why not" button. =/
Bad mistake.
@ first Windows wouldn't boot, it recognized my custom boot screen then hit a blue screen and cycled. Come to find out my Partition table got screwed up even more so i fixed it from having two boot flag's and dup.li' Entry's along with writing a new MBR & fixing the MFT down to this.
> Fdisk -ul
Code:
root@bt:~# fdisk -ul
Disk /dev/sda: 200.0 GB, 200049647616 bytes
255 heads, 63 sectors/track, 24321 cylinders, total 390721968 sectors
Units = sectors of 1 * 512 = 512 bytes
Disk identifier: 0x00000000
Device Boot Start End Blocks Id System
/dev/sda1 63 144584 72261 6 FAT16
/dev/sda2 145408 21116927 10485760 7 HPFS/NTFS
/dev/sda3 * 21116928 385479674 182181373+ 7 HPFS/NTFS
Disk /dev/sdb: 2086 MB, 2086666240 bytes
2 heads, 63 sectors/track, 32345 cylinders, total 4075520 sectors
Units = sectors of 1 * 512 = 512 bytes
Disk identifier: 0x007a8367
Device Boot Start End Blocks Id System
/dev/sdb1 * 63 2097269 1048603+ b W95 FAT32
/dev/sdb2 2097270 4075469 989100 83 Linux
Disk /dev/sdc: 1000.2 GB, 1000204886016 bytes
255 heads, 63 sectors/track, 121601 cylinders, total 1953525168 sectors
Units = sectors of 1 * 512 = 512 bytes
Disk identifier: 0xe8900690
Device Boot Start End Blocks Id System
/dev/sdc1
Code:
root@bt:~# fdisk -l
Disk /dev/sda: 200.0 GB, 200049647616 bytes
255 heads, 63 sectors/track, 24321 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x00000000
Device Boot Start End Blocks Id System
/dev/sda1 1 9 72261 6 FAT16
/dev/sda2 10 1315 10485760 7 HPFS/NTFS
/dev/sda3 * 1315 23995 182181373+ 7 HPFS/NTFS
My main Disk is sda, Sda1 is my Dell Utility or Dell Media Direct Fat32. My Sda2 is my Dell Recovery Drive NTFS. & my sda3 is my main OS drive. Which windows wont recognize in any recovery setup.
As far as i Can see my Main problem is that sda2 end's on 1315 cylinder and sda3 is set to start on cylinder 1315.
I was wondering if my problem's bigger than this, or if it's just as simple as changing that value with sfdisk or testdisk.
I've tryed testdisk and that wont do any thing, and sfdisk is to complicated for me to just start throwing value's in there.
ANY Help is sooooo Much appreciated.
I'll give you any print out you need.
PLEASE HELP ME, up for two days trying to fix this.
& I'm STUCK!
p.s here's two more sfdisk print out's showing other problem's I've come across.
Code:
root@bt:~# sfdisk -uS /dev/sda --f
Checking that no-one is using this disk right now ...
BLKRRPART: Device or resource busy
This disk is currently in use - repartitioning is probably a bad idea.
Umount all file systems, and swapoff all swap partitions on this disk.
Use the --no-reread flag to suppress this check.
Disk /dev/sda: 24321 cylinders, 255 heads, 63 sectors/track
Old situation:
Units = sectors of 512 bytes, counting from 0
Device Boot Start End #sectors Id System
/dev/sda1 63 144584 144522 6 FAT16
/dev/sda2 145408 21116927 20971520 7 HPFS/NTFS
/dev/sda3 * 21116928 385479674 364362747 7 HPFS/NTFS
/dev/sda4 0 - 0 0 Empty
Input in the following format; absent fields get a default value.
<start> <size> <type [E,S,L,X,hex]> <bootable [-,*]> <c,h,s> <c,h,s>
Usually you only need to specify <start> and <size> (and perhaps <type>).
/dev/sda1 :
&
Code:
root@bt:~# sfdisk -uS /dev/sda1 --f
Checking that no-one is using this disk right now ...
BLKRRPART: Invalid argument
OK
Disk /dev/sda1: 8 cylinders, 255 heads, 63 sectors/track
Old situation:
Units = sectors of 512 bytes, counting from 0
Device Boot Start End #sectors Id System
/dev/sda1p1 30195395 1796312749 1766117355 cd Unknown
start: (c,h,s) expected (1023,254,63) found (0,190,62)
end: (c,h,s) expected (1023,254,63) found (257,19,50)
partition ends on cylinder 257, beyond the end of the disk
/dev/sda1p2 ? 544165376 2228272491 1684107116 72 Unknown
start: (c,h,s) expected (1023,254,63) found (101,107,32)
end: (c,h,s) expected (1023,254,63) found (370,114,47)
partition ends on cylinder 370, beyond the end of the disk
/dev/sda1p3 ? 1109413705 1109433745 20041 45 Unknown
start: (c,h,s) expected (1023,254,63) found (68,114,0)
end: (c,h,s) expected (1023,254,63) found (322,76,12)
partition ends on cylinder 322, beyond the end of the disk
/dev/sda1p4 0 - 0 0 Empty
Input in the following format; absent fields get a default value.
<start> <size> <type [E,S,L,X,hex]> <bootable [-,*]> <c,h,s> <c,h,s>
Usually you only need to specify <start> and <size> (and perhaps <type>).
/dev/sda1p1 :
Code:
root@bt:~# sfdisk -uS /dev/sda2 --f
Checking that no-one is using this disk right now ...
BLKRRPART: Invalid argument
OK
Disk /dev/sda2: 1305 cylinders, 255 heads, 63 sectors/track
Old situation:
Units = sectors of 512 bytes, counting from 0
Device Boot Start End #sectors Id System
/dev/sda2p1 ? 6579571 1924427647 1917848077 70 DiskSecure Multi-Boot
start: (c,h,s) expected (409,142,41) found (365,99,47)
end: (c,h,s) expected (1023,254,63) found (371,114,37)
/dev/sda2p2 ? 1953251627 3771827541 1818575915 43 Unknown
start: (c,h,s) expected (1023,254,63) found (288,115,51)
end: (c,h,s) expected (1023,254,63) found (364,116,50)
/dev/sda2p3 ? 225735265 225735274 10 72 Unknown
start: (c,h,s) expected (1023,254,63) found (288,116,47)
end: (c,h,s) expected (1023,254,63) found (372,101,51)
/dev/sda2p4 2642411520 2642463409 51890 0 Empty
start: (c,h,s) expected (1023,254,63) found (0,0,0)
end: (c,h,s) expected (1023,254,63) found (0,0,0)
Input in the following format; absent fields get a default value.
<start> <size> <type [E,S,L,X,hex]> <bootable [-,*]> <c,h,s> <c,h,s>
Usually you only need to specify <start> and <size> (and perhaps <type>).
/dev/sda2p1 :
It's Pretty much the same for Sda3 as well. :(
Please someone. I really need this drive back. It has so many custom setup's on it.
-
-
23:49
»
remote-exploit & backtrack
Hi all
I am trying to understand the "remote option"
-M arp : oneway (ok this poisions from one group to the other in one direction)
-M arp (ok this poisions from one group to the other bi-directionally)
but ...
What is this remote option
what does -M arp:remote do that -M arp does not do.
From the manual...
Code:
The parameter "remote" is optional and you have to specify it if you want to sniff remote ip address poisoning a gateway. Indeed if you specify a victim and the gw in the TARGETS, ettercap will sniff only connection between them, but to enable ettercap to sniff connections that pass thru the gw, you have to use this parameter.
Can anyone tell me what the above is really saying? Makes no sense to me.
Thanks.
-
15:01
»
remote-exploit & backtrack
Hi,
I tried my best to read about how to install the driver for my intel 5300 agn on my lenovo ideapad y550p machine on BT4 but in vain.
When I do a ifconfig -a, it says there are no devices, so that means the OS has not recognized the card's existence.
I am using a USB bootup. I have the latest kernel 2.6.31...and the driver from intellinuxwireless.org.
Could someone please guide me as to how i need to install this particular driver on my system.
Many many thanks, I am sure this is going to help many users.
Thanks,
Raqeeb
-
3:38
»
remote-exploit & backtrack
Hello, i run backtrack image on VMWARE and i need open new Konsole window - how can i do it? There is no Shell console window button in systray.
