Jump to content

joey-world

Active Members
  • Posts

    52
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by joey-world

  1. Here is the deal I was testing what would happen if someone was able to get into one of the regular user accounts through ssh on a "server" in fedora. To make the test more realisticly I created an apache server, with php, sqlite, ssh server, ftp server, and so on. I was able to exploit the ssh server. I am in a low privileged user and all I have is a shell. How can I continue forward with the attack since I am a regular user? maybe there is something I can upload to the ftp and come back with an escalated shell? Thank you Best regards
  2. halfway into being able to route the traffic, I got already two interfaces up and running, and still able to access the internet
  3. I once tried to use fedora on my laptop, and for some reason it gave me problems. Another time I had a class on fedora, and it was giving problems to everyone in the vmware. Now I have fedora again in another class, and is giving me problems, so that is why I hate fedora.
  4. Okay, so following previous training I had I decided to do the following to try to get around the problem... I installed in the vmware a second interface, one will be connecting to the internet the second one will be a subnet. After this, in theory it would be a matter of routing the traffic from the subnet to the one connected to the internet. I am having a little struggle with it but it should work
  5. I need the internet to install the packages like, SNORT, apache, dhcp, DNS, updates, SSH, File server, and test it after worth that indeed it works. That sounds like a viable solution, it might need testing as you said, because the dhcp may kick in the one connected to the wireless. I think I'll try that, nothing to loose right? n.n I think I mentioned it. I would rather ubuntu, but the teacher wants STRICLY fedora, which I hate. If I was using ubuntu, I honestly wouldn't be asking here how to do it, because I already know ubuntu :P
  6. Thank you for your prompt reply. I never like to disclose personal information but ah WTH, I am attending to ITT Technical Institute as well, let's just keep the rest secret :P The reason why the question came up in the first place, is because unlike your associates, for some reason they didn't teach us fedora back then that well besides permissions and file handling, nothing of systems administration. I am very versatile with ubuntu, but fedora I don't like it to begin with haha. Now, If I set up the DHCP and set the vmware to host only, that would solve indeed the problem of the DHCP interfering with the local Wifi, but that also will unable me to connect to the internet in the vmware, which is something I need. Do you have any other solution, or is there another way to set the vmware in Host only and still being able to connect to the internet? Thank you for further assistance
  7. Hello friends Long time I didn't come by so I figure to stop by to get some help figuring out some questions in regards Fedora 20. The reason why I am initially doing this is because is part of a project for the school and that is the operative system the teacher decided for us to use for the project. So I downloaded the iso, loaded it into a vmware everything cool. The project goes as follows; -Install VMware == done -Install Fedora latest version (20 desktop) === done -Install DHCP to use as a server (odd) == done, needs configuring -Install DNS server to use as a name resolution in the network (odd) -install Apache -create a small website to proof the concept of apache -install SSH -install FTP -install Snort (Wow) so with this in mind comes my first question to you guys 1 Question I wanted to clarify in the forum if all those roles, and tasks can be done in fedora desktop instead of using a linux server? 2 question Now, while installing the DHCP role in the fedora, I ran into a redundancy problem. My laptop is running ubuntu. Is connected to "home" wireless which is my home, managed by a router with DHCP. I could technically tell the router to stop leasing IP and shutdown the DHCP role in the router, for the Fedora role to take over. I don't want to do it because my wife and kids would kill me LOL So I thought, I could just do a subnet. Ah brillian idea, problem is how would I go ahead and do that? (I am as good as a monkey with fedora) how would I have to set up the network in the vmware to do the subnet and still have access to the internet in fedora so I can install the packages and all that good stuff? I am assuming it has to do with IPTABLES in ubuntu and fedora, I am not totally sure how though. Thank you so much for your answers.
  8. Ok, I know this question is an old one. I know that c++, c, c#, python, and bla bla bla programming languages. My real problem is, not so much the coding part of it. But let's say I'm a programmer already, but If I don't know how exactly crypters work, or I haven't seen an example code of one, I won't even know where to start. This is precisely where I need your help. I need a full code of an example crypter working. No it doesn't have to be FUD. I just want to know how the process of the code should run, so I can then make my own. I've been looking online, but the only think I find online is charts of how the process is made, but not the actuall code of the crypter. Thank you. Best Regards
  9. That payload is to only open a port on the system you want to get in. You send that file to the Windows xp machine, in this case, and then you run it locally (inside of the windows xp machine) After that, scan the machine with nmap, you'll see that there will be a new port opened on the windows XP machine. That port will now be accepting a remote session from your metasploid, that you will have to manually activate. That's pretty much what it does. Best Regards
  10. 1.- Try the actual full url AFTER you wrote in your browser www.hotmail.com, the url to copy now would become... https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1374105749&rver=6.1.6206.0&wp=MBI_SSL_SHARED&wreply=https:%2F%2Fmail.live.com%2Fdefault.aspx&lc=1033&id=64855&mkt=en-us&cbcxt=mai 2.- Notