«
Expand/Collapse
77 items tagged "problem"
Related tags:
Wireless [+],
Hardware [+],
working [+],
Support [+],
windows machines [+],
quot [+],
pre [+],
mozilla thunderbird [+],
gerix [+],
error [+],
card [+],
bt4 [+],
and [+],
adobe reader [+],
adobe flash player [+],
Software [+],
General [+],
Fixes [+],
Final [+],
Bugs [+],
wpa [+],
wireless connections [+],
vmware [+],
usb wireless [+],
usa [+],
robot [+],
repair [+],
peripherals [+],
network [+],
mysql socket [+],
mysql [+],
mdvsa [+],
martin barbella [+],
mandriva linux [+],
mac [+],
logarithm [+],
interface [+],
integer overflow [+],
integer [+],
init script [+],
http header [+],
home [+],
handshake problem [+],
florian he [+],
firefox [+],
discrete logarithm problem [+],
digital signature schemes [+],
cryptography [+],
computer [+],
chaos communication congress [+],
barbella [+],
alfa [+],
Related [+],
NON [+],
Issues [+],
BackTrack [+],
xxx [+],
wirelles [+],
wireless network adapter [+],
wireless adapter [+],
wire [+],
william yerazunis [+],
wifi [+],
wheeled robot [+],
wep keys [+],
wep key [+],
wep [+],
welcome thanks [+],
website [+],
weather simulations [+],
weather [+],
waterproof [+],
warranty period [+],
warns [+],
wall unit [+],
wall transformer [+],
wall [+],
vlc [+],
virtual machine [+],
virtual [+],
vending machine [+],
unsupport [+],
university of illinois at urbana champaign [+],
uncomfortable place [+],
trap [+],
traffik [+],
track 3 [+],
track [+],
tp link [+],
tom brosch [+],
toggle switch [+],
today [+],
thomas [+],
thice [+],
thanks in advance [+],
text classifier [+],
texas instrument [+],
test option [+],
tablet [+],
t break [+],
system administrator [+],
switch [+],
suggestion [+],
strange problem [+],
stereotype [+],
stealth scan [+],
station [+],
sqlmap [+],
sql [+],
spammer [+],
space debris [+],
space [+],
source [+],
sound card [+],
sound [+],
sony vaio vgn [+],
something simple [+],
solid state drive [+],
solar ovens [+],
solar oven [+],
solar [+],
social engineering [+],
server x [+],
server error [+],
scott [+],
scada software [+],
scada [+],
sata [+],
runtime [+],
robots [+],
robot hand [+],
ribbon cable [+],
replay attack [+],
red dot [+],
read [+],
range error [+],
range [+],
raccoon [+],
quote [+],
proxim orinoco [+],
proxim [+],
printer [+],
port [+],
pool size [+],
png [+],
plastic pellets [+],
plastic [+],
php files [+],
pesky [+],
permanent damage [+],
paintball gun [+],
packet [+],
packers [+],
oven [+],
orinoco gold [+],
orinoco [+],
omnidirectional [+],
official web [+],
nothing [+],
news [+],
network wirelessly [+],
network admin [+],
netbook [+],
ned [+],
my handshake [+],
multiple times [+],
mouse problem [+],
mouse [+],
mode [+],
minifridge [+],
mike [+],
microchip [+],
message [+],
member [+],
mecanum wheels [+],
mecanum [+],
marvell yukon 88e8036 [+],
marek mckel [+],
maik morgenstern [+],
machin [+],
mac problem [+],
login [+],
location base [+],
living room [+],
listining [+],
links [+],
link [+],
laptops [+],
laptop [+],
lan [+],
knopix [+],
kismet [+],
keyboard [+],
kernel [+],
karma [+],
iso [+],
internet [+],
index [+],
img [+],
imageshack [+],
illinois [+],
ian lesnet [+],
ian [+],
html [+],
hp pavillion [+],
hp laserjet [+],
hp laser printer [+],
hp 510 laptop [+],
host machine [+],
holy grail [+],
hidden [+],
hey guys [+],
hell [+],
hard drive [+],
handshake [+],
hand [+],
hackaday [+],
hack [+],
habs [+],
gui mode [+],
gui [+],
grub problem [+],
grub [+],
graphical mode [+],
gnome [+],
forum [+],
flex connector [+],
filter text [+],
filter [+],
filament [+],
fellas [+],
fake website [+],
editorial piece [+],
ear protectors [+],
ear buds [+],
ear bud [+],
ear [+],
dwl g [+],
dwa [+],
dvd [+],
dv4 [+],
dual boot windows [+],
drive [+],
dont [+],
desktop 3d [+],
dell mini [+],
debris environment [+],
debris [+],
deb [+],
dead mouse [+],
dave [+],
database connection [+],
database [+],
d. l. slotnick [+],
d link [+],
d i [+],
curser [+],
crm [+],
cooking [+],
controller. my [+],
connected computer [+],
configuration directory [+],
computer keyboard [+],
compaq presario [+],
compaq [+],
cnc [+],
clich [+],
classic [+],
chipset [+],
chaos communication camp [+],
champaign [+],
cable repair [+],
bssid [+],
brosch [+],
boot [+],