Here is my screen capture
screencast.com/t/MjZjYzU0M
Thank you.
-
-
23:12
»
remote-exploit & backtrack
Ola, what's up amigos? :)
In first steps it's really good if someone supports you, so hope to meet friendly and helpful people here. Let me know if I can help you.
Thanks and good luck everyone! ;)
-
21:47
»
remote-exploit & backtrack
I am at a loss and have searched to no avil
Any suggestions would be appreciated. Thanks!!
I keep getting
*** buffer overflow detected ***: cowpatty terminated
No matter what I run
/pentest/passwords/crunch/crunch 8 8 123456 | pyrit -e SCUM BAG -f
- passthrough | cowpatty -d - -r dump*.cap -s SCUM BAG
cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>
Collected all necessary data to mount crack against WPA/PSK passphrase.
Starting dictionary attack. Please be patient.
Using STDIN for hashfile contents.
*** buffer overflow detected ***: cowpatty terminated
======= Backtrace: =========
/lib/tls/i686/cmov/libc.so.6(__fortify_fail+0x48)[0xb7ebb6d8]
/lib/tls/i686/cmov/libc.so.6[0xb7eb9800]
cowpatty[0x804a864]
cowpatty[0x804ac5a]
/lib/tls/i686/cmov/libc.so.6(__libc_start_main+0xe5)[0xb7dd7685]
cowpatty[0x8048cb1]
======= Memory map: ========
08048000-0804d000 r-xp 00000000 00:0f 5876 /usr/local/bin/cowpatty
0804d000-0804e000 r--p 00004000 00:0f 5876 /usr/local/bin/cowpatty
0804e000-0804f000 rw-p 00005000 00:0f 5876 /usr/local/bin/cowpatty
093c2000-093e3000 rw-p 00000000 00:00 0 [heap]
b7da6000-b7da7000 rw-p 00000000 00:00 0
b7da7000-b7dbb000 r-xp 00000000 00:0f 512 /usr/lib/libz.so.1.2.3.3
b7dbb000-b7dbd000 rw-p 00013000 00:0f 512 /usr/lib/libz.so.1.2.3.3
b7dbd000-b7dbf000 r-xp 00000000 00:0f 33 /lib/tls/i686/cmov/libdl-2.8.90
.so
b7dbf000-b7dc0000 r--p 00001000 00:0f 33 /lib/tls/i686/cmov/libdl-2.8.90
.so
b7dc0000-b7dc1000 rw-p 00002000 00:0f 33 /lib/tls/i686/cmov/libdl-2.8.90
.so
b7dc1000-b7f19000 r-xp 00000000 00:0f 39 /lib/tls/i686/cmov/libc-2.8.90.
so
b7f19000-b7f1b000 r--p 00158000 00:0f 39 /lib/tls/i686/cmov/libc-2.8.90.
so
b7f1b000-b7f1c000 rw-p 0015a000 00:0f 39 /lib/tls/i686/cmov/libc-2.8.90.
so
b7f1c000-b7f1f000 rw-p 00000000 00:00 0
b7f1f000-b8052000 r-xp 00000000 00:0f 1594 /usr/lib/i686/cmov/libcrypto.so .0.9.8
b8052000-b805a000 r--p 00132000 00:0f 1594 /usr/lib/i686/cmov/libcrypto.so .0.9.8
b805a000-b8067000 rw-p 0013a000 00:0f 1594 /usr/lib/i686/cmov/libcrypto.so .0.9.8
b8067000-b806b000 rw-p 00000000 00:00 0
b806b000-b8094000 r-xp 00000000 00:0f 5878 /usr/lib/libpcap.so.0.9.8
b8094000-b8095000 r--p 00028000 00:0f 5878 /usr/lib/libpcap.so.0.9.8
b8095000-b8096000 rw-p 00029000 00:0f 5878 /usr/lib/libpcap.so.0.9.8
b8097000-b80a4000 r-xp 00000000 00:0f 1102 /lib/libgcc_s.so.1
b80a4000-b80a5000 r--p 0000c000 00:0f 1102 /lib/libgcc_s.so.1
b80a5000-b80a6000 rw-p 0000d000 00:0f 1102 /lib/libgcc_s.so.1
b80a6000-b80aa000 rw-p 00000000 00:00 0
b80aa000-b80c4000 r-xp 00000000 00:0f 27 /lib/ld-2.8.90.so
b80c4000-b80c5000 rw-p 00000000 00:00 0
b80c5000-b80c6000 r--p 0001a000 00:0f 27 /lib/ld-2.8.90.so
b80c6000-b80c7000 rw-p 0001b000 00:0f 27 /lib/ld-2.8.90.so
bf995000-bf9aa000 rw-p 00000000 00:00 0 [stack]
ffffe000-fffff000 r-xp 00000000 00:00 0 [vdso]
Aborted
-
20:26
»
remote-exploit & backtrack
Hi
Obviously I'm a newbie here. I found this site through google search and I found this forum interesting so I drop by.
Thanks for welcoming me in advance!
-
19:21
»
remote-exploit & backtrack
I have created a few BackTrack 4 VM's and set up snort successfully with the BASE and MySQL integration that is configured automatically through the SERVICES menu. However, I have noticed that if I restart my VM, that as soon as I try to go back to localhost/base I get the following message:
Warning: mysql_pconnect() [function.mysql-pconnect]: Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (2) in /usr/share/php/adodb/drivers/adodb-mysql.inc.php on line 382.
Error (p) connecting to DB: snort@localhost
Check the DB connection variables in base_conf.php
=$alert ...etc.
I have made sure that the alert variables in the base_conf.php file are correct, as I set up two identical VM's and they have the same setup. Both have been restarted, and now I cannot access the BASE web interface.
Is this a known problem perhaps directly related to VMware? Or am I missing something obvious?
Thanks, as any help is greatly appreciated!
-
17:22
»
remote-exploit & backtrack
Attack Simulation and Threat Modeling is a book that explores the abundant resources available in advanced security data collection, classification, processing and mining. It attempts to give insight into a number of alternative methods of security and attack analytics that leverage methodologies adopted from various other disciplines in extracting valuable data to support security research work and chart a course for enterprise security decision making.
Synopsis
Threat Vectors and Attack Signatures
Attack Virtualization and Behavioural analysis
Security Event Correlation and Pattern Recognition
Exploratory Security Analytics and Threat Hypothesis
Machine Learning Algorithms
It is released under the GNU FDL v1.3 License and can be downloaded here:
inverse.com.ng/book2/Attack_Simulation_and_Threat_Modeling.pdf
Cheers!
Olu
-
-
4:53
»
remote-exploit & backtrack
Im using backtrack 4 final and use "macchanger -m 00:11:22:33:44:55 wlan0" to change my mac address. I can connect to my SSID with no problem.
But in windows, i use macshift to change my mac address but i cant connect to my SSID. What actually macchanger in backtrack do?? Can anyone explain shortly to me..
-
4:28
»
remote-exploit & backtrack
i am going to install empathy into my backtrack 4 final.. Is it possible?i cannot find it is support for kde(backtrack) or not. Does anyone did this?
-
-
18:07
»
remote-exploit & backtrack
Locked out of vista (SP2) administrator account, can log on to box via standard user account.
Locked out, truecrypt full OS encryption
Any help on moving forward with this?
-
14:13
»
remote-exploit & backtrack
Backtrack 4 load testing rtl8187 driver.
I know that includes the old driver r8187.
To make the change to our wifi driver must stop the interface to edit the file after locking drivers, go to:
# ifconfig wlan0 down
# vi / etc / modprobe.d / blacklist
we need to find and replace the r8187 driver blacklist r8187 blacklist rtl8187 by, so that we replace the load module by default we are really interested. Save, close and proceed to replace the driver loaded but SHOW ME AN ERROR.
# rmmod rtl8187
root @ bt: ~ # rmmod rtl8187
ERROR: Module rtl8187 does not exist in / proc / modules
What should I do? I'm doing wrong? How do I do?
my English is not very good, sorry.
thanks!
