Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. Read more: http://wiki.answers.com/Q/How_does_keygens_work
  2. The only problem with IPv6 is that, if the victims network is not setup/configured to use IPV6 protocol, your attack may not work. Your best option, would be to do what Digip suggested, place a machine in a DMZ or forward the necessary ports on the router.
  3. NAT (network address translation) acts as a barrier between the VMs and your "clean" machines. Only the VMs can see/ping your clean machines. That's because NAT knows the subnet of your clean machines, furthermore, your clean machines are not on the same subnet as your VMs, and they do not have direct access to the VMs, because of NAT acting as a barrier. As result, you can't ping any of your VMs machines from within a clean machine. That's the reason why you are receiving the above "expired in Transit" error message, your clean machine is not on the same subnet as your virtual machine. You would have to set each of your VMs interface to BRIDGE, in order to be able to ping one another. But doing that, would put your "Clean" machines at risk, and you don't want that.
  4. Yeah I know that and it does happen to me too. But your VMs are on a different subnet 192.168.3.X, and as long as you set your tools to operate off that subnet it shouldn't be a problem. Alternatively, you could buy a router or a layer 3 switch and configure Vlans on it, so that way both subnets will be isolated from each other.
  5. You need to set each of your VM interfaces to NAT, they will each receive an IP address in a different subnet range. For example, my main LAN IP address is 192.168.1.X, my VMs use the same IP address range 192.168.1.x but they are in a different subnet, which is 192.168.85.x I can still ping my default gateway 192.168.1.1 and access internet, but when pen-testing/exploiting my virtual machines, all I have to remember is to use the subnet 192.168.85.x, instead of subnet 192.168.1.x As simple as that!
  6. Not sure about Apple OS, but if you run an instance of Backtrack inside a VM, it should work without much problems.
  7. That's what I was going for, by not implementing an Iframe and by embedding the native code directly into the source code of the page, Chrome shouldn't be able to filter it out. Since no Iframes or XSS are being added to the page.
  8. Since Google Chrome filters XSS attacks, the other possible way would be gaining root access to the webserver and inserting your own native code in the page. That way you won't have to rely on XSS.
  9. I don't see any problems with that, in fact my machine at home, has Windows 7 with Vmware and 3 VMs, all running at the same time. However, you will need more than just 4 GB of RAM, if you plan to run more than 2 VMs at once and a quad core CPU, to retain the performance from dropping too much. Will Internet access be required in your LAB?
  10. According the the Reaver creator, it should not take more than 10 hours to recover the password, if its taking way longer than there must be something wrong.
  11. Have you guys configured your AP to work with WPS. If its only using the normal security WPA 2 Personal + AES or PSK not going to work. It needs to be configured with WPS if not, Reaver is not going to be effective.
  12. The WiFi Protected Setup protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours. Reaver is a WPA attack tool developed by Tactical Network Solutions that exploits a protocol design flaw in WiFi Protected Setup (WPS). This vulnerability exposes a side-channel attack against Wi-Fi Protected Access (WPA) versions 1 and 2 allowing the extraction of the Pre-Shared Key (PSK) used to secure the network. With a well-chosen PSK, the WPA and WPA2 security protocols are assumed to be secure by a majority of the 802.11 security community. Usage is simple just specify the target BSSID and the monitor mode interface to use: # reaver -i mon0 -b 00:01:02:03:04:05 Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. WPS allows users to enter an 8 digit PIN to connect to a secured network without having to enter a passphrase. When a user supplies the correct PIN the access point essentially gives the user the WPA/WPA2 PSK that is needed to connect to the network. Reaver will determine an access point's PIN and then extract the PSK and give it to the attacker. Web source: http://thehackernews.com/2011/12/reaver-brute-force-attack-tool-cracking.html
  13. it's happening to me too. There must be some html/css tags that are not properly enclosed or some line of code not properly written.
  14. I found this link, http://www.cisco.com/en/US/docs/net_mgmt/catalyst_switch_manager/3.0/user/guide/ccsm_ug.pdf
  15. I would just buy a layer 3 switch, configure the Vlans on it and use the IGRP protocol for routing between the two Vlans. It would be a lot easier and simpler, unless you can afford buying a Cisco router.
  16. Or you could definitely do that, it would be a lot cheaper to maintain, with no hardware or costs involved. But it would be extremely illegal thing to do.
  17. I share the same thought and option as you. In the end, nothing is really safe or anonymous.
  18. Have you tried performing a manual search, like using the Windows search mechanism to locate the installation files? Edit: Another thing you could also try, is to use Microsoft procexp.exe to locate the file location, while its still running.
  19. Caution: Before attempting this, ensure you have a backup of the registry. How to: Read the steps laid out in this article, I have tried it on my PC and they work. http://www.winhelponline.com/articles/15/1/How-to-hide-an-entry-in-the-AddRemove-Programs-applet.html
  20. Its actually a brilliant idea and one that could land you on a real job one day. Going around and teaching people, the benefits of computer security, as well as gaining their confidence in you. Good luck dude.
  21. In theory you could write a script like the one from Zyrax and use it to monitor the DHCP server IP address pool and everytime a new device joins the network, the script would send out a notification containing information such as, IP address, MAC address and so forth.
  22. I do have to agree that Untangle does have its downside sometimes, but with too many Linux Firewall distros, you just have to try them out and see which one suits your needs. 1) Smoothwall 2) ClearOS 3) Untangle 4) Pfsense
  23. I agree with Morfir, most home users are either too dumb or not properly educated when it comes to home computer security. Secondly, going around each neighbor's network and pen-testing could backfire, you will need authorization from the owner, or you could be legally charged for it. Say, even if you had authorization to pen-test a network, how would you go about explaining to a person that has limited IT knowledge, what the implications of an insecure system are. Again it comes down to the individual, some would take the security matter seriously others not so much.
  24. 2 options you could set up a firewall box using Iptables and then install Squid for web caching. Or install Untangle, it comes with all the options you need, some of those will have to be subscribed for.
×
×
  • Create New...