Jump to content

unixpro

Active Members
  • Posts

    32
  • Joined

  • Last visited

Posts posted by unixpro

  1. Long time watcher , small time poster. And i have to say i really enjoy your show atm.

    The last two ep's have been really good , knowing things that are not directly related to your field ( me linux and windows admin) is a really good insight due to not going out of my way to find information like that.

    Keep up the good work Darren , oh and btw your vid on rooting the droid made me get a x10 andriod ftw.

    Peace out and keep up the good work.

  2. Hi , i was wondering what you guys use to test your work network for holes. We have a dmz at work and im using metasploit and nessus atm , is there any other program that i should use that tells me if programs /ports are out of date of insecure ?

    cheers

  3. lol, seen the flame wars vid .... ,

    People cant have there own view ...

    lol @ ankle biting, because I said im over wii modding , your supposed to be 34.. grow up mate its a forum. if you dont agree with the post , dont go on and cry because someone doesn't have your same views ..

    lol @ digitip or is it digipms , dude relax

  4. Anyone else over , a month of wii moddin... , i really enjoy most of the topics , introducing vm to people that haven't heard of it and , old topics like the part series of tcp / wireshark thing but as of late aka 505 onwards its been like fast forward to darren's segment watch , then watch diggnation. im not trying to flame but hak5 should be about "technolust" not wii modding for a month lol. i would like to see some cisco router configs like ipsec , trunking etc actual technolust ,

    Anyone ..

    Cheers

  5. Yeah i tryed a python script , for dictionary attack to get usernames but i was un-successfull due to vrfy being disabled. i might try some other methods tonight

    i used this

    #!/usr/bin/python

    import socket

    import sys

    import fileinput

    if len(sys.argv) !=2:

    print "Usage: <inputfile>"

    sys.exit(0)

    s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)

    connect=s.connect(('xx.xxx.xx.xxx',25))

    banner=s.recv(1024)

    print banner

    for line in fileinput.input():

    s.send('VRFY '+line)

    result=s.recv(1024)

    print result

    s.close()

    it worked but dam server had vrfy disabled , anyone know some other methods ? , otherwise ill try some brute force

  6. I was wondering if anyone has done , or knows were to point me in the right direction. My mate has setup a email server @ his house and wants me to test it eg metaspoilt so forth , but i have never done brute force email attacks. I guess you use a dictonary attack , but how do you get a list of email accounts on that server ?

    Cheers

×
×
  • Create New...