black hat [+],
ben [+],
begining [+],
beer [+],
baking [+],
backconnect [+],
authentication request [+],
atmosphere circulation [+],
atheros [+],
asus [+],
arp [+],
apache [+],
andrew [+],
amount [+],
alum [+],
alcohol [+],
alain [+],
acx100 [+],
accidental leakage [+],
Discussion [+],
BT3final [+],
Newbie [+],
Area [+],
hacks [+],
security problem [+],
security [+],
even internet [+],
acros [+]
-
-
5:00
»
Hack a Day
The holy grail of desktop 3D printers – aside from manufacturing full color objects in any shape imaginable – is turning tiny plastic pellets into a plastic filament. Many projects have attempted this with moderate levels of success but turning pellets into filament still an open problem. MakiBot hopes to solve this problem by manufacturing plastic filament [...]
-
-
14:00
»
Hack a Day
A common problem at parties and get-togethers – although we don’t remember this happening – is regulating the amount of alcohol people consume. [Mike] came up with an interesting solution to make sure people don’t drink more than their fill by building a vending machine out of a minifridge that allows you to keep track of [...]
-
-
21:37
»
SecDocs
Authors:
Florian Heß Tags:
cryptography Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The talk will give an introduction to elliptic curve cryptography and explain some recent developments regarding attacks on the discrete logarithm problem on elliptic curves. In practice, elliptic curve cryptography can for example be employed in the TLS/SSL and IPsec protocols. It is well suited for use in constraint devices such as smart cards. Two main tasks of cryptography are encryption and digital signatures. In order to solve these tasks one employs in general suitable one way functions as fundamental building blocks in public key encryption and digital signature schemes. These are functions for which images are very easy but preimages very hard to compute. The security of encryption and digital signatures is then directly linked to the hardness of computing preimages under such one way functions. Strictly speaking, the existence of one way functions is not known. There are some candidates however, and under current knowledge particularly efficient candidates can be obtained from exponentiation in elliptic curves over finite fields. The reverse operation is called discrete logarithm problem. The investigation of the hardness of the discrete logarithm problem is mathematically challenging. The talk will explain the relevant mathematical objects and discuss these and further issues in simple terms. Towards the end of the talk I intend to report on some advanced attacks on the discrete logarithm problem.
-
15:29
»
SecDocs
Authors:
Florian Heß Tags:
cryptography Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The talk will give an introduction to elliptic curve cryptography and explain some recent developments regarding attacks on the discrete logarithm problem on elliptic curves. In practice, elliptic curve cryptography can for example be employed in the TLS/SSL and IPsec protocols. It is well suited for use in constraint devices such as smart cards. Two main tasks of cryptography are encryption and digital signatures. In order to solve these tasks one employs in general suitable one way functions as fundamental building blocks in public key encryption and digital signature schemes. These are functions for which images are very easy but preimages very hard to compute. The security of encryption and digital signatures is then directly linked to the hardness of computing preimages under such one way functions. Strictly speaking, the existence of one way functions is not known. There are some candidates however, and under current knowledge particularly efficient candidates can be obtained from exponentiation in elliptic curves over finite fields. The reverse operation is called discrete logarithm problem. The investigation of the hardness of the discrete logarithm problem is mathematically challenging. The talk will explain the relevant mathematical objects and discuss these and further issues in simple terms. Towards the end of the talk I intend to report on some advanced attacks on the discrete logarithm problem.