I expect an answer
daniandujar@hotmail.com
-
3:09
»
remote-exploit & backtrack
ok i know you are sick of questions which card buy, or whatever but now i have to decide which one buy and from what i read here this two are good ones.
so if you will help me i will appreciate. i hope i didnt this post in wrong forum. So
ALFA 802.11g High Power Wireless USB WiFi Adapter 1000mW with 5 dBi Antenna RTL8187L
or this one:
Hawking[HWUG1+HA12W] WiFi 108M NIC & 12 dBi Antenna i dont know chipset for sure i think its rt73 from what i read, but if suggested ill ask seller on ebay.
i need usb wlan for general usage. debian or BT4, long-distance.
thanks for help.
-
2:41
»
remote-exploit & backtrack
Hi guys! need your help.
I am using a Asus WL-167g usb dongle. using backtrack 4 cd version.
First I was able to get a handshake in one of the AP using this wl-167g. But when I try to use it in another AP using netgear wireless router, I can't get any handshake. What is the reason. Can any one help.
I tried it again in the same AP where I can get handshake then at the second time around I still can get handshake but why I can't get handshake in netgear wireless router?
-
0:42
»
remote-exploit & backtrack
I use backtrack 4 final
#uname -a
Linux bt 2.6.30.9 #1 SMP Tue Dec 1 21:51:08 EST 2009 i686 GNU/Linux
every time i want to "startx", i need to login as root.(not in user). How can i just login into startx with user permission??also my kdm is "corrupted" by .Xauthority. It says "no permission or something like that.
-
-
21:08
»
remote-exploit & backtrack
Hello, I recently downloaded and made a Backtrack 4 live CD, but wanted something persistent, so I created a bootable USB by following this* tutorial. I can easily get to the prompt when I boot the basic 1024x768 and the Live CD options. However I am unable to get to any form of GUI.
*Oops, no links.
offensive-security.com/videos/backtrack-usb-install-video/backtrack-usb-install.html
I was able to boot a GUI once by using the fixvesa command before startx. Since then I have been unable to reproduce this. I have since reformatted and reinstalled the USB drive a couple of times and tried booting the GUI with and without the fixvesa command with no results.
Every time I run the startx command the screen goes black and there is a blinking underscore in the top left corner of the screen.
I believe it to be a driver issue perhaps, but what is really strange is how I was able to get it working only once and have been unable to reproduce the results.
I am fairly new to Linux so if you have any idea how to fix this, please be specific as to which commands I should use. I am also open to alternative methods such as dual booting. I can't test anything using the live CD as I'm on a netbook with no optimal medium. Specs to follow:
HP mini 2133
Via C7-M 1.2GhZ
1GB DDR
Thanks
~Nemesis
-
19:34
»
remote-exploit & backtrack
I am new to Back Track and everything related.
Ok where to start...
I have windows 7. I downloaded BT4 iso. I ran unetbootin and set it up on my hd(cdrive). I got on to the bt desktop and tried to run the install.sh it tried to install it onto my jump drive. I ended it and removed the jump drive. I tried again and when I got to the part where I should be able to set the partition it took me a page called partition prep. It wouldn't let me do anything. Every program was disabled and there were no partitions listed. I tried to make a new partition and it wouldn't read the partition either.
Someone please help me. I was really excited to run a dual boot and would love to know how to fix this error. Im reallllly lost as to what to do so anything would be nice. :confused:
-
14:34
»
remote-exploit & backtrack
this is my first post so be easy on me..
is there a hexagonal key generator inside backtrack?
i want to make a password list with all the possible combination's for 10 character long hexagonal keys
i already have a generator for windows (pwlistgen_v1.8 by sh4d0w) which will do this but its asking for 12tb that's space i don't have.
half the passwords it generates have 4,5,6,7,8,9,10 characters the same next to each other
e.g.
AAAAAAAAAA
BAAAAAAAAA
BBAAAAAAAA
BBBAAAAAAA
BBBBAAAAAA
and so on...
the way i see it it would be highly unlikely that a password would have more than 3 of the same characters in a row,
is there a way to generate a list that does all the passwords but don't write more than 3 characters in a row?
any ideas how much big the list would be after?
thanks :)
-
13:33
»
remote-exploit & backtrack
Hello
Im looking for a device with same compability and power like ALFA AWUS036H, but with 802.11n support.
I checked some forum entries, but there are so many different sayings about devices, that Im confused more and more...
I hope somone of you can give me an undisputed answer.
-
9:16
»
remote-exploit & backtrack
I'm trying to check out some pages to spoof on a LAN and have one little problem:
I've checked in /var/www/ and cannot find the index.html file. LOL...big problem.
Okay, so I have three folders in this location: base, squid-reports, and unicornscan. There are two .php files in these folders named index but no html files.
Please fellas, comment and help me find it!
-
-
19:26
»
remote-exploit & backtrack
OK so I'm new to BackTrack and I'm curious about the command line...as the title says I am booting BT4 from a 2gb usb in the persistent mode. After I load the gui how would I connect to my home network wifi? :confused:
-
13:52
»
remote-exploit & backtrack
Hi,
I used to work with BT3, BT4 Pre-Final but with BT4 Final I am experiencing the issue below.
I am using EEE PC900. I used to use the commands below with BT3 and BT4 Pre-Final which worked;
# airmon-ng stop ath0
# ifconfig wifi0 down
# maccahnger mac 00:11:22:33:44:55 wifi0
# airmon-ng start wifi0
#airodump-ng ath0
Then I collect the packets and write them to a file, I do a fake authentication with aireplay and sucessfully authenticate.
Now with BT4 Final, I have the feeling that ath0 has been replaced with mon0 and wifi0 has been replaced with wlan0.
So if I use the commands below, I can not sucessfully authenticate and always receive Sending authentication request (Open System)
# airmon-ng stop mon0
# ifconfig wlan0 down
# maccahnger mac 00:11:22:33:44:55 wlan0
# airmon-ng start wlan0
#airodump-ng mon0
If I boot up my BT4 Final and just type airmon-ng, I get
Interface Chipset Driver
wlan0 Atheros ath5k - [phy0]
I am testing it with my own Access Point so I know it worked before but with BT4 Final, I experience this issue. What has been changed with BT4 Final? Any suggestions how to resolve this?
Thank you
Trappist
-
13:10
»
remote-exploit & backtrack
Hi there
i have a problem and i need some help... when i start nmap command like -T aggressive -sV -P0 or something like that my internet connections died directly...
NMAP SYS:
(SYN Stealth Scan Timing: About 35.17% done; ETC: 21:50 (0:03:15 remaining)
sendto in send_ip_packet: sendto(5, packet, 44, 0,xx.xx.xx.xx, 16) => Network is
unreachable
Offending packet: TCP xxx.xxx.xxx.xxx:xxxxx > xx.xx.xx.xx:xxxxS ttl=40 id=10530 ip
len=44 seq=859018994 win=1024 <mss 1460>
Sleeping 15 seconds then retrying )
i don't know why, but all goes down. I have Tenda N router and my laptop is sony vaio (VGN-SZ3XWP) with Ethernet: Marvell Yukon 88E8036 PCI-E Fast Ethernet Controller. My question is what is the reason for doing this... To fix the problem i must shut down the router for a 20 seconds and after that work's fine.
-
11:41
»
remote-exploit & backtrack
i got hp compaq nc 6220 lap top with intel[R]pro/wireless 2200BG NETWORK CONNECTION
MY QUESTION IS
WICH ONE IS THE BEST USB WIRELESS CARD ADAPTER TO USE BACK TRACK 4
TO HACK WEP KEYS
PLEASE HELP
-
7:24
»
remote-exploit & backtrack
newbie to metasploita and other similar.
i have downloaded on one machine and transferred to another server for install.
having installed it now says it hase not been update for 42 days. however the server has no internet connectivity. any advice how i can update?
Thanks
-
5:33
»
remote-exploit & backtrack
Im not certain if this is the right spot to post this but i just wanted to take some time out too thank Everyone that contribute too this message board and make it what it is! I'm a long time reader and first time poster just saying thanks all!
-
5:12
»
remote-exploit & backtrack
Ciao a tutti!!
Sono nuovo del forum. Scusatemi se parto con le richieste d'aiuto già dal primo post...
Il mio problema è questo: dopo aver fatto partire backtrack 4 final da USB, al momento del lancio di "startx", ricevo il seguente errore:
Fatal server error:
no screens found
La mia scheda video è una ATI Mobility Radeon 4570 HD.
