Jump to content

Longcat

Active Members
  • Posts

    20
  • Joined

  • Last visited

Recent Profile Visitors

1,833 profile views

Longcat's Achievements

Newbie

Newbie (1/14)

  1. Ok, this might be stupid, but I have a question. How would I connect to a network through the internet? So, say I wanted to get on my friends network, without physically being there, and snoop? (This is an example, not really doing this, just a question I've been looking for an answer for..) Or connecting to one PC across a network to "Pwn" it or something, any ways to do this? Thanks, and all answers are welcome, even if they are funny jokewize types.
  2. Well, if everything was legal, I say you call microsoft and your ISP and try to figure it all out.
  3. AHA, I got it, THANKS FOR THE HELP EVERYONE!!
  4. Ok, well, I've been googling around and found this... http://www.derkeiler.com/Mailing-Lists/sec...2/msg00027.html But I don't know this: Can anyone help?
  5. I did this, and the same thing happens, the Terminal Client comes up, but no username is inputted, nor passwords are tried.. Is there something else I need?
  6. As I've said in many other threads, my friend has a server set up so I can "practice" if you will. I want to try to crack a RDP password.. Anyone got any ideas? I'm trying to use tsgrinder, but for some reason it is timing out. I type C:\tsgrinder>tsgrinder -w dict -l leet -u administrator xx.xxx.xx.xxx Anyone see a problem? EDIT: I believe it's a windows 2003 server.
  7. So you're saying I need a list of the passwords, because open bruteforcing with upper and lowercase alpha + symbols would take infinite time..?
  8. Ok, my friend has a server set up and has a forums that he wants me to test if I can crack the password of his account. Is there any way I can do this in either XP or Backtrack 4?
  9. UPDATE: Ok, it seems even xhydra is borking out. I added the password to the base password.lst in /pentest/wireless/aircrack-ng/test/ Around the 30th line. I did the same thing in xhydra and it even ATTEMPTed it, but it scrapped it as a password and gave me three wrong passwords
  10. Ok, well, I did the command in xhydra, and I found that the passlist didn't have the password. I added it to my list (he gave it to me to see if it was user error) and I ran xhydra again, it found it, but the Console shell is still becoming confused and dropping 3-4 wrong passwords. haha. I'll stick to xhydra then..
  11. Well, I am using Backtrack 4. Not windows, just to start off with. Secondly. Yes, the passlist might not have the password, but I don't see why Hydra wouldn't try the first time and I also don't see how Hydra can output like 6-8 wrong passwords when I try a different "url" (https://xx.xxx.xx.xxx/svn/ or /)
  12. This. Although, my computer just got it like 2 weeks ago. So some people might have it, others might not.
  13. Ok, I'm back, with another question. My friend has a SVN server. You can connect to it using https://xxx.xxxx.xxx.xx/ I asked if I can crack it and he set me up an account just to crack it. Here is what I have in my Hydra command line... Hydra -l hackme -P /pentest/wireless/aircrack-ng/test/general.lst -e ns -t 10 -f -s -vV xx.xxx.xx.xxx https-get https://xx.xxx.xx.xxx/svn/ -o Output.txt Then when I start the command, I just get this.. Hydra v5.4 (c) 2006...... [DATA] 10 tasks, 1 servers, 2293 login tries (1l:1/p:2293), ~229 tries per task [DATA] attacking service http-get on prot 443 [STATUS] 849.00 tries/min, 849 tries in 00:01h, 1444 todo in 00:02h [STATUS] 767.50 tries/min, 1535 tries in 00:02h, 758 todo in 00:01h [STATUS] 726.00 tries/min, 2178 tries in 00:03h, 115 todo in 00:01h [STATUS] attack finished for xx.xxx.xx.xxx (waiting for childs to finish) Hydra (http://www.thc.org) finished at 2009-10-11 15:16:48 And the output has nothing written into it. I also tried the command Hydra -l hackme -P /pentest/wireless/aircrack-ng/test/general.lst -e ns -t 10 -f -s -vV xx.xxx.xx.xxx https-get / -o Output.txt But it outputs a bunch of wrong passwords. Any ideas?
×
×
  • Create New...