-
-
14:00
»
Hack a Day
In 1975, [D. L. Slotnick], CS professor at University of Illinois at Urbana-Champaign faced a problem: meteorologists were collecting a lot more data than current weather simulations could handle. [Slotnick]‘s solution was to build a faster computer to run these atmosphere circulation simulations. The only problem was the computer needed to be built quickly and cheaply, [...]
-
-
15:07
»
Hack a Day
The problem with most solar ovens is that they’re flimsy builds that will stand up to only a handful of uses. But this one stands apart from that stereotype. It’s big, sturdy, and used a lot of math to efficiently gather the sun’s energy when cooking food. This is the third version of the build [...]
-
-
12:01
»
Hack a Day
[Ben] has a raccoon problem. It seems that it’s not uncommon for him to come face-to-face with a pesky raccoon in the middle of the night, in his living room. We think most people would solve the problem by preventing the raccoon from entering the home. But [Ben] just seems hell-bent on catching him. Most [...]
-
-
21:41
»
SecDocs
Authors:
Marek Möckel Tags:
space Event:
Chaos Communication Camp 2011 Abstract: This talk is about different sources of space debris and how they are a problem for current and future space travel. I'll introduce some of the computational models that are used to simulate space debris objects and some ideas to prevent them. The environment around Earth is littered with different types of debris - some of natural origin, some human-made. They already pose a risk to spacecraft which will increase if nothing is done about the problem. I will introduce the different known sources of space debris. The objects' sizes range from several meters to only micrometers so it is impossible to detect most objects. Therefore the space debris environment has to be simulated to estimate current and future collision risks for spacecraft. Since we're talking millions of objects that have to be treated individually, a lot of computational power is required. Preventing space debris is a matter of global concern. Many proposals have been issued about how to achieve this; but especially the active removal of existing space debris objects is an open problem.
-
-
10:41
»
Hack a Day
Skills are all that’s needed to solve a problem. Take this four-wheeled robot as an example. [Michal Zalewski] wanted it to be omnidirectional but wasn’t very satisfied with the concept of mecanum wheels and the like. So he designed a chassis with wheels at each corner that can pivot as one to change orientation. The [...]
-
-
11:01
»
Hack a Day
[Dave] has an ASUS tablet PC with a little problem. The device is charged via the docking connector’s USB cable when plugged into a special wall transformer. The problem is that the wall unit tends to overheat, and is shut down by a thermister inside to avoid permanent damage. The word on the Internet is to [...]
-
-
14:00
»
Hack a Day
The worst computer keyboard, ever [Gerardus] found an old BBC Master Compact computer for $15. The only problem is the computer didn’t have a keyboard. It’s not a problem if you can make a keyboard out of an old breadboard. It’s not a Model M, but it works. Emergency ribbon cable repair [Thomas] works in [...]
-
-
8:01
»
Hack a Day
[Thice] had himself a problem. As luck would have it his HP laser printer died shortly after the warranty period expired, and HP was ready to charge him €350 to repair it. Since that would pretty much buy [Thice] a new one, he decided to try fixing the problem himself. He scoured the Internet for [...]
-
-
13:21
»
SecDocs
Authors:
William Yerazunis Tags:
security Event:
Black Hat USA 2010 Abstract: In this whitepaper we consider the problem of outbound-filtering of emails to prevent accidental leakage of confidential information, We examine how to do this with the GPLed open-source spam filter CRM114 and test the accuracy of this filter against a 10,000+ document corpus of hand-classified emails (both confidential and non-confidential) in Japanese. We look into what moving parts are involved in these filters, and how they can be set up. The results show that a hybrid of multiple CRM114 filters outperforms a human-crafted regular-expression filter by nearly 100x in recall, by detecting > 99.9% of confidential documents, and with a simultaneous false alarm rate of less than 5.3%. As the programmers creating the machine-learning programs don't know how to read or write Japanese, this problem is an almost ideal case of the Searle “Chinese Room” problem.
-
-
4:00
»
Hack a Day
Hackaday alum and owner of Dangerous Prototypes [Ian Lesnet] recently wrote an editorial piece calling out Microchip on some of their less than friendly attitudes towards open source. [Ian] and his company use PIC microcontrollers extensively in their projects, and they have quite a high opinion of their products overall. The gripe that he has [...]