Ho provato ad installare i driver ATI, prima di lanciare startx, con il comando "apt-get install backtrack-ati" ma ricevo comunque l'errore; ho provato anche a date apt-get update e upgrade... idem... :confused: :confused:
Mi potete aiutare?
-
4:37
»
remote-exploit & backtrack
hi all
I have zd1211rw chip USB Wirelss adapter.
but Backtrack 4 final is not working zd1211rw.
Quote:
I try compat-wireless
1 download by compat-wireless and extract.
2 patched zd1211rw-inject+dbi-fix-2.6.26.patch and mac80211-2.6.29-fix-tx-ctl-no-ack-retry-count.patch.
3 make && make install
4 make unload && modprobe zd1211rw
|
but run to
airmon-ng start wlan0
freeze...
thanks
-
-
22:44
»
remote-exploit & backtrack
Hello,
I see lots of videos on how to hack WEP. Actually thats basically what i see on here and on other videos sites. My question is. Whats next? After you hack the victims WEP. Then what do you do. Ok you have there password. So whats the big deal to get there password to access there internet?
I dont see any other videos for this next feture. All i see is how to hack wep. Can someone tell me whats next so i can start to do some research please.
I did see a video that someone took over there computer and i seen a video something about a social network hack ( not sure if thats correct way of saying it though ) But whats next after you hack there wep key
thanks
Big Mike
-
20:54
»
remote-exploit & backtrack
Just as the title asks - I tried arpspoof (recompiled for ath0 support) but I heard that arpspoof won't work from a wireless attacker. Anybody gotten it to work?
-
18:42
»
remote-exploit & backtrack
Hello..I seen some stuff on google were people are watching videos in Ubuntu. What im trying to do is download some videos and watch the video as i use backtrack. The only way i can learn is to practice and watch videos as i go.
I installed Backtrack 4 dual boot with Windows Vista 64 bit. So as of now i have to restart my computer and then go to back track and i would like to watch some videos
is there a command or something i need to download to get the video player to work?
thanks
Big Mike
-
11:37
»
remote-exploit & backtrack
un saluto a tutto la comunità italiana , per questo angolo dedicato a noi.
-
10:51
»
remote-exploit & backtrack
here in the UK, I know that most ISP ship routers with Pre loaded sercurity..
most of which use pw of 8 char. in the form,number letter number ie1a2b3cd So does anyone know of a premade dictionary that i could run Aircrack -NG against that... this is just to prove a point
-
10:07
»
remote-exploit & backtrack
ciao a tutti, sono un niubbissimo, ma sono appena riuscito a installare backtrack 4 in dual boot con ubuntu suo mio netbook (che tra l'altro ha una broadcom come scheda wireless, ma un problema per volta!), ho seguito le varie istruzioni e i vari video che si trovano online, ma in tutti quando si riavvia il pc ci chiede di inserire il login. Sul mio invece c'è scritto (initramfs) ho provato a dare startx, a scrivere login, root ecc, ma non riesco a fare niente. cosa faccio? Ho fatto un'installazione con la home separata, root su una partizione da 10GB e la home su un'altra da 10GB, non ho installato il boot, perché ho dato un update-grub...
-
-
23:15
»
remote-exploit & backtrack
How can I make a wordlist of all the possible phone number combinations that are in my area.
For example, I live in California where the area code to phone numbers is 818. So I need to learn how to make a wordlist with the numbers going from 8180000000 to 8189999999.
Can anyone help me out?
~Thanks
So sorry for posting this. I should've lurked more.
perl -e 'for($i=0; $i<=9999999999; $i++) {print "$i\n"}' > numberlist.txt
-
17:55
»
remote-exploit & backtrack
I am new to backtrack but have use Ubuntu a lot in the past. My question is this, I use sslstrip with ettercap to monitor my home network but on the "victim" computer i can not get past the log in like it wont let me actually log in but ettercap captures the password? why could this be?
-
14:51
»
remote-exploit & backtrack
I am having a little problem with capturing my WPA Handshake NOTE: This is for MY Home network. I have even tried turning the connected computer off and unplugging it from the router also turning the router off and back on NOTHING Works I simply can not capture MY Handshake I attend college as a Network Admin where I captured My schools handshake but I believe this is because there are always lots of people connected to the network i cant remember if i even had to deauth a computer although now i think of it I believe I did as well as spoofed my mac NOTE: I am not spoofing my MAC for my home network. can someone please help
-
10:38
»
remote-exploit & backtrack
hi all .. i was trying to crack security for some routers .. i tried to crack web, and i done it ,, also wpa/wpa2 and i cracked it (because the password was in the dictionary as all know)
but the question is ,, that there is a router has web security,and its channel is 123 ,, and when i start the monitor mode in on its channel ,, and start airodump again i see that its channel channged to another
first
Code:
CH 5 ][ Elapsed: 4 s ][ 2010-01-31 19:33
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:C0:CA:1D:DA:3E -1 0 7 1 123 -1 WEP WEP <length: 0>
00:1F:9F:D3:1F:EB -47 10 0 0 3 54 WPA2 CCMP PSK test
BSSID STATION PWR Rate Lost Packets Probes
00:C0:CA:1D:DA:3E 00:60:B3:35:FB:E1 -86 0 - 1 0 9
00:C0:CA:1D:DA:3E 00:19:E0:79:EB:D0 -84 0 - 1 13 24
after typing airodump again .. i see that its channel changed to another
second
Code:
CH 2 ][ Elapsed: 4 s ][ 2010-01-31 19:39
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:C0:CA:1D:DA:3E -1 0 7 3 118 -1 WEP WEP <length: 0>
00:1F:9F:D3:1F:EB -51 8 0 0 3 54 WPA2 CCMP PSK test
BSSID STATION PWR Rate Lost Packets Probes
00:C0:CA:1D:DA:3E 00:60:B3:35:FB:E1 -86 0 - 1 0 10
00:C0:CA:1D:DA:3E 00:19:E0:79:EB:D0 -81 0 - 1 5 4
it had changed to 118 :S .. i cant crack it ..
if some one can give help or solution .. i thank him lot ...
-
7:59
»
remote-exploit & backtrack
how to crack non sense pass ?
-
7:42
»
remote-exploit & backtrack
When I try to manually connect to my network all goes well up until
The dhcpcd command.
I never get a ip address assigned. Any idea why this is?
-
7:11
»
remote-exploit & backtrack
Vorrei acquistare una nuova antenna, completamente funzionante su backtrack,che supporti il monitor mode e packet injection,tempo fa avevo trovato una Zydas omni ZD1211RW da 18db, ke purtroppo mi son fatto scappare :-((
Ora punterei su una ALFA AWU036H (Realtek 8187L) da 1W, con antenna da 7 o 5db, mi confermate che può andar bene? o meglio il modello da 550mw per la nuova banda N??
Grazie x i consigli
-
6:02
»
remote-exploit & backtrack
ciao sono un nuovo noob di back track... che dire... bel S.O., bel forum, bel lavoro :D
-
-
20:40
»
remote-exploit & backtrack
Hi guys
I'm trying this command:
./crunch 8 10 1234567890 |pyrit -e filchev -i - -r /root/filchev.cap attack_pastrough | cowpatty -f - -s filchev -r /root/filchev.cap
And I cant find why:
Unable to identify the PSK from the dictionary file. Try expanding your
passphrase list, and double-check the SSID. Sorry it didn't work out.
my software
Pached cowpatty 4.6
Pyrit 0.2.5-dev (svn r205)
crunch version 1.8
Running benchmark (22818.5 PMKs/s)... (:eek: 24~25k whatever)
Computed 22781.20 PMKs/s total.
#1: 'CUDA-Device #1 'GeForce GTX 260'': 10628.9 PMKs/s (RTT 2.8)
#2: 'CUDA-Device #2 'GeForce GTX 260'': 9911.1 PMKs/s (RTT 2.9)
#3: 'CPU-Core (SSE2)': 467.3 PMKs/s (RTT 3.0)
#4: 'CPU-Core (SSE2)': 474.0 PMKs/s (RTT 2.9)
#5: 'Network-Clients': 0.0 PMKs/s (RTT 0.0)
my hardware:
MB: ASUS P5N-D nvidia chipset
CPU: Q6600
VGA: 2x GTX260
Can you hlep me? :o
10x
-
16:02
»
remote-exploit & backtrack
I'd like to know how to proceed to add a second NIC in VirtualBox. Its set 2 NICs. One configured with NAT and another with Internat Network. The problem is that just the first NIC works. In this case, the one with NAT. If I configure the first one with Internal Network and the second with NAT, just the NIC with Internal Network will appear on ifconfig. What should I do? :confused:
-
7:19
»
remote-exploit & backtrack
Inizio salutando tutti visto che nella mail inviatami subito dopo la conferma della registrazione mi è stato scritto che posso postare solo qui.
