To be honest you with, I am still in the process of buying it, I am not 100% sure how good or durable it is, but according to the reviews I read, it is a damn good laptop.
Can they really help, I mean it was just an email account that was hacked.
I know how it important it may be to the OP, to find who did this.
But what are the chances of a CyberCop really digging into it.
Try using Nmap to scan the ports of your target machine, from your attacker machine.
Make sure the windows firewall is also turned off, during the nmap scanning.
Nmap should be able to display all the port opened.
By default, Microsoft-DS should be running.
Yeah I did realize that, after finishing reading the comments. I've been a bit stressed out lately and not happy with work, I guess I overlooked Vako's response to the OP.
From reading articles in virtualization, they always mentioned that a full virtual machine could be more insecure than the actual hosting operating system.
I guess that statement could be wrong, it all depends on how well and secured the VM really is.
Edit: By the way, thanks for correcting me there.
Hi Copex,
I have found these Article, that may be of a help you
http://support.microsoft.com/kb/814595
http://articles.techrepublic.com.com/5100-22_11-6028421.html
Let me know if it doesn't
I have also found other instructions on how to recover mysql passwords as well
http://www.cyberciti.biz/tips/recover-mysq...t-password.html
http://dev.mysql.com/doc/refman/5.1/en/res...ermissions.html
I am not using Backtrack, I am using Metasploit framework 3.4.2. I haven't had a chance to play with backtrack yet. At one stage before I was able to almost exploit my target but the VM's AV blocked it.
I tried running the exploit again, without any protection on the VM but it failed. It said something about no session could be created. I then tried using encoders with the AV turned off but didn't work. I have a feeling that my VM is fully patched and that could be why no exploits are working.
I am gonna be on trying until, I can get a full penetration.
Hi X942,
The reason I asked, was because I've just got into Metasploits and haven't been having much luck with exploiting my target VMs lately.
I think it may not be possible for me to exploit my targets, since they all seem to have the latest patches.
Now going back to your first question, do you have the LHOST and RHOST set right. Lhost should be set your attacker ip and the RHOST to the target IP.
What errors are you receiving if any, are you able to get a reverse shell of the exploited machine.
1. Keep your system current with the latest updates
2. Besides CCleaner, you should give Comodo System-Cleaner a try, its also very good.
3. If you have time and patience to install these, you could try PFsense or Untangle, they are Linux based firewalls.
4. For more on spyware detection programs, http://anti-spyware-review.toptenreviews.com/