Infiltrator
-
Posts
4,287 -
Joined
-
Last visited
-
Days Won
22
Content Type
Profiles
Forums
Gallery
Events
Posts posted by Infiltrator
-
-
not the APIPA Bro, apipa canoot help you to connect to domain or internet connectivity ..it only talk to its own broadcast range..!! if u have two or more computer with one modem take one computer go to the lan card change ip address to any u want , (login to router make static from dynamic ip ) and again go back to the same lan card add another ip into the same
now go back to the command
c:> arp -a
type this and u will see the arp entries with two ip address with unique mac address
slap me if its not worked
Correct if I am wrong, but wouldn't the Modem and the LAN card have its own MAC address. And as result, you would have two different MAC addresses.
-
It would be sad to see the show change, because of some corporate rules.
If that does happen, which I hope it does not, it would be a nightmare.
-
Until they use a VPN or Proxy. Won't stop piracy. Will only make it more advanced down the road.
As long as a VPN or proxy exists, no website can be 100% blocked.
However, an ISP could always block these technologies, if they are using deep packet inspection, like how China did with TOR.
Then we could be doomed.
-
its possible bro, i have tried on during my lab session..
you can assign two ip address , in a one lan interface...you can assign one for The computer IP address and another one for by asssuming router IP address(but in reality u don have router in ur hand)
thats how i used during in my lab set up ...so after tat try look up arp cache table
c:> arp -a
now u can see two ip address, and two different mac address
but onli one network interface card
Oh yes the APIPA address. But one thing you got to remember is that the MAC address is imprinted on the NIC's ROM, so it doesn't change only the IP address.
-
I don't think there are any more methods besides the ones already mentioned.
-
Hello guys, i'm quite new to linux and i've been experimenting lately with a few VMs (BackTrack and Ubuntu are just a couple to name). I'm planning on getting a new computer and i plan on using only linux on it. The question lies on which distro should i choose to use as a main OS? I will be doing INFOSEC stuff and coding as well as listening to music,watching videos,uploading pictures and that sort of thing. I was wondering if maybe BackTrack could be used as a main OS. Could you install some video players,music players, document editors,etc..? Is BackTrack stable enough to be used as a main OS? Is it safe? What about other distros such as Fedora or Debian? Would they be good for pentesting/casual use? I'm sorry for the poor phrasing of this post, my english isn't good. If you didn't understand something, let me know!
I'd not recommend Backtrack as your main OS, instead use Ubuntu, as its been designed as a desktop OS for everyday usage. Backtrack on the other hand, was designed for security auditing and most of its operations are conducted from a terminal window, which could prove challenging at first, if you are not a Linux user.
Ubuntu is quite friendly and there are tons of tutorials and guides on the internet, to make your transition as smooth as possible.
-
what if you have two ip address assigned in a single adaptor card ? the two ip address have two mac address ? ist ? i guess yes !!
Technically speaking, you are still required to have two separate LAN interfaces on the card, for the two MAC addresses to be used individually. By design, its not possible to have two MAC addresses operating on the same interface.
and in that case how do i find which one is authorative MAC adress for the card among the two ip address associated mac address ?
Let me guess, are you trying to set up some kind of load balancing or redundancy? If that's the case, you can't assign more than one MAC address to a single NIC. You can change the MAC address, but that's as far as you can go. A single NIC can only operate with a single MAC address, you will need an additional NIC if you want to have two separate MAC addresses.
what is the best ways to manually add the static entry of my machine mac address into the targeted network gateway so that i can start intercept thier connections !
This will need to be hard coded in the router's firmware, however you can use ARP Poisoning to redirect your victims traffic into your attacker's machine.
if you haven't done ARP poisoning before, check out this Backtrack arp poisoning article.
http://forum.intern0t.org/offensive-guides-information/603-arp-poisoning-mitm-attack.html
-
I'd just use a VPN service, like Cyberghostvpn or Nvpn to tunnel all my traffic through. That way, even if someone tried sniffing my data it would be encrypted and protected.
Also Darren did a lot of segments on wireless security, that it shouldn't be a problem to implement.
-
Why don't you ask them directly at feedback@hak5.org.
-
For learning experience I'd recommend Ubuntu, I've been using it as my second OS in a VM, for quite sometime now and have always been learning stuffs.
Plus Ubuntu has a great community, with lots of tutorials and resources to help out any new starter.
