-
Posts
939 -
Joined
-
Last visited
-
Days Won
22
Posts posted by i8igmac
-
-
when you say nothing happens. this may be working then....
this may be waiting for a connection now. . .
can you get on irc. . . my name is i8igmac i have some free time. . .
/query i8igmac
-
nc -l localhost 69
I found this on google 'osx mac netcat'
-
http://joncraton.org/files/nc111nt.zip
some versions suck
-
http://www.t1shopper.com/tools/port-scan/
Some netcat versions act different
nc -l -p 69
or
nc -l 69
turn off your firewall just for now...
Use the online port scanner above...
if you still get no response then recheck your port forwarding may be improper...
How many fire walls do u have lol
-
you have a server and a client...
The server application will open a listener port 69...
nc -l -p 69
The client will now connect to the server ip and port...
nc 192.168.1.101 -p 69
If you are the server then u must port forward... if you are incapable of this task then ask your friend to be the server and port forward his router...
I provide you with proper direction. Move forword or move on...
-
I have told you already... you need to port forward and there will be no problem...
Start by typing ipconfig in cmd
This will log you into your router. Now find the otion for port forwarding or application and gaming.
Your router needs to no your local ip and port
Once configured start nc -l -p 69 and now with the link below test your port to see if its open
-
what kind of router do u have. Also in cmd type ipconfig
You will have to log into your router http://192.168.1.1
Your default User name and password maybe admin:admin
You will have to find port forwarding option, and forword port 69 to your local ip as you should see from ipcomfig
-
on your machine. nc -l -p 69. You must also port forward your router....
Then your friend will have to connect nc yourip -p 69
Onlineport scanner is useful
-
Yahoo messenger
Nc would work if u port forward
-
has any one hooked up a alfa card to the device and run airbase-ng?
-
its just a executable file. simply delete It when your done.
-
Has any one tested. I tried pacemaker
-
some scripting will help. recursively find writable files and directorys. g0tmilk has some nice examples on priv escilation http://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation.html?m=1
-
some scripting will help. recursively find writable files and directorys. g0tmilk has some nice examples on priv escilation http://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation.html?m=1
-
If your browser ask for http:/www'google'com and the server redirects you to https:/www'google'com
Sslstrip will prevent the redirect from happening
-
I think you should start with something extremely simple autoit programing is superfun and great for first place to start programming little things
after a few weeks of autoit then try ruby pearl or Python
-
Proxychains nmap -sP www google com
Proxychains conf needs a proxy list
Tits!
-
I see the scanners floating around... does any one have a eexample of this exploit reading data ?
I guess you can read data from running Services... can you pull a process list? Can you read local files?
-
so I have been running test all day... your wifi router running ddwrt and iptables script above you can easly send traffic to kali...
sslstrip is only effective when a client request htttp://face-book
If the client request htttps://face-book then ssltrip will miss this request
if you try sslstrip on android applications like facebook gmail yahoo twitter. you will notice some red flags with the certificates... fb was blood red!
So... I found sslsniff and sslsplit... these tools seem to be the key to success...
But I get segment faults when I test these tools...
-
So above script will forward http traffic to kali running burpsuit on port 666...
Seems to work just fine... I would like to put sslstrip in front of the proxy...
Any ideas for how kali could configure iptables o place sslstrip in the mix
-
nc 192.168.69.1 23
logged into root on ddwrt and iptables is acceptable command
here is a basic example
PROXY_IP=192.168.69.103 PROXY_PORT=666 LAN_IP=`nvram get lan_ipaddr` LAN_NET=$LAN_IP/`nvram get lan_netmask` iptables -t nat -A PREROUTING -i br0 -s $LAN_NET -d $LAN_NET -p tcp --dport 80 -j ACCEPT iptables -t nat -A PREROUTING -i br0 -s ! $PROXY_IP -p tcp --dport 80 -j DNAT --to $PROXY_IP:$PROXY_PORT iptables -t nat -I POSTROUTING -o br0 -s $LAN_NET -d $PROXY_IP -p tcp -j SNAT --to $LAN_IP iptables -I FORWARD -i br0 -o br0 -s $LAN_NET -d $PROXY_IP -p tcp --dport $PROXY_PORT -j ACCEPT
-
I have been ssearching online for 'ddwrt iptables proxy'
I have found some nice example scripts...
I'm looking for help with iptables... maybe there is a skilled iptables guru that is actave here...
I figured I will use burpsuit for a quick proxy
Proxy ip 192.168.69.103:666
ddwrt ip 192.168.69.1/255.255.255.0
-
So, i have configured airbase-ng and iptables... i have my client connected to this fake ap...
the torrent traffic from the client(droid phone) will pass threw with know problem, but when the droid phone tries to establish any http connection it fails...
is this new security from android OS ?
-
I'm in the process of rebuilding repeater with a wrt54g v8... this version does not have detachable antennas... so I'm do for a mod...
Can I use a biquad directional to establish a source connection and then use a 9dbi omni directional for broadcasting in my home a open wifi?
This was my old setup and I just read that you want identical antennas installed... ill share clean instructions when im done...
Quadrifilar antenna for Wifi?
in Questions
Posted
the best results I have found is a driven biquad with a parabolic dish... like a magnified glass can focus a beam of light, a dish can focus this beam for miles...
With some instructions on home built parabolic curve, you could accomplish something compact...
If you do attempt a build plz share resaults and instructions