Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. I think what the OP is trying to do is brute force the router/switch by using Hydra. How is "Pass the hash" going to help? Unless he wanted to gain access to another computer.
  2. Umm, hard drive is a WD Raptor 10.000RPM, the CPU its an Intel Q6600 Quad core, not dual core.
  3. 1) Running your webserver as the root user, its a very bad idea, if the attacker manages to get into your server, he won't need to escalate his privileges, he will get full access to your system and its game over. On the other hand, if a virus/trojan manages to sneak into the webserver, they can do real damage simply because you neglected to lock down your system. By limiting the privileges, you are limiting the damages an attacker or a virus can do. 2) Exploitable kernel means, if the main core of the OS (Windows or Linux) contains a vulnerability or security loophole, an attacker could easily exploit and gain access to the system. By keeping the OS patched (updated), you reduce the chances of exploitation. 3) Just like an Exploitable Kernel, an exploitable suid'd program could contain vulnerabilities/security loopholes within its source code thus allowing an attack to take advantage of it, and gaining unauthorized access to a system. 4) Writable home directories, if your system or webserver has a writable directory, anyone can save or even execute malicious files, which could potentially give them access to a system. Make sure home directories only have read or no access at all to the public. This will improve the security of the system as well.
  4. You only need one card for injecting, not 2. Ideally you could have two cards one for monitoring the traffic and the other for injection.
  5. Are you sending any attachment in it, or just a simple text message? Edit: Could you provide a copy of your /etc/resolv.conf as well as don't forget to check your log files, make sure there are no errors in it.
  6. According to the Logitech website, there is no support for Linux. http://www.logitech.com/en-sg/webcam-communications/webcams/devices/5869 However, according to this Ubuntu thread it seems to work out of the box http://ubuntuforums.org/showthread.php?t=1245025
  7. Hey guys, I've had this computer for over 4 years now, and I am thinking on selling it, but I don't know how much it would be valued for. I hope you guys, could provide me with an estimate. Here are the specs and will be posting some pictures pretty soon, to give you an idea of the overall condition. Case: Antec 900 http://www.antec.com/Believe_it/product.php?id=MjM= Power Supply: Antec Quattro 850 http://www.antec.com/Believe_it/product.php?id=NTg= Motherboard: Asus Extreme Striker http://www.asus.com/Motherboards/Intel_Socket_775/Striker_Extreme/ CPU: Intel Core2 Quad Q6600 http://ark.intel.com/products/29765/Intel-Core2-Quad-Processor-Q6600-(8M-Cache-2_40-GHz-1066-MHz-FSB) Memory: OCZ 8GB DDR2 PC2-6400 SLI-READY http://www.ocztechnology.com/ocz-ddr2-pc2-6400-sli-ready-edition-dual-channel-eol.html HDD: WD VelociRaptor 150 GB SATA http://wdc.com/global/products/specs/?driveID=820&language=1 CD/DVD Drive: Asus DVD-E818A7T http://usa.asus.com/Optical_Storage/Internal_DVD_Drive/DVDE818A7T/#overview Blue-Ray Player: Sony BDUX10S http://www.sony.com.au/product/bdux10s/sku/bdu-x10s+u3 Sound Card: Creative Soundblaster X-Fi Pro, with External I/O Console Graphics card: Evga Nvidia GTX 465 http://www.evga.com/products/moreInfo.asp?pn=01G-P3-1361-KR&family=GeForce%20400%20Series%20Family&sw= Water Cooling System: Hydrocool200Ex http://www.3dvelocity.com/reviews/hydrocool200/Hydrocool200ex.htm Thanks.
  8. Do you have the proper drivers installed?
  9. This URL has the CLI version of Hydra, http://www.darknet.org.uk/2007/02/thc-hydra-the-fast-and-flexible-network-login-hacking-tool/ You need to scroll down to where it says, "IF you want the windows version you can grab this Cygwin version:" And download this zip file, hydra-5.4-win.zip. I tested it on my computer and it works, I can run the .exe from within DOS.
  10. There is a CLI version of Hydra, I think this is one of the links http://www.aldeid.com/wiki/Thc-hydra http://www.darknet.org.uk/2007/02/thc-hydra-the-fast-and-flexible-network-login-hacking-tool/
  11. You need to contact the forum administrator, he will be able to help you.
  12. I haven't tried this before, but you could upload the Hydra .exe file to the exploited box and then try running it from a meterpreter shell and see if it works.
  13. Untangle is a nice firewall software, but it can be a bit of a resource hog sometimes. I would suggest PfSense, if you could use it.
  14. As we all know, there are certain types of hacking, the bad ones (someone hacks into a system for evil intent) and the good ones (where you do something yourself and learn from it, or try to make it better). Now I mean no disrespect to your mum, but you should educate your mum on the type of hacking you intend to do. Tell her, that your intents are not evil but purely for learning experience. Don't say that you intend on using the pineapple wifi for hacking your neighbor's WIFI, but instead tell her that you will be using it for your own good, for learning the dangers of unprotected WIFI and what you can do to protect yourself. If you have spare computers with wifi enabled, you could invite your mum for a few hacking sessions, teach her all you can about the dangers of open/unprotected WIFI, and provide solutions where appropriate. By doing this, your mum will have more confidence in you, she will be certain that you won't be hacking your neighbor's network. And I am sure, she will have different views about hacking. Now its all up to you.
  15. Can't be done, unless you deauth a user and get he/she to re-authenticates again to the network.
  16. According to these MS article, ICS doesn't allow the configuration of static IP address. http://windows.microsoft.com/en-AU/windows-vista/Using-ICS-Internet-Connection-Sharing http://answers.microsoft.com/en-us/windows/forum/windows_7-networking/problems-with-internet-connection-sharing-ics/9b889164-eb32-4115-b3cc-f8a2a649b9c7
  17. Good point, Networkminer not only work as a passive sniffer but it has the capability to reconstruct the sniffed data. For instance, if someone is uploading a file to a server you will be able to retrieve a copy of that file too, as long as the traffic is not encrypted.
  18. The company I work for uses, HPSM for managing and logging tickets. http://h30499.www3.hp.com/t5/IT-Service-Management-Blog/Introducing-HP-Service-Manager-9-20/ba-p/2410231 At first, it can be a very complex tool to use, but once you get the hand of it. It's a very good tool for managing tickets.
  19. There are a lot of sniffers out there for different purposes. But you will need to be specific on what you are trying to achieve. With wireshark will be able to sniff almost anything, as long as the traffic is not encrypted.
  20. I have subscribed for peacefire.org, they send me a proxy URL every week. You should try that!
  21. If you have an Nvidia graphics card, you could use this utility to crack it, http://www.cryptohaze.com/multiforcer.php
  22. Since its my college who is writing the WPA cracker, will have to ask him. But I am pretty sure, he is using C for writing the APP. But for the optimization part, not entirely sure.
×
×
  • Create New...