Jump to content

TheKingUnderTheHill

Active Members
  • Posts

    57
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by TheKingUnderTheHill

  1. I'm currently doing a programming assignment for uni (using some progranimate rubbish) and I know this is probably the noobiest question ever, but im not used to using java so, how do I run a .jar file? If I double-click it, timer appears then nothing happens, is there something im missing?
  2. Ah, I get it now, was just wondering how they had it set up (was hardly going to go ask) i'll set up a little VM Lab to test it all on, although from a theoretical point of view (eg. pentesting a corporate network set up the same way) how would an attacker go about intercepting the traffic?
  3. I'm currently studying a computer security course at university, we basically have to write a report on a subject we choose, I've chosen Packet Sniffing, the issue is that we get to use the Admin Computer Lab for about an hour a week, no way near enough time to get anything productive done. So I tried gathering some information using Wireshark and I only seem to get my own traffic, which isnt very useful, I've tried other tools and they all have the same problem, does anyone have a fix? Cheers.
  4. Yup, trying to exploit my own Windows 7 box, also, you sure it wouldnt work with the firewall up? makes metaspoit seem kinda redundant if windows firewall stops it
  5. Right, so I've got backtrack inside VMWare, but I'm wondering if it would be possible to try out exploits from within Metasploit on the host machine (Windows 7)? I run an Nmap scan on every possible IP and it returns nothing, pretty sure its something stupid I'm missing, but cant quite figure out what...
  6. Was looking to do data recovery, and bypassing windows passwords and the like, some distro's would aslo be nice though
  7. Right so I saw an offer on DVD's down a shop near me, 10 blank DVD's for £2. Pretty good? Anyways, I'm looking for tools to fill them up with, was wondering if you could tell me some that you find particularly useful and which ones would be good! Yes, I have used google, but to be honest I trust you guys way more than any of the reviews on websites and know you'll come up with some gems google is probably hiding from me! Cheers in advance! :)
  8. Derp, dont know why I didnt think of that! Thanks once again digininja! And thats what im here for Sebkinne, a n00b to laugh at ;) aha On that note, does anyone know where to get a Windows XP/7 image to work with VMWare?
  9. Nope, still not working... Hmm, this really has me puzzled, can usually figure out the problem from the message <_<
  10. Guys, ive been trying to install Metasploit, but apparently it wont install because a child has been killed, I havent killed any children, please help! Aha, only kidding guys, but help with this error would be greatly appreciated!
  11. Awesome, really loving the responses guys, thanks! Also, how similar would you say Ruby and Python are to Java or Basic? Would it be easy to pick up the other languages, or will I just carry across bad habits?
  12. Brilliant! Thanks digininja! Sorry if I seem like im asking too many questions aha!
  13. Aha, yeah, Im viewing some of the ones google threw up now, was just wondering if anyone on here had any specific tutorials that they know concentrate on the key points and dont faff about with stuff, thanks though
  14. Attacking WPA, and ahh that makes sense! So i'd just get a large .pcap file, then use Aircrack-ng on it, and it might still work? Awesome. Also, in Gerix it says about all these different attacks, would it be possible to explain or point me somewhere that explains the 'fragmentation' and 'packet injection' attacks? Cheers man!
  15. Ah fair enough, figured it was a bit of a pipedream haha, thanks anyways!
  16. Ah, not sure its any of those things, trying it on my own box and I see it lose the connection, then re-establish it, im literally ten feet from the router and machine. @Redhook Thought so, thanks!
  17. Ah, didnt know that, is there a general length where they begin to lose their effectiveness?
  18. Awesome, thanks! I got all of that cheers! However, how would I set it so that it goes to example.dyndns.com, do I just enter that instead of the IP when setting up?
  19. Hey guys, been looking at getting one of these for a project im working on, but was wondering if anyone knew if BT would run on one of these? Cheers
  20. Bought a netbook from a second hand shop, all of the standard data had been removed, but literally booted up Cain (I know, right?!) and got passwords for pretty much everything, went into the hotmail just out of curiosity, and there were e-mails to everything needed for her wedding, which was in a few days... Didn't do it, but the black-hat in me was tempted to message all the services the day before the wedding, cancelling it. Good thing on her part that im not a total asshole. :)
  21. I've been wondering about this as well, if i tell it to connect back to my external IP (eg. 10.41.23.213) and its dynamic, doesnt that mean once the IP changes I will no longer have the connection? If so, is there a way around this? Cheers!
  22. Another direction you could go in might be to use Rainbow Tables, if you havent already tried them? You can either download them, or use the winrtgen tool that comes with Cain and Abel (inb4 Skiddie)
  23. Metasploit can be used quite effectively in the real world, it simply depends on who the attacker is, one of the biggest aspects of it is Social Engineering, if the playing field doesnt work in your favour, then chance the targets perspective anyone can be tricked into allowing an exploit into their system, its just that idiots are fooled easier than most. I know many Skiddies who use rubbish VB GUI tools and trial versions of software, yet still get the results they want, a good social engineer will be able to get an exploit anywhere. As a great man once said "You cant get a System Patch for Stupidity" ;)
  24. Hey guys, been playing about in BT5 with WEP/WPA cracking and I've managed to get a few keys, but my success rate is only about 40% Im sure it should be more if I'm following all the steps correctly. I'll start the card in monitor mode, then airodump the packets, I can see all this fine, but when I attempt to deauth the client they just refuse to deauth, or when the test machine does, it doesnt pick up the handshake when they re-connect. I was also wondering about the Gerix GUI cracker that comes with BT, is it any good? Cheers in advance!
  25. Thanks for the help, really appreciated! Unfortunately the second link is invalid, cant believe I didnt think to use a VM before!
×
×
  • Create New...