Aspetterò i tre giorni prima di poter fare qualche domanda, ho già cercato nel sito ma non ho trovato ciò che desideravo...ora cerco meglio nel forum, anche quello internazionale.
Detto ciò ho scoperto la backtrack da poco (mese scorso) tuttavia mi sono deciso a utilizzarla/installarla solo questa settimana perchè stavo finendo di testare fedora 12 :p
Mmmmmm bhè non so che altro dire :D
-
6:21
»
remote-exploit & backtrack
what if my code it just nonsence several digits like this --> 1fu63d6zz\
how can u find this one ?
p.s
can u please explain what is this rainbow that everyone speaking about?
or where i can get info ?
i googled it but it doesnt give specific info
10x
-
6:18
»
remote-exploit & backtrack
Hey
I was wondering why does BT forums display posts in reverse. Example, if a thread is 20 pages long, the first post (OP) is on page 20 and on the bottom. It is very annoying and very hard to thread a thread this way. How do I change it?
Thanks.
-
4:12
»
remote-exploit & backtrack
Hey,
I have a 8 GB SanDisk USB.And backtrack 4 can't detect it when use the command Dmesg .I'm booting the BT4 from a virtual box and it can detect the virtual box's driver (hda).
Any ideas?
Please bear with me a little.
thanks,
-
0:00
»
remote-exploit & backtrack
Ok,.. So I got a pickle here and wanted to know if anyone ran into this,..
Went with verizon fios and they have there own routers cause I am amusing fiber optics? For giggles I tried to crack the new router at my house and it won't let me inject into it.. Works fine for my linksys one but for some reason there router seems to be a something new. There is something also new, you know it tells you the speed of the connection? like 54(Mps)? Well it says 54e.
Wait did some research,.. is this a case if mac address filtering? if so how do I adapt?
Also does that e mean that there is in fact mac address filtering going on?
-
-
21:45
»
remote-exploit & backtrack
allright so im scratching my head on this one, im trying to connect to a wireless router, i can connect in windows no problem, with the wep key entered, but i cant figure out how to connect backtrack to my network wirelessly, its annoying not having network access while using backtrack.
it detects networks no problem , and its probably something really simple, anyone can enlighten me?
-
14:17
»
remote-exploit & backtrack
Hey guys ive had this wireless dongle for about a year now, its the linksys wusb54gc (with ralink rt73 driver). Ive used this card with alot of linux distros most of the time its just plug and connect. BT4 is recognizing the card when i put lsusb in the command line, but it wont show up under network interfaces. Ive googled about this alot and cant seem to find an anserw.
-
12:58
»
remote-exploit & backtrack
hi there,
i have got a shell on my w2k pro sp4 workstation, and i am trying to connect to bt4 tftp to GET a file or 3 .
the w2k machine says cannot write to file. is this a permissions thing or have i not setup bt4 final to use tftp properly.
many thanks in advance.
chris
actually i just sussed it by changing the dir on w2k to docs and settings\all users and it worked
-
12:49
»
remote-exploit & backtrack
I have VMware Workstation7.bundle how can setup on live cd
used method for modify live cd secript bt4-customise.sh
how can tell command to setup to path folder "edit" , without setup on system just setup on folder "edit"
-
12:39
»
remote-exploit & backtrack
hi
I did this
Code:
Install:
wget hxxp://dl.aircrack-ng.org/drivers/ipwraw-ng-2.3.4-04022008.tar.bz2
tar -xjf ipwraw-ng-2.3.4-04022008.tar.bz2
cd ipwraw-ng*
make
make install_ucode
make install
all goes well till the last make install then i get
Code:
make*** No rule to make target 'ipwraw.ko', needed by 'install'. stop
i had no errors up to this point and if i ignore it and do the modprobe ipwraw i get the module not found error
can anyone help please
-
11:41
»
remote-exploit & backtrack
Hi, anybody tried to install evtouch? I would like to have the touch screen feature of my Samsung Q1U functional (USB persistent). Any clues?
-
5:45
»
remote-exploit & backtrack
Mi potreste dire quali sono i comandi di traceroute e a che cosa servono???(per quanto riguarda i comandi li so ma non so a che cosa servono....):D:D
Grazie!!!
-
-
18:06
»
remote-exploit & backtrack
Hello,
I have been browsing the forums but I haven't found any topic which could help me with my problem. Is there any USB adapter which is a "default"/"standard" choice for you? Something of high performance/working out of the box and compatibile with spooonwep/spoonwep2/spoonwpa? All suggestions appreciated :)
Best regards :)
PS. Also, I have been looking at Ralink RT73 chipset. Does it work out of the box with the previously named apps?
-
15:55
»
remote-exploit & backtrack
So I've played around with metasploit for a while now, pentesting my own network. One problem: Once I have successfully gotten a meterpreter shell, I cannot figure out how to correctly modify/add a registry value with a space in the path.
for example, if I run this:
HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\SpecialAccounts\\Use rList -v fred -d 0
it tries to do something with:
HKLM\\Software\\Microsoft\\Windows
I have tried to enclose it it quotes, like you would in a windows command shell, and several other things to no avail.
Any help would be much appreciated.
(Unfortunatly, I am running metasploit under windows, so could this cause slight syntax problems?)
-
15:07
»
remote-exploit & backtrack
Hi, READ THIS OUT BEFORE YOU ACCUSE ME OF LAZINESS ... yes I HAVE searched the forums, the FAQ's and the tuts, I have googled like crazy, but it seems that my problem is so basic that no one has bothered to make a thread about it.
I already know how to properly burn an iso to a CD / USB drive, BUT my problem is the actual CD .. do you have to get a 2gb+ CD / DVD for BT4? because I only have 700mb max CD's ... I read somewhere you can split it up and use 2 CD's somehow but it was very confusing for me because I'm very new at this (but I learn fast [; ) is this possible and if so, how?
USB drive is out of the question for me due to problems with the BIOS on my lappy, but I was told that dual boot up was possible without having to go into BIOS and change settings (can someone confirm?)
If one does need a 2gb+ cd/dvd for BT4 then I plan on installing the older versions which are a lot smaller than BT4.
Thanks to anybody who takes the time to read this and/or reply
Unanswered Questions:
Then is burning onto a blank DVD disc the only way I can dual boot with BT4? is there no way I can burn BT4 onto a regular 7xx mb cd? or the "splitting up and using 2 CD's"?
And can someone confirm that you don't need to be able to go into BIOS settings in order to dual boot?
-
14:48
»
remote-exploit & backtrack
i am new to backtrack and i was testing out my wireless network to see if i could crack it. i got the handshake and everything i needed but when i ran the aircrack script i got a no handshake error. any thoughts. here it the link to a screenshot of my issue.