-
-
18:50
»
Packet Storm Security Advisories
ACROS Security Problem Report #2011-08-18-2 - A binary planting vulnerability in Mozilla Thunderbird allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
18:50
»
Packet Storm Security Recent Files
ACROS Security Problem Report #2011-08-18-2 - A binary planting vulnerability in Mozilla Thunderbird allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
18:50
»
Packet Storm Security Misc. Files
ACROS Security Problem Report #2011-08-18-2 - A binary planting vulnerability in Mozilla Thunderbird allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
18:48
»
Packet Storm Security Advisories
ACROS Security Problem Report #2011-08-18-1 - A binary planting vulnerability in Mozilla Firefox allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
18:48
»
Packet Storm Security Recent Files
ACROS Security Problem Report #2011-08-18-1 - A binary planting vulnerability in Mozilla Firefox allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
18:48
»
Packet Storm Security Misc. Files
ACROS Security Problem Report #2011-08-18-1 - A binary planting vulnerability in Mozilla Firefox allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
-
7:02
»
Hack a Day
[Scott] was trying to fix a laptop, and we all know how that sometimes ends. Having a spare 128GB solid state drive and a Dell Mini 10 netbook to shove it in, there was only one problem, the drive did not have SATA connectors. That problem was taken care of like a pro with this [...]
-
-
8:00
»
Hack a Day
[Ned] had a mouse problem in a very uncomfortable place. No, not like the back of a Volkswagen, in his ceiling. He wanted to put a mouse trap up there to take care of the critter, but knowing how nasty a tripped trap can be after a few days, he was hesitant. He recalled a [...]
-
-
11:22
»
Packet Storm Security Advisories
ACROS Security Problem Report #2011-02-11-2 - A binary planting vulnerability in Adobe Flash Player allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
11:22
»
Packet Storm Security Recent Files
ACROS Security Problem Report #2011-02-11-2 - A binary planting vulnerability in Adobe Flash Player allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
11:22
»
Packet Storm Security Misc. Files
ACROS Security Problem Report #2011-02-11-2 - A binary planting vulnerability in Adobe Flash Player allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
4:19
»
Packet Storm Security Advisories
ACROS Security Problem Report #2011-02-11-1 - A binary planting vulnerability in Adobe Reader allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
4:19
»
Packet Storm Security Recent Files
ACROS Security Problem Report #2011-02-11-1 - A binary planting vulnerability in Adobe Reader allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
4:19
»
Packet Storm Security Misc. Files
ACROS Security Problem Report #2011-02-11-1 - A binary planting vulnerability in Adobe Reader allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
-
-
10:00
»
Hack a Day
Get your Terminator clichés ready, this robot hand reeks of Skynet. It is designed to function like the human hand, but the main goal is one of robustness. A lot of effort went into making sure this won’t break in the field. Instead of rigid gears, a system of tendons actuates each digit. The pulleys [...]
-
-
10:56
»
remote-exploit & backtrack
I am trying to install BT4 and i get this message. Just take a look at the pic. How can i solve? thanks in advance.
-
-
12:34
»
Hack a Day
[Patman2700] has a nice scope for his paintball gun that uses a red dot instead of cross-hairs. The problem is that he kept forgetting to turn it off which ended up running the batteries down frequently. His solution to the problem was to get rid of the toggle switch used to turn it on and replace [...]
-
-
9:55
»
remote-exploit & backtrack
hi,i have simple question.plz if anyone do something like this tell me.
i want to use one virtual machin on BT4(ubuntu8.10).i want to instal win xp on it.i try VirtualBOX ose,not working .i try Vmware ,not working.i Try Qemu.when i click on Lunch Button Nothing Happen.
i Really tired of contact by Error.every app i said,have problem with Kernel.
i hope some one can tell me how can i solve my problem.:confused:
-
-
0:12
»
remote-exploit & backtrack
:confused:hi,im sorry if made new topics.and i know u saw a 100 time something like this.but im really confused and i need ur help guys.
i really dont know which one of this 2 card better for hack wirelles.compatibility with bt4 or another linux and can inject without problem and can monitor without problem and important than other which one dont need modify driver for work on bt4.
ALFA USB AWUS050NH 1000MW
or
ALFA USB AWUS036H 500MW
:confused:
-
-
12:23
»
remote-exploit & backtrack
Hi all, quick question. I configured kismet to work with my Alfa AWUS036H USB wireless card with these configurations...
