freeb
-
Posts
22 -
Joined
-
Last visited
Posts posted by freeb
-
-
What version of Windows?
-
A DNS spoof attack would implicitly cause a DoS as well. After the 'error' is displayed, it is still not possible to reach the real site (if this is what you want). A MITM/phishing attack get around this.
Hmm, I would if there is a DNS server out there that can serve up different records depending on the requesting client. So for instance when your target makes a DNS request it receives the address of your fake login page and when any other client makes a request it gets the genuine address.
Like Sparda has suggested you could use a MITM attack. What about setting up a proxy, because you have access to your target you could point its web browser to your proxy, and redirect that way. Also continuing the proxy idea how about using a transparent proxy which would not require any configuration on the target.
-
DHCP in each subnet.
That will work providing you have VLANs or routers between each subnet.
-
Have a look at http://www.http-com.com/ Its web based and has AD intergation, but it's not free, although the demo is.
-
Hi, did you research this before posting? Because a little googling threw up this http://www.msfn.org/board/lofiversion/index.php/t17081.html
-
Thats awesome, go for it! I'm sure it will be a great learning experience. I saw something on the net a while back amount somone who built their own CPU, interesting stuff.
-
I still only marginally understand the difference between POST, GET and REQUEST...
When you submit a form using the GET method form values will appear in the url.
http://localhost/form.php?name=Mr+Smith&age=101&submit=submit
GET /form.php?name=Mr+Smith&age=101&submit=submit HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5 (.NET CLR 3.5.30729)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-gb,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer: http://localhost/form.php
With the POST method the form values get sent in the body of request and therefore not shown in the url.
POST /form.php HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5 (.NET CLR 3.5.30729)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-gb,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer: http://localhost/form.php
Content-Type: application/x-www-form-urlencoded
Content-Length: 35
name=Mr+Smith&age=101&submit=submit
-
(If anyone knows of such a tool to use for cisco switches let me know :) im curious )
You can trace it manually by doing 'show mac-address-table' and then following the trail. Look for the MAC address of the rogue device and then follow the port number to the next switch, repeat again until you reach the rogue device. I just tested this in packet tracer and it works great.
-
I rember long time ago when I was a small youth I had one of those 100 in 1 electric kits where you follow a diagram and you could build like a siren and all sorts of stuff.
I had one of those too when I was younger, this exact model, a 30 in 1:
-
-
With char *a = "some text"; just be aware that it is read only. While you could do char first = a[0]; you could not do a[0] = 's'; However with char[] = "some text"; you can.
-
These are the basics of networking.
Routers do not pass broadcast, multicast or frames with unknown destination MAC address.
This makes it impossible for someone to do an ARP poisoning/spoofing on the internet!
/me nods
Layer 2, MAC, addresses are segment local. You send a packet to google the source and destination IP addresses remain the same. Though as the packet traverses the internet its source and destination MAC addresses will change from segment to segment.
Die! OSI model, Die! I hate the OSI Model...It's just a pain in the ass to learn, but yeah, it helps explain how networking works, from the physical layer all the way up the food chain to the software. Who here enjoyed learning the OSI Model? Dare I say none...Gotta love the OSI man. All Pupils Sniff The Network Data Packets, thats one way to remeber it by! :P
-
Freeb, how would you do a string variable in C anyway?
string variablename = "some text"; ?
/ * This is a simple way to initialise a character array, the compiler will work out of the length of the string and place it in the sqaure brackets. */ char mystr[] = "this is my string" /* Like I said in my previous post you cannot do text = "blaa blaah" (EDIT: Again this may be wrong.) You have to use the strcpy function. */ /* EDIT: make sure mystr has enough memory allocated to it to handle the length of the string your going to copy */ strcpy(mystr, "new string value");
Read more here -> http://www.iso-9899.info/wiki/StringsByExample and here ->http://www.iso-9899.info/wiki/String
-
Remember this is Objective-C not C.
/* I know for a fact that you can't do something like this in C EDIT: Actually I may be wrong >.< */ text = "mystring";
However this is Obj-C of which I'm not familiar with, Sorry.
/me wonders if TomB is around, he would be able to help you.
-
ps. for the wise guys out there who see that not all the characters add up, its cos my computer has alot of programs open and the keylogger does not have a high priority level.
Are you using the GetAsyncKeyState api or hooks?
-
-
Could you not just do something like copy \\targetpc\C$\blaa \\yourpc\C$\dump\ on your system.
-
ARP packets are not broadcasted, they have a specific MAC/IP they're supposed to go to, otherwise you could ARP poison a whole network with just a single ARP packet haha
ARP packets are broadcasted at layer 2 on address FF:FF:FF:FF:FF:FF, when a host receives such a packet if that host has the IP address metioned in the ARP request, it replys back with an ARP response to the source MAC address of the ARP request.
-
Hi, having briefly looked at the code in the first post I can't see anything wrong with it. However, what may be the problem is that scanf may not return '\n'
For instance, if you enter the word 'test' and then hit enter on the console, scanf may return {'t', 'e', 's', 't', '\0'} as oppose to { 't', 'e', 's', 't', '\n', '\0'}
Also your code is currently susceptible to a buffer overflow, what would happen if some one were to feed your program a string longer than 999 chars?
-
You could create MSI installers and if your on Active Directory push them out via group policy. It would also be possible to carry out the operations you are describing from VBScript. And finally it your still after an exe file have a look at NSIS nsis.sourceforge.net/
-
stdin should not need declaring if you have included stdio.h. Also as Johnycake said you need to make sure 'buffer' is allocated, either by doing
char buffer[size_here];
or you could use the malloc function.
/* Allocate 1024 bytes to buffer */ char *buffer = malloc(sizeof(char) * 1024); if (buffer == NULL) { printf("malloc failed!\n"); return 0; }
For more infomation on fgets see the man page here.
Self Extract then Execute HELP!
in Questions
Posted
I'm sure Darren did a segment about something like this in a previous season.