"i282.photobucket.com/albums/kk255/mondo6919/snapshot2.png"
-
14:34
»
remote-exploit & backtrack
Hello im having trouble with some wifi cracking im trying the target networks are all on channel 13 i have 2 wifi cards on my laptop a IPW3945 built in jobby and a USB f5d7050b both are working fine on wlano and wlan1. However they wont go to a channel above 11 in airmon or airodump etc.. even using the channel flags i dont get an error but it just uses channel 11.
when i get to using aireplay-ng i get the error " WLAN0 is on channel 11, but the AP uses channel 13"
ive traced this error back to a driver issue the drivers built into bt4 are the US version and they only have 11 wifi channels here in the UK we use channel 13 all the time for some reason ( mainly as BT defaults to that on their equipment they give free with the broadband)
anyway i thought i had found the fix to this
Quote:
The key piece to sorting this out was adding this line to my /etc/modprobe.d/options and then re-starting my system (simple - brute force!):
options cfg80211 ieee80211_regdom="EU"
"iwlist wlan0 channel" previously only reported channels 1 to 11, but now shows all of them. No problems connecting to the AP now on channel 13:
steve@steve-laptop:~$ iwlist wlan0 channel
wlan0 13 channels in total; available frequencies :
Channel 01 : 2.412 GHz
Channel 02 : 2.417 GHz
( blah blah blah blah )
Channel 11 : 2.462 GHz
Channel 12 : 2.467 GHz
Channel 13 : 2.472 GHz
Current Frequency=2.472 GHz (Channel 13)
|
i did all the above and besides the fact i have 32 channels available none of them are 12 13 and 14
what am i doing wrong does anyone know ?? has anyone done this before to get to use channel 13 ?
thanks for your replies please keep them simple i am a total noob
oh forgot to add in windows both these cards work fine in the EU channel bands ..
thought i spotted a mistake as the "EU" is in quotes in his text and i found the same instructions elsewhere without the quotes round the EU and you can also use JP but no its still only does 1-11
-
14:29
»
remote-exploit & backtrack
hello
i have backtrack 3 and always show this error
debbi:-# airmon-ng
Interface Chipset Driver
debbi:-#
i can`t see any information if i write this command (airmon-ng)
thanks for all
-
14:24
»
remote-exploit & backtrack
As the title stated, I am trying to find some facts about
WHICH USB Wifi N-Draft that is known to work with Backtrack installed on VMWare Fusion.
The USB N-Draft that I am looking are the ones that supports
BOTH 2.4Ghz and 5Ghz.
If someone has used a particular USB N-Draft Wifi for the above, could you share the brand, model and where you buy it?
Thanks!
-
11:59
»
remote-exploit & backtrack
Hi,
I installed BT4 on my laptop. When i run wicd, all the networks which are visible are encrypted. To connect to them i get a message 'encryption should be enabled before connecting to the network'
Ok so I go in the advanced settings and there I am asked to enter the WPA key.
Now my question is this.
The network is public. Secured but public and I can connect to it using windows without any password or WPA key authentication. Windows connects to this network using TKIP encryption.
How do I go about this? I am not asking how to hack WPA but how do I connect to the network since I do not know the WPA and it is not requested while running windows.
Is there any other way to connect without entering the WPA ? If so how ?
Thank you for the time and help!
-p4
-
9:30
»
remote-exploit & backtrack
I've only been doing this for half an year, but I really sunk some time and resources into this. I'm fascinated by all this stuff especially the cryptoanalysis side of things and the antenna issues. I also realize there are quite a few bright people out there on this forum.
I started by using Backtrack 4 on a thumb drive and some of the wireless connections in my neighborhood as test targets.
I quickly found that using out of the box Orinoco Gold and Hawking HWUG1 adapters, i could barely capture the WPA handshake on my own router let alone my neighbors.
I built a 4 foot 12 db Antenna out of LMR 400 and I also tried a 30" Hawking Omni antenna. To this day, I've found out that unless my antenna is within close proximity (40 to 50 feet) on a cold night, I still cannot capture WPA handshakes good enough for Cowpatty. This denies me use of the Rainbow Tables. (Over the holidays, Christmas Decorations and displays offered me some clever locations for hiding that 4 foot antenna of mine.)
I have obtained quite a few Aircrack-ng quality handshakes which means I have to use JTR and Aircrack-ng for WPA cracking as my best resource. I am now working on these. I launched one at home last night with a 10 meg password file and got nothing.
Has anyone else had this problem with Cowpatty? It rejects a lot of WPA handshakes that Aircrack-ng accepts. I understand Aircrack-ng is faster but Cowpatty has some variations--one of which is the rainbow tables-- that seem to offer a broader and more elegant solution to cracking a WPA connection.
-
9:22
»
remote-exploit & backtrack
Hey,
i bought a Asus WL-167g wlan stick today ! I bought just for the use in Backtrack and i bought it because its in the list of compatible USB sticks for BackTrack. When i start BackTrack3 and go to the "Network Monitor" it doesn't show a network, instead it says "Radio of your wireless card seems to be turned off using an external switch on your computer.
You need turn it on to be able to use wireless networks." i have now other lan device plugged to my pc ! What can i do ??
donfellone
PS: I use D-Lan for surfing, but i disconnect the cable before starting the live cd !
-
6:59
»
remote-exploit & backtrack
I found this USB network adapter sku.31911 at dealexreme's site (Sorry but im not allowed to post links yet) and searched and searched but didn't find any useful information. Is this supported under linux or is there a better alternative for that money? I can't find out what chipset it uses so if anyone here has one or knows if it is supported i will welcome an answer. :confused:
-
4:53
»
remote-exploit & backtrack
I download wpa table 33gig,and how I can use it?
-
4:36
»
remote-exploit & backtrack
Hi
just a quick post to see if anybody knows anything about captive portals. Basically a good friend of mind has a partnership share in a public house which offers accommodation and good food to guests. He has approached me because he wants to offer wifi to his guests. His idea is to offer "Almost Free" wifi. When i say almost free i mean the guest will purchase a drink such as a coffee or beer or meal and they will be given free access to the pub's wifi. Now he has asked me to set this up but to be honest i dont really know what i'm doing as was wondering if anybody can point me towards a simple but secure solution.
He has approached a company called The Cloud.........(xxx.thecloud.net/About-us)
......who has offered to set up a captive portal on his behalf and manage it but he has asked me to see if i can come up with a solution thats possibly cheaper for him.
Therefore, i just need some guidance as to how to go about setting this up.
Is it a case of find some captive portal software, download it, install it onto a pc etc etc and off we go ? If so will it work with say a wireless netgear router ? If not will a specific router such as a Linksys WRT54G with OpenWRT firmware do the job ?
Or is it a bit more complicated than that. I have done some searching but its all a bit confusing to be honest. Does anybody knbow of a good simple secure solution. I did find something called PFSence and IPCop (all advice is greatly appreciated)
Apologies if i've posted in the wrong forum or if i'm being a bit of a plonka rodney.
-
-
21:52
»
remote-exploit & backtrack
the above error came up when i tried to crack my syskey in winxp sp3
these are the commands i issued
root@bt:~# mount /dev/sda1 /mnt/sda1
root@bt:~# bkhive /mnt/sda1/WINDOWS/system32/config/system key
root@bt:~# samdump2 /mnt/sda1/WINDOWS/system32/config/SAM key
Error reading ControlSet: _RegOpenKey
this error comes up..... can any one tell me wats wrong??????
-
20:10
»
remote-exploit & backtrack
Hello world, i've been trying auto fast-track autopwn and recently started getting a error message i looked around online but couldn't find anything about it. when i run autopwn it gets passed the nmap scan and:
Nmap done: 1 IP address (1 host up) scanned in 33.623 seconds
msf > db_autopwn -p -t -e
[-] Error while running command db_autopwn: no such file to load -- rjb
I can't find what this rjb is or anyone who's had the same problem
- any help would be welcome, thanks
-
17:49
»
remote-exploit & backtrack
I have seen a 16db yagi antenne on ebay and am contemplating buying it.
I am also contemplating a 6 metre pigtail to connect it to my awus036h.
My question is would I lose much signal strength with the 6 metre pigtail?
Also would I see much of an increase with this antenna over my 5db omni
Antenna?
-
14:34
»
remote-exploit & backtrack
Hello All,
I have an HP machine with a Dual Boot of Vista and BT4PF. I want to upgrade to BT4F, though. I'll probably install it in a virtual machine or on a USB drive...
Anyway, I am worried about ruining my windows partition. I have read posts online about formatting from the Windows OS and then changing the boot.ini file. WELL... That is all fine and dandy, and I will do that but I wanted to check with you all here to see if there are any suggestions or words of wisdom. Maybe I should go about this differently?
Also, random question: If I were to install the BT4F version on VirtualBox, could I save files and settings (persistent?) and still shutdown... without using this "snapshot" technique?
Thanks fellas
-
13:54
»
remote-exploit & backtrack
Hey,
I was just wondering if anyone had an easy way of pulling from the Username column and putting it into 1 .txt file and then pulling from the password column and putting it into another .txt file? The following is the website I would like to do this from. Thanks in advance for looking.
http://www.phenoelit-us.org/dpl/dpl.htmll/dpl.html
-
11:39
»
remote-exploit & backtrack
I am trying to crack my own WEP enabled AP, it's only plugged in to the wall and has no clients connected and no internet connection.