Code:
source=rt8180,wlan0,ALFA
Kismet starts up fine, but it doesn't detect any APs. Does anyone know what might be the problem? I've got it to work when I ran Linux as a host machine. But now it's running in a VM. But I hardly think that could be the problem because I let the VM take control of the card. Any suggestions? Thanx in advance.
-
-
16:02
»
remote-exploit & backtrack
Hello ... I am having a problem in the backtrack 3
When I search for networks for the first time I find networks but when I search for the networks again can not find any network .. And a message appears i dont know it ... Please help
-
-
10:29
»
remote-exploit & backtrack
Hey guys im trying to get wpa handshake but no matter wot commands i try i cant get one and i dont know why.
I have intel3945 wireless card and i can crack wep fine with it.
Can someone tell me what am i doing wrong or give me another command to try. I remember last year when i tried i did get a wpa handshake once
Thanks
-
-
0:01
»
Packet Storm Security Recent Files
Ubuntu Security Notice 930-3 - USN-930-1 fixed vulnerabilities in Firefox. Due to a software packaging problem, the Firefox 3.6 update could not be installed when the firefox-2 package was also installed. This update fixes the problem and updates apturl for the change. If was discovered that Firefox could be made to access freed memory. A flaw was discovered in the way plugin instances interacted. An integer overflow was discovered in Firefox. Martin Barbella discovered an integer overflow in an XSLT node sorting routine. Michal Zalewski discovered that the focus behavior of Firefox could be subverted. Ilja van Sprundel discovered that the 'Content-Disposition: attachment' HTTP header was ignored when 'Content-Type: multipart' was also present.
-
0:00
»
Packet Storm Security Advisories
Ubuntu Security Notice 930-3 - USN-930-1 fixed vulnerabilities in Firefox. Due to a software packaging problem, the Firefox 3.6 update could not be installed when the firefox-2 package was also installed. This update fixes the problem and updates apturl for the change. If was discovered that Firefox could be made to access freed memory. A flaw was discovered in the way plugin instances interacted. An integer overflow was discovered in Firefox. Martin Barbella discovered an integer overflow in an XSLT node sorting routine. Michal Zalewski discovered that the focus behavior of Firefox could be subverted. Ilja van Sprundel discovered that the 'Content-Disposition: attachment' HTTP header was ignored when 'Content-Type: multipart' was also present.
-
-
23:27
»
remote-exploit & backtrack
hi all
i have TP-link rt73 usb and D-link dwa-110 and D-link DWL-520+ and so many other adapters !
i tried to pentest my network with D-link 2640tl AP with wep encryption (my pass is 1234567890) !! the problem is none of this adapters are able to athenticate with Ap ( i installed drivers patch too)!! and the test option in aireplay-ng gives me 0% !! i read both rt73 and dwa 110 is capable of injecting and .. (even airecrack-ng's official web site advised to buy rt73 based adapter! ) can any one give me a tip !!
i used following commands:
$myAPmaC and $MyADapterMac are exported before!
Code:
aireplay-ng -1 50 -a $myAPmaC -h $MyADapterMac wlan0
thanks anyway and excuse my weak english!!
-
-
10:00
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2010-093 - A vulnerability was discovered in mysql which would permit mysql users without any kind of privileges to use the UNINSTALL PLUGIN function. A problem was discovered in the mysqld init script which under certain circumstances could cause the service to exit too quickly, giving the [ OK ] status and before the mysql server was really started and bound to the mysql socket or IP address. This caused a problem for products like Pulse2. The corrected packages solves these problems.
-
10:00
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-093 - A vulnerability was discovered in mysql which would permit mysql users without any kind of privileges to use the UNINSTALL PLUGIN function. A problem was discovered in the mysqld init script which under certain circumstances could cause the service to exit too quickly, giving the [ OK ] status and before the mysql server was really started and bound to the mysql socket or IP address. This caused a problem for products like Pulse2. The corrected packages solves these problems.
-
-
14:00
»
Hack a Day
One complaint we hear about often is ear-bud’s cables getting tangled within backpacks. [Andrew] was having this “spaghetti” wire problem, and also wanted to listen to his music with ear protection on – where ear-buds are usually uncomfortable. The latter problem is fixed by placing speakers inside of folding ear protectors, and the cable is [...]
