remkow
-
Posts
205 -
Joined
-
Last visited
Posts posted by remkow
-
-
Download the switchblade, and look at the way the nmap and vnc parts send their information to an email account.
-
use this command to enable a service:
sc config servicename start= auto
More information:
C:>sc config Modifies a service entry in the registry and Service Database. SYNTAX: sc <server> config [service name] <option1> <option2>... CONFIG OPTIONS: NOTE: The option name includes the equal sign. type= <own|share|interact|kernel|filesys|rec|adapt> start= <boot|system|auto|demand|disabled> error= <normal|severe|critical|ignore> binPath= <BinaryPathName> group= <LoadOrderGroup> tag= <yes|no> depend= <Dependencies(separated by / (forward slash))> obj= <AccountName|ObjectName> DisplayName= <display name> password= <password>
-
My school "hides" the c-drive so that it doesn't show up in My Computer (which you can do with TweakUI.exe).
All you need to do to gain access to is to
1: Start > All Programs > And Double Click any of the program folders.
this should bring up an explorer box somewhere in "c:/documents and settings/all users/start menu/all programs/random program folder"
2: Hit the "Up" button to go to the directory that contains the current directory.
3: Repeat step 2 until you are in the" c:" drive
4: Feel Free to browse the "c:" drive, you shouldn't have any problem accessing the Windows directory either since you need to have at least read access to the windows directory to execute most programs
Something Else Thats Neat.... even if the admin did block the cmd.exe they may not have blocked the command.com which is more or less the same thing. Mine even allowed me to reset the local Admin password for the computer.
Once Again....Physical Access to a box means that its pwned....
I found this on my school as well... Something else which works is just rightbutton clicking on Start, then Explore. Then just go to C: in the left panel.
-
Tetrasoft: are you using Rainlendar?
-
This could be really (use|harm)ful.
How could this be harmful?
-
add me on msn and ill see whether i can help ya out
-
try and put the files you're using on the CD partition of the USB key if they're not too big.
-
FPS... duh
-
It has been released on some VIP forums before it came to digg..
-
Well if you want to make it as realistic as possible, set one up your self. Using Virtual Box or VM ware/player if you don't have any spare boxes. That way you can have a realistic war game with out any real damage.
This sounds like fun! Install Damn Vulnerable Linux on all the VMs then have each player take about 10 to 30 minutes to patch the holes and install a few metasploit like packages. Then, at the end of the 30 minute countdown they all fall onto a virtual network where they must try to crash all the competitors and be the last one standing.
dude that would be awesome to organize sometime instead of the normal Hak5 lanparty :)
-
damn this thing spreads fast.. first it was private, then it got to a few VIP forums, and now its everywhere :S
-
It's all in the registry (.reg) files. Try finding things out for yourself
-
yea, providing us with the app would really help..
ps. horza, what is it with you and double posts?? 3 double posts in one topic lol
-
im getting tired of all people who come here and ask stupid questions without searching. this question has been answered several times already, just use the search button.
Enable "view system files and folders", as well as the hidden files and folders
-
I'm trying to figure out if 0d9ad48b34cd08911339 is a hash.
Well obviously it's a MD5 hash.. maybe use some rainbow tables on it
-
Took me a few seconds to crack with john the ripper.
C:Toolsjohn>john-mmx pass.txt Loaded 1 password hash (Traditional DES [64/64 BS MMX]) 112688 (phonebooth) guesses: 1 time: 0:00:00:12 (3) c/s: 285148 trying: 11289c - 112659
tCr2DZDAbqWZo = 112688
-
It doesn't seem to be Rot13 and it's has the wrong number of characters to be Base64 (unless it's padded by the server before decoding)
Like I said, it probably is DES
and if you know the password in plaintext, try hashing it to MD5 and to DES, so you can see if the hash is of your password, or from something else.
-
the 3DtCr2DZDAbqWZo hash should be read as tCr2DZDAbqWZo. This is because %3D is the hex value for the =
this also means that D52770e1a5f700cd6f020f815217c4dc9 should be read as 52770e1a5f700cd6f020f815217c4dc9
52770e1a5f700cd6f020f815217c4dc9 is a normal MD5 hash, crack it to see the value.
tCr2DZDAbqWZo probably is a DES hash, but I'm not 100% sure about it, just a quick guess.
-
All I can see is that the / before signons.txt should be a
-
Mailed ya, ill see what I can do
-
Or just make your own script which kills norton
-
MP3 of course..
-
I have a little trick which can be used for Truecrypt. You make two batch files:
mount.bat
"C:Program FilesTrueCryptTrueCrypt.exe" /v D:UberSecret.pst /l R /auto /q explorer R:
unmount.bat
"C:Program FilesTrueCryptTrueCrypt.exe" /d R /q /s
This way you can easily mount and unmount your truecrypt volumes. You can also specify a device instead of a file. When you run Mount.bat, there will be a truecrypt password popup, you enter the password, and then it autmatically opens an explorer window to the drive you just mounted. I use this too on one of my U3 drives, where I've set the mount.bat to autorun as soon as the drive is inserted, so it will automatically ask me for a password.
-
I totally agree. DO NOT stop seeding it until there are some others who have finished downloading (finally) and can start seeding. please.
MAC Address Scanner
in Questions
Posted
If that's possible, you can also just get the MAC of that machine, and use it on your own laptop