I seem to be having some problems with cracking of wep with no clients as I keep getting deauthentication packets when trying the fragmentation attack. I am using an ALFA AWUS0368H with the patched r8187 driver.
Start Airmon in monitor mode
Lock on to target AP
Send fake auth
Quote:
11:11:52 Sending Authentication Request (Open System) [ACK]
11:11:52 Authentication successful
11:11:52 Sending Association Request [ACK]
11:11:52 Association successful :-) (AID: 1)
|
Next I try the fragmentation attack
Quote:
Saving chosen packet in replay_src-0127-112629.cap
11:26:34 Data packet found!
11:26:34 Sending fragmented packet
11:26:35 No answer, repeating...
11:26:35 Trying a LLC NULL packet
11:26:35 Sending fragmented packet
11:26:37 No answer, repeating...
|
Then I try another packet:
Quote:
Saving chosen packet in replay_src-0127-112923.cap
11:29:33 Data packet found!
11:29:33 Sending fragmented packet
11:29:35 No answer, repeating...
11:29:35 Trying a LLC NULL packet
11:29:35 Sending fragmented packet
11:29:35 Got a deauthentication packet!
|
Then I try and reauth
Quote:
11:33:19 Sending Authentication Request (Open System) [ACK]
11:33:19 Authentication successful
11:33:19 Sending Association Request [ACK]
11:33:19 Got a deauthentication packet! (Waiting 3 seconds)
11:33:22 Sending Authentication Request (Open System)
11:33:24 Sending Authentication Request (Open System)
11:33:26 Sending Authentication Request (Open System) [ACK]
11:33:26 Authentication successful
11:33:26 Sending Association Request [ACK]
11:33:26 Got a deauthentication packet! (Waiting 5 seconds)
11:33:31 Sending Authentication Request (Open System)
11:33:33 Sending Authentication Request (Open System)
11:33:35 Sending Authentication Request (Open System) [ACK]
11:33:35 Authentication successful
11:33:35 Sending Association Request [ACK]
11:33:35 Association successful :-) (AID: 1)
|
-
11:31
»
remote-exploit & backtrack
Salve a tutti come potete immaginare sono nuovo nel mondo di backtrack, e come newbe ho dei seri problemi per connettermi a internet tramite ethernet con un modem adsl alice. Prima di postare ho spulciato un po il forum trovando e provando i vari comandi :
- ifconfig eth0 up
- dhclient eth0 (ho provato anche mettendo sudo davanti il comando )
Poi ho provato:
- /etc/init.d/network start
e anche:
- dhcpc eth0 , ma niente da fare.. naturalmente ho provato anche da
service-->network-->start network , ma come sempre niente da fare..
Dimenticavo backtrack 4 lo sto facendo girare da hd . Avete qualche consiglio da darmi grazie mille anticipatamente.
-
11:08
»
remote-exploit & backtrack
I have been trying to get the arpspoof working, instead of ettercap, on my eeepc 4g which I have installed Backtrack 3 on. I understand that the line for the interface in the arp.c file needs to be changed to ath0 instead of eth0. When using gcc to compile the arp.c to arp I receive several errors and a few warnings. I would like to correct these errors myself. As I have not done a lot of programming in C some of these errors are not clear to me how to resolve.
I would appreciate any help with this, especially if you can point me in the right direction to learn how to fix the errors.
I downloaded the current dsniff package on another machine and put the arp.c source file in the /sbin/ directory.
When I run the command;
>gcc arp.c arp
I receive the following errors & warnings;
arp.c:11:20: error: config.h: No such file or directory
arp.c: In function 'arp_cache_lookup':
arp.c:98: warning: incompatible implicit declaration of built-in function 'memset'
arp.c:100: warning: incompatible implicit declaration of built-in function 'strncpy'
arp.c:106:25: warning: null characters(s) ignored
arp.c:106:287: warning: no newline at end of file
arp.c:37:1: error: unterminated #else
arp.c:106: error: 'AF_I' undeclared (first use in this function)
arp.c:106: error: (Each undeclared identifier is reported only once
arp.c:106: error: for each function it appears in.)
arp.c:106: error: expected ')' at end of input
arp.c:106: error: too few arguments to function 'socket'
arp.c:106: error: expected declaration or statement at end of input
I was wondering, also, if there was a difference between the source files I downloaded from dsniff and those used for the Backtrack 3 final usb? If so where would I be able to find just the arp.c file so I can change the appropriate line and recompile.
I did download the new arpspoof.c file that supposedly will allow any interface to work. Upon compiling I received even more compiling errors and decided to just try and get arp.c with the corrected line working first.
Thank you in advance for any assistance given.
-
2:15
»
remote-exploit & backtrack
Ciao ragazzi,
sono nuovo del forum, avrei bisogno del vostro aiuto: quale programma posso utilizzare con Win7 per testare la sicurezza della mia password in Libero.it?
Grazie a tutti..
Gundin
-
0:36
»
remote-exploit & backtrack
Is anyone else getting this MD5 sum
Code:
abacb136d3e020bc992558b11a2481bf
instead of the one published on the download page?
Code:
af139d2a085978618dc53cabc67b9269
bt4-final.iso
1,569,816,576 bytes
-
-
18:06
»
remote-exploit & backtrack
Is there a way to hide the progress of one meterpreter script, such as an infinitely looping one that closes "taskmgr.exe" every 100ms :D
thanks
-
16:47
»
remote-exploit & backtrack
i'm using Compaq Presario CQ40-401AU laptop. The only thing i know about my wireless card is the brand... broadcom... backtrach 4 cant detect the wireless card after i try this command > /etc/init.d/wicd start ... can anyone help? anyway, are broadcom build in wireless card that comes with the laptop that i mention above can do injection?
really appreciates if some1 can help me slve this matter...
-
13:19
»
remote-exploit & backtrack
Hey guys,
I'm pretty lost guys.I need your help :confused:. Right now i have to USBs,one 8 GB the other is 2 GB.I downloaded BT4 final and booted it by unetbootin in the 8 GB flash desk.Then i get this screen with a list (i'm not allowed to post a screen shot):
1- start backtrack Framebuffer (1024x768)
2- start backtrack framebuffer (800x600)
3- ..............
4- .................
5- start persistent live CD
6- ..........
7- .........
8- memory test
9- boot the first hard disk
I didn't know what to choose.so i waited for it to load by itself and it did.Then i got this screen where i have to put this command : startx
After that i didn't know what to do?Partitions and stuff...sorry guys,but any ideas?
Note: about the USBs which one should format to FAT32 (where i put the bt4 ISO in it) and which one should i format to ex2 (where i can save my changes)?And is there anyway to use only the 8GB USB for booting and saving changes?
thanks and sorry for troubling you with me.
regards,
-
11:27
»
remote-exploit & backtrack
Hello,
im new here and i'm from Germany :)
I have a Fritz! Wlan USB Stick N, but it doesn't work with BackTrack ! Can someone tell me a good USB Stick ?? Please also tell me about the drivers and things like that, whick i'll need to use the usb stick with BackTrack !
Hope you can help me !
donfellone
-
10:23
»
remote-exploit & backtrack
Salve sono nuovo, volevo chiedervi se c'erano novità in merito al chipset 3070, mi hanno detto che non supporta il monitor-mode, l'injections e non funziona con aircrack-ng ...Grazie per le eventuali risposte :-)
-
3:45
»
remote-exploit & backtrack
Hello,
how can i make the Persistent.rb script encode its vbs payload so it does not get detected by AV ?
please advice.
regards :)
-
1:56
»
remote-exploit & backtrack
Hey people,
Nice to be here, hope to stay a long time and be a help to others
-
-
20:13
»
remote-exploit & backtrack
Hi Guys!
I'm new to this forum and like any other webmaster forum I've joined, I hope to get more knowledge here.
-
11:16
»
remote-exploit & backtrack
anyone know how to get the wifi led working with BT4 Final? everything else works great.
card is Atheros AR5001 if that matters, though i suspect it does not.
thanks for the help
-
9:23
»
remote-exploit & backtrack
Will TP-Link TL-WN350GD work on BT4 with aireplay and airodump?