-
-
14:34
»
remote-exploit & backtrack
On the forum this is a problem for install backtrack-ati with error of dpkg.. please resolve :(
-
2:34
»
remote-exploit & backtrack
well dunno why but when i click to scan it gives me an error u will see on the picture
[img]img188.imageshack.us/img188/2534/problemn.png[/img]
-
-
6:30
»
remote-exploit & backtrack
hi ive got an Asus K52F laptop with an Atheros AR9285 Wireless Network Adapter ive searched around and i think my wireless card is compatible with backtrack
but my problem isnt that my problem is that i can surf the web on backtrack but when i type airmon-ng no interface comes up i dont know what to do to get an interface running
when i type iwconfig it says "no wireless extensions" on both interfaces
any help thanks?
-
-
16:17
»
remote-exploit & backtrack
i have install bt4 in vmware (in my desktop pc).
i login with no problem.
when i type iwconfig say no "lo no wireless connections"
"eth0 no wireless connections". what i must now? i have connect usb wifi TPLINK 821N.
thanks
-
11:48
»
remote-exploit & backtrack
hello guys i got a problem with gerix the first time i used it
it worked perfectly but then when i booted it again every time i open gerix
then i enable the interface and when i click to search for wifi networks it stucks
any idea????????
-
4:30
»
remote-exploit & backtrack
hi gyhs i am a new member here so hallo.
i have a problem.
i install the bt4 via vmware 7.
i login with no problem.
i have internet via bt4.
but when i do the command iwconfig say no "lo no wireless connections"
"eth0 no wireless connections".
When i try/etc/init.d/networking start
it say "failed to bring up wlan0"
what i can do? i have a tp link TL-WN821n usb wifi adapter on my desktop.
thanks and i am waiting for your response .
thanks you again.
-
-
19:30
»
remote-exploit & backtrack
so i have the PCMCIA proxim orinoco gold 8470_fc , this card works out of the box in BT3 monitor , injection no problem
in BT4 i have issues after i finally get it recognized and put in monitor mode (take a little trick as well) i went to launch aireplay and after few seconds my system frooze . does this card need a patch on BT4 .?
-
-
17:21
»
remote-exploit & backtrack
ok so i have been getting this error in gerix
Error opening /root/.gerix-wifi-cracker/*.xor "packetforge-ng --help" for help. [Failure]
i replaced the 'o' with '0' in gerix.py where its says packetforge since 0 is the arp option , again i got the same error .
the error says / root/ gerix , i looked at the code and i could not find anything related to this error except the configuration directory mentioned in the begining of the code , is this could be the problem , should i point it to where gerix directory at?
-
-
5:58
»
remote-exploit & backtrack
Hello All,
I have successfully burned the DVD .iso image, booted from the disc, and run the install script.
However when i go to boot from the hard drive, i just get a black screen, with a blinking white curser.
i have tried reinstalling multiple times, but same out put occurs. Keyboard isn't detected at this point.
Does anybody have any suggestions?
Thanks
Techevo
-
-
0:23
»
remote-exploit & backtrack
I was run karma.rc script and I have two problem.
1. Karma.rc console write:
"Exploit failed, could not obtain a database connection within 5 second. The max pool size is currently 30; consider increasing it."
and
" ActiveRecord:ConnectionTimeoutError, could not obtain a database..."
2. When DHCP server run write:
"Can't create PID file /var/run/dhcpd.pid: Permission denied."
Could Anybody help me?
-
-
17:11
»
remote-exploit & backtrack
hi, i have an Hp Pavilion Dv4-2012 laptop with ati hd 4200 video card, the problem is when i load the bt4 final live cd it loads everything fine until the gui mode startx, when i try to load the gui startx i receive a message Mode not supported, and returns to console mode. what can i do to solve this problem?
-
-
11:16
»
remote-exploit & backtrack
Everytime I want to create a java based fake website with this tool, in the last phase the following error has been occured :[*] Error : you have something running on port 80 ...
i have checked it out, but there's no such a thing running on port 80 like apache . anyone knows where's the problem?
-
-
2:41
»
remote-exploit & backtrack
hi my hardware:
D-link dwl 520+ with texas instrument ACX100 chipset! i bought this cause this one is the most available and i did checked the driver capable list on aircrack-ng.org website but the drivers out there and the patch did nothing :D i mean in backtrack 4 it is not working at all (at least i can't install it) the only distru detects it automaticly is ubuntu :D and i did cracked wep (my own AP which was d-link dsl-2640) with listining to packeges (read linux newbie tut at aircrack-ng website) i'm not sure it can inject the packages cause in packet injecting test i got almost nothing :D anyway if someone knows how to work with this just let me know !!:D
-
-
13:07
»
remote-exploit & backtrack
Problem with station mac because it withdraws five with six why in one bssid
-
9:21
»
remote-exploit & backtrack
I have hp 6735s laptop. I created bootable usb memory stick and CD with bt3 on it. They are both working on hp 510 laptop, but they don't work on mine!
It says that the operating systeme is up, but it doesn't show desktop. It can't find server X, which is for graphics I think. I also tried to boot knopix from cd, and I get blank screen (it also works on other computers... porblem with graphic card again).
It seems that something is wrong with recognizing my graphic card (ati radeon hd 3200).
I tried commands: xconfig and startx, but it still doesn't help.
Can somebody help me with this?
Thanks! :)
-
-
11:20
»
remote-exploit & backtrack
I am hoping you lot can help me.
I have a slight problem, I can use WepBuster in BT4 and it will see my WLAN card and won't have a problem with hacking WEP keys. Now my problem is, BT4 won't see my WLAN card so I can't connect to the internet within BT4 if that makes sense?
There must be something simple I am doing as WepBuster can actually see and use my card.
I have a: Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
Thanks for your help
-
0:58
»
remote-exploit & backtrack
i have a problem with sqlmap
and the problem is that its too slow . specially when i m going to dump the db
any suggestion ?
i have 5mbps connection and using backtrack in vmware last version
-
-
3:02
»
remote-exploit & backtrack
i have a Compaq Presario CQ6
in Backtrack 4 when i write airmon-ng i do not get an interface
is there a way to solve this problem?
if i buy usb wireless wifi would the problem be solved?
or is it possible to download a driver off the internet?
i am using a CD to start backtrack 4
please help
-
-
9:16
»
remote-exploit & backtrack
I'm trying to check out some pages to spoof on a LAN and have one little problem:
I've checked in /var/www/ and cannot find the index.html file. LOL...big problem.
Okay, so I have three folders in this location: base, squid-reports, and unicornscan. There are two .php files in these folders named index but no html files.
Please fellas, comment and help me find it!
-
-
13:10
»
remote-exploit & backtrack
Hi there
i have a problem and i need some help... when i start nmap command like -T aggressive -sV -P0 or something like that my internet connections died directly...
NMAP SYS:
(SYN Stealth Scan Timing: About 35.17% done; ETC: 21:50 (0:03:15 remaining)
sendto in send_ip_packet: sendto(5, packet, 44, 0,xx.xx.xx.xx, 16) => Network is
unreachable
Offending packet: TCP xxx.xxx.xxx.xxx:xxxxx > xx.xx.xx.xx:xxxxS ttl=40 id=10530 ip
len=44 seq=859018994 win=1024 <mss 1460>
Sleeping 15 seconds then retrying )
i don't know why, but all goes down. I have Tenda N router and my laptop is sony vaio (VGN-SZ3XWP) with Ethernet: Marvell Yukon 88E8036 PCI-E Fast Ethernet Controller. My question is what is the reason for doing this... To fix the problem i must shut down the router for a 20 seconds and after that work's fine.
-
-
14:51
»
remote-exploit & backtrack
I am having a little problem with capturing my WPA Handshake NOTE: This is for MY Home network. I have even tried turning the connected computer off and unplugging it from the router also turning the router off and back on NOTHING Works I simply can not capture MY Handshake I attend college as a Network Admin where I captured My schools handshake but I believe this is because there are always lots of people connected to the network i cant remember if i even had to deauth a computer although now i think of it I believe I did as well as spoofed my mac NOTE: I am not spoofing my MAC for my home network. can someone please help
-
-
21:45
»
remote-exploit & backtrack
allright so im scratching my head on this one, im trying to connect to a wireless router, i can connect in windows no problem, with the wep key entered, but i cant figure out how to connect backtrack to my network wirelessly, its annoying not having network access while using backtrack.
it detects networks no problem , and its probably something really simple, anyone can enlighten me?