-
Meterpreter or a Remote Administration Tool with a built in keylogger/screencapper would be a good place to start, I think there's a section on Hackforums, I don't know if its still there though, haven't been on that website in a long time
As a matter of fact, there are a lot of talks on RATs in the Hackforums even tutorials. I just became a member and its amazing to see how many threads are created on the topic. Not to mention, that in every question or answer, there will always be the abbreviation RAT, or people suggesting the use of RAT.
-
C and Python would be good languages to learn, learn C first then Python. I'd also encourage you to do certifications, whilst they may not seem effective at determining someone's experience, they will make your resume look good, when hunting for a job.
Apart from these certs, network+ or security+, I'd also go for the CCNA and CEH.
-
WOW, steep price tag on that baby.
Yeah I know, but it's OK, I can afford it.
-
Turn off your main wireless card WLAN0,
ifconfig wlan0 down
Then connect your Alfa wireless card in and run the command,
iwconfig
It should now display some information about your Alfa card, issue an Ifconfig WLAN0 up to bring your Alfa interface up and then try again, see if that still freezes up.
-
This is the laptop, I am getting, I know it doesn't meet your requirements but its a great machine, for pen-testing I'd say. One of the things, that I like most about it, is that it comes with an NVIDIA graphics card, with 480 cuda cores, which will help me crack passwords faster.
I'm also going to wipe Windows off and install Backtrack 5. In addition, I will be replacing the HDD with an SSD for optimum performance.
"Intel Core i7 2670QM 2.2Ghz (Turbo 3.1G), Windows 7 Home Premium 64-bit, mobile Intel HM65 express chipset, 12GB (3 x 4GB) DDR3 1333MHz, 15.6" LED full-HD (1920 x 1080), 2GB DDR5 NVIDIA GeForce GTX560M, 2 x 750GB 5400RPM, Bluray writer and more. 2 year hardware warranty, 1 year..."
http://www.pccasegear.com/index.php?main_page=product_info&cPath=1013_1255&products_id=18809
-
Thank you, Mnemonic. I wanted to thank you for your comment immediately but I couldn't remember my password at the time and I have not logged in in a while. The thing I was doing at the time was needed kind of urgently so I didn't have time to learn but I took your advice and gave learning metasploit a go. I'm still basically just reading the intro of a book on it, but we'll see if I can Forest Gump my way thru it :)
I don't know if you know, but there is a hardware keylogger, you could buy.
-
When you're done with your account on this forum, if you wish to delete it and all your posts how do you do so?
I'd contact the forum administrators.
-
Yeah, I've heard about that too. I don't know about Windows, but have you tried using a different driver other than the default driver in Linux?
-
If you have a little time this would be the best place to begin. Couldn't be explained any better than this
I can't believe I forgot to mention those videos, I even bought the book he wrote.
Highly recommended videos.
-
It takes time, patience and a bit of thinking, which is the difference between a successful pentester and a script kiddie, in my humble opinion.
You are definitely right and that's exactly how I implemented my dictionary files.
-
Aha, yeah, Im viewing some of the ones google threw up now,
was just wondering if anyone on here had any specific tutorials that
they know concentrate on the key points and dont faff about with stuff, thanks though
I don't know what makes you hate Google!
But it only took me a second to find these articles.
WEP Cracking Tutorial
http://lifehacker.com/5305094/how-to-crack-a-wi+fi-networks-wep-password-with-backtrack
WPA Cracking Tutorial
http://www.aircrack-ng.org/doku.php?id=cracking_wpa
http://www.smallnetbuilder.com/wireless/wireless-howto/30278-how-to-crack-wpa--wpa2
-
You don't put 25 users on a domain, that's what workgroups are for.
Ideally you should have no more than 10 computers in a workgroup anything, above or beyond becomes impractical.
I like everything managed from a central point. Its easy for keeping track of things and as well as helping maintain a secure environment.
-
Another direction you could go in might be to use Rainbow Tables, if you havent already tried them?
You can either download them, or use the winrtgen tool that comes with Cain and Abel (inb4 Skiddie)
The only problem I see with rainbow tables, is that after a certain length of characters, they become ineffective at cracking. And then you are back to square one!
-
The attacker will still need to know what the userID is, in order to authenticate. However, there is one thing that the attacker could do, if he doesn't know what the password is but knows what the userID is, he could do what is called "pass the hash attack".
Watch this video, http://www.room362.com/blog/2009/8/26/pass-the-hash-metasploit-demo.html
The Pirate Bay Must Be Blocked By Uk Isps, Court Rules
in Everything Else
Posted · Edited by Infiltrator
Yeah, I know exactly what you mean, and I do agree with you. Those government officials think they know how to stop us, but we are always one step ahead of the game. Because we have technolust.