Thanks for answering. :)
-
2:13
»
remote-exploit & backtrack
salve a tutti, ho installato bt4 final su usb con persistent mode, tutto ok, il problema che vorrei capire come risolvere è il fatto che prima di dare startx mi logga automaticamente come root e quindi esce "root@bt:" ho provato ad impostare lo user ma non mi chiede il login come la prefinal sempre su usb, qualcuno ha idea di come posso fare x mettere almeno il mio nick al posto di root@bt? Grazie
-
-
20:52
»
remote-exploit & backtrack
I need help ... I have a nv58 series gateway with built in 5100 agn . I cant get it to work on bt4 and i have looked up other forums that say to patch drivers but none say how to do it please help thanks. Im a noob with linux and back track 4 :D
-
20:34
»
remote-exploit & backtrack
i did a couple searches around here and through google, but couldn't find if backtrack 3 needs wine installed. I'm not planning to use it and as i've posted before i'm low on hard-drive space. Can i uninstall it, and how would i go about doing it?
- thanks for your time
-
16:01
»
remote-exploit & backtrack
Hi everyone,
I've trying to increase my knowledge of network penetration to keep my network secure and so far these are the things I have done:
WEP hack, WPA hack then crack with GPU acceleration, ARP poisoning to sniff out passwords, Passive URL sniffing
However I'm interested to see what I can do further with my network, e.g:
1. Brute force my router password
2. Gain access to files on my computer network: password protected shared file (I've got WinXP, Win7, OSX, Ubuntu server connected)? Would this involve a way of obtaining an LM hash and then bruteforcing it? Something like ophcrack
3. Backdoors to gain access to all my files (not just the password protected shared ones)
4. Hack my homegroup.
I would really appreciate some keywords that I can use to search these forums and google.
-
10:58
»
remote-exploit & backtrack
hi all
i have just downloaded backtrack 4 from virtualbox site and run it on virtualbox,but it doesnt see my usb wireless card(my card supported!!!) of =course i choosed "bridge" option and choosed my tp link321but when in backtrack there is nothing
MY BACKTRACK IS NOT ISO FILE ,ITS VDI FILE ITS SPECIAL READY FOR VIRTUALBOX
PLEASE HELP
-
9:19
»
remote-exploit & backtrack
is there any software that can sniff SSL3,TLS like ettercap from wLAN...or ettercap is the one and only
-
9:18
»
remote-exploit & backtrack
I read the man pages of ettercap and it said the target can be in form of
MAC/IP/PORTS
Ok...
to all my dear darklords ...I have 2 basic questions..which , I request some help to :
<> I specify mac addresses /MAC/ /MAC2/ it says Invalid IP range. So how do you specify them or that's not allowed.
<>More imp one : I would like to SNIFF NOT ALL BUT JUST PACKETS OF PORTS # 80 AND 443 FOR SPECIFIC IP RANGE.
I thought his would convey the information :
ettercap <options> /IP:port1,port2/ /IP2:Port1,port2/
but it does not like that format too.
Can someone please lemme know if that is poss and how .
MANY THANKS
S
-
9:14
»
remote-exploit & backtrack
salve a tutti qualcuno sa dirmi dove posso trovare una guida per aircrack-ng o qualsiasi altro tool per reti wifi con protezione wpa
-
8:43
»
remote-exploit & backtrack
Every single time I reboot or shutdown my backtrack 4 final VM, if I dont run fixvesa prior to startx, I never get to the desktop. I only get an X for my mouse pointer and a pixelated brown screen. Am I doing something wrong? How can I fix this?
Thanks for your help.
-C
-
7:35
»
remote-exploit & backtrack
Hi,
I just bought a blueproton realtek rtl8187 usb wifi adapter, but I cannot seem to get it to work in Backtrack 4 running in vmware player. I know that you have to run the command "/etc/init.d/networking start" but there are errors such as "no DHCPOFFERS received" and "No working leases in persistent database - sleeping." These also come up when I try "ifconfig wlan0 up" and "dhclient wlan0." When I run the command "airmon-ng," my wireless adapter comes up there recognized as wlan0. It says the chipset is "RTL8187" and the driver is "rtl8187 - [phy1]." When I run "airodump-ng wlan0" it says "device or resource busy." What should I do to get this to work? And, this is my first post on these forums. Thanks
-
6:31
»
remote-exploit & backtrack
Hi! My name is Dean. I'm 29 years old. I came across this forum while doing some research and decided to join. I hope to share and gain insight with/from you all. I'm trying to be the best me I can be, so I'm trying to stay informed, open-minded, and optimistic.
Thanks, Dean
-
6:31
»
remote-exploit & backtrack
Hi! My name is Dean. I'm 29 years old. I came across this forum while doing some research and decided to join. I hope to share and gain insight with/from you all. I'm trying to be the best me I can be, so I'm trying to stay informed, open-minded, and optimistic.
Thanks, Dean
-
3:49
»
remote-exploit & backtrack
can anyone help me i try all modes with live cd backtrack3 and after the screen stay black with sign X.
Can help me my friends i buoght this cd with high speed rtl8187l usb wireless adapter from ipmart.
-
1:28
»
remote-exploit & backtrack
Hi, I've been used backTrack 4.0 final as a live cd in my virtual machine (vmware), when it's getting start up when I want to starta program or even move the mouse from one location to another it's very slow, I've been installed it on my Laptop as primary OS (hard-drive install) and I have no problem, but it's strictly important for me to run it on the vmware ( as a vm ) .
could anyone point me to some idea for solving this problem !?
thnx .
-
0:46
»
remote-exploit & backtrack
i have laptop Toshiba Satellite
and my wireless adapter - Realtek RTL8187B 802.11 b/g
when click on wireless assistant
it show
"No usable wireless devices found"
in console i type iwconfig
no wireless extension
what should i do ?
-
-
23:24
»
remote-exploit & backtrack
Hello. I am relatively new to backtrack 4, although I have successfully been able to crack my WEP-secured wireless network by following the tutorials posted here at the forums. I do have a little expierience with linux however (ubuntu), so I am able to follow most of what I read here. My question is, where, if at all, can I find a listing of the tools compiled in backtrack 4 that includes a description of the funtion, uses, and any additional information about each? Maybe something like how the wireless card compatability chart is put together (which is a great source of information by the way). And if such a listing does not yet exist can one be put together?
-
14:17
»
remote-exploit & backtrack
I have laptop with Broadcom 802.11 network adapter. BT didn't recognize it so with 'lspci -vnn | grep 14e4' I found out that is BCM4312 and 14e4:4315. I have to install B43 drivers for that chipset, but when I write 1st line 'git clone...' I get message to install git with 'apt-git install git-core' command. And with that command I get err messages that some adresses can't be resolved.
As I'm totaly new to linux I don't know even what I'm doing. I guess I should download b43 drivers, but I don't understand how can I download them when BT4 don't recognize my network card.
Can someone explain me something about this, or maybe tell me what I'm doing wrong?
-
14:16
»
remote-exploit & backtrack
Hello. At first, I apologize for my feeble english :(.
I very like default margin, background console on BackTrack 4.
I have Debian as my primary desktop system and I have to know what apps is used to make console like screen above in BackTrack (ops, links 15+ posts. Look at console after booting BT4) ?
It's not splashy, fbsplash, gensplash, fbcondecor but ?
-
13:50
»
remote-exploit & backtrack
Hello, im having troubles with my wlan device. I am using a Dell Wireless 1397 802.11b/g Half Mini Card.
Ok so my drivers are not linux compatible, so i read that i have to install ndiswrapper. Ok so i downloaded the drivers from the dell site,extracted them and transferred the files to my laptop.
Then i used ndiswrapper to install them with a tutorial on youtube on how to do it. Still it doesn't manage to detect my device :(.
ndiswrapper -l shows that my device driver(14e4:4315) is present.
How can i make it detect my wlan device?
btw im a total noob on this. I've never used linux :/
-
13:23
»
remote-exploit & backtrack
hi guys, how can i install previously downloaded deb packages on Backtrack...
i`ve downloaded that package in windows, and when i switch over to BT i don`t know how to install it (i`m a noob i admit it :D)
-
12:58
»
remote-exploit & backtrack
hello, i am here newbie, please help me. how to make the operation of the Internet with VMware BT4?
my internet connected with dhcp.. but i dont know how configuriation vmware and bt4...
sorry my bad english..
-
6:47
»
remote-exploit & backtrack
Im using Compaq CQ40-517tu laptop ive finish downloading BT 4 my problem is that the wifi adapter is not detected how am i able to fix this?