-
-
22:22
»
remote-exploit & backtrack
I've installed GNOME, I can not login
Graduated the following message:
the system administrator is not allowed to login from this screen
What is the solution ? :o
thank and reg
-
-
18:50
»
remote-exploit & backtrack
i did dual boot windows xp and BT4 final the problem is after i finsih installing bt4 i realized that no sound in windows xp and i mean like the sound card does not exist while the sound work fine in Bt4 the first time happened i thought there a problem in windows however when i removed Bt4 and restore mbr the sound in windows worked just fine . i really have no idea what the hell is going on since i have never experience such problem with other backtrack at all . any suggestions or thoughts?
-
-
10:30
»
remote-exploit & backtrack
Hey Dudes,
I've got a problem and I hope that someone can help me.
I want to test my network..
Thus I want to do with the interactive packet replay attack.
At first the basics:
I am using BackTrack 4, with a Intel 3945 ABG chipset, yeah I do know its not the best one..
I did the injection test with a positive result.
In the network there is no client.
I already started capturing the ivs.
I do want to cause some traffik with the aireplay-ng -2 -p 0841 attack.
My problem:
At first I make the fake authentication with this command:
Quote:
aireplay-ng -1 0 -a 00:23:08:81:2A:25 -h 00:1C:BF:69:AA:83 wlan0
|
-a is the ap's mac und -h is my chipset's one
It responds:
Quote:
18:06:11 Waiting for beacon frame (BSSID: 00:23:08:81:2A:25) on channel 5
18:06:11 Sending Authentication Request (Open System) [ACK]
18:06:11 Authentication successful
18:06:11 Sending Association Request [ACK]
18:06:11 Association successful :-) (AID: 1)
|
So far, this seems to be sucessful, now I'm trying to do the replay with this command:
Quote:
aireplay-ng -2 -p 0841 -b 00:23:08:81:2A:25 -h 00:1C:BF:69:AA:83 -c FF:FF:FF:FF:FF:FF wlan0
|
again, -b is the ap's mac and -h my chipset's one..
Well, there isn't a real respond... it just count some packets:
Quote:
Nothing more happens..
Have you got a solution for me ?
Thx for reading,
TrackLine
-
-
10:33
»
remote-exploit & backtrack
Tach jungs,
ich hätte da ein Problem ich bin gester extra losgezogen und hab mir einen D-Link DWL-G122 gekauft da der laut
Code:
backtrack.offensive-security.com/index.php?title=HCL:Wireless#Asus_WL-138g_v2
(ich darf noch keine URL`s Posten deswegen ohne www)
erkannt wird.
Naja leider ist genau dass das problem: "No Wireless Adapter found" oder so ähnlich habs nicht ganz im Kopf.
Was soll ich den jetzt machen? Ihr seit doch hier die "Cracks" :D (hoffe ich mal:cool::cool:)
Schonmal vielen dank für die hilfe
Nawuko
EDIT: Mir ist Grad was aufgefallen auf der seite steht D-Link DWL G122 (USB) F/W 2.03 B1 bei mir auf dem stick F/W 3.30 und H/W C1..
Umsonst gekauft ?
-
1:28
»
remote-exploit & backtrack
Hi, I've been used backTrack 4.0 final as a live cd in my virtual machine (vmware), when it's getting start up when I want to starta program or even move the mouse from one location to another it's very slow, I've been installed it on my Laptop as primary OS (hard-drive install) and I have no problem, but it's strictly important for me to run it on the vmware ( as a vm ) .
could anyone point me to some idea for solving this problem !?
thnx .
-
-
3:56
»
remote-exploit & backtrack
Today i try install vlc (sudo apt-get install vlc).
But it did not install
Quote:
\/vlc_0.9.4-1ubuntu3.1_i386.deb[/url] 404 Not Found
E: Unable to fetch some archives, maybe run apt-get update or try with --fix-missing?
|
server error
this output after 50% download. What is the problem?
-
-
15:32
»
remote-exploit & backtrack
Hello there .
when I want to start graphical mode i got out of range error in my monitor, I hadn't such a problem with my previous linux dsitributions such as debian or suse.
Is there any switch available for startX for solving this kind of problem or the problem is not there ?
any suggestion are welcome .
thanks .
- Genius