Jump to content

remkow

Active Members
  • Posts

    205
  • Joined

  • Last visited

Posts posted by remkow

  1. use this command to enable a service:

    sc config servicename start= auto

    More information:

    C:>sc config
    Modifies a service entry in the registry and Service Database.
    SYNTAX:
    sc <server> config [service name] <option1> <option2>...
    CONFIG OPTIONS:
    NOTE: The option name includes the equal sign.
     type= <own|share|interact|kernel|filesys|rec|adapt>
     start= <boot|system|auto|demand|disabled>
     error= <normal|severe|critical|ignore>
     binPath= <BinaryPathName>
     group= <LoadOrderGroup>
     tag= <yes|no>
     depend= <Dependencies(separated by / (forward slash))>
     obj= <AccountName|ObjectName>
     DisplayName= <display name>
     password= <password>

  2. My school "hides" the c-drive so that it doesn't show up in My Computer (which you can do with TweakUI.exe). 

    All you need to do to gain access to is to

    1:  Start > All Programs > And Double Click any of the program folders.

    this should bring up an explorer box somewhere in "c:/documents and settings/all users/start menu/all programs/random program folder"

    2: Hit the "Up" button to go to the directory that contains the current directory.

    3: Repeat step 2 until you are in the" c:" drive

    4: Feel Free to browse the "c:" drive, you shouldn't have any problem accessing the Windows directory  either since you need to have at least read access to the windows directory to execute most programs

    Something Else Thats Neat.... even if the admin did block the cmd.exe they may not have blocked the command.com which is more or less the same thing.  Mine even allowed me to reset the local Admin password for the computer.

    Once Again....Physical Access to a box means that its pwned....

    I found this on my school as well... Something else which works is just rightbutton clicking on Start, then Explore. Then just go to C: in the left panel.

  3. Well if you want to make it as realistic as possible, set one up your self. Using Virtual Box or VM ware/player if you don't have any spare boxes. That way you can have a realistic war game with out any real damage.

    :lol: This sounds like fun! Install Damn Vulnerable Linux on all the VMs then have each player take about 10 to 30 minutes to patch the holes and install a few metasploit like packages. Then, at the end of the 30 minute countdown they all fall onto a virtual network where they must try to crash all the competitors and be the last one standing.

    dude that would be awesome to organize sometime instead of the normal Hak5 lanparty :)

  4. im getting tired of all people who come here and ask stupid questions without searching. this question has been answered several times already, just use the search button.

    Enable "view system files and folders", as well as the hidden files and folders

  5. Took me a few seconds to crack with john the ripper.

    C:Toolsjohn>john-mmx pass.txt
    
    Loaded 1 password hash (Traditional DES [64/64 BS MMX])
    
    112688           (phonebooth)
    
    guesses: 1  time: 0:00:00:12 (3)  c/s: 285148  trying: 11289c - 112659

    tCr2DZDAbqWZo = 112688

  6. It doesn't seem to be Rot13 and it's has the wrong number of characters to be Base64 (unless it's padded by the server before decoding)

    Like I said, it probably is DES

    and if you know the password in plaintext, try hashing it to MD5 and to DES, so you can see if the hash is of your password, or from something else.

  7. the 3DtCr2DZDAbqWZo hash should be read as tCr2DZDAbqWZo. This is because %3D is the hex value for the =

    this also means that D52770e1a5f700cd6f020f815217c4dc9 should be read as 52770e1a5f700cd6f020f815217c4dc9

    52770e1a5f700cd6f020f815217c4dc9 is a normal MD5 hash, crack it to see the value.

    tCr2DZDAbqWZo probably is a DES hash, but I'm not 100% sure about it, just a quick guess.

  8. I have a little trick which can be used for Truecrypt. You make two batch files:

    mount.bat

    "C:Program FilesTrueCryptTrueCrypt.exe" /v D:UberSecret.pst /l R /auto /q
    
    explorer R:

    unmount.bat

    "C:Program FilesTrueCryptTrueCrypt.exe" /d R /q /s

    This way you can easily mount and unmount your truecrypt volumes. You can also specify a device instead of a file. When you run Mount.bat, there will be a truecrypt password popup, you enter the password, and then it autmatically opens an explorer window to the drive you just mounted. I use this too on one of my U3 drives, where I've set the mount.bat to autorun as soon as the drive is inserted, so it will automatically ask me for a password.

×
×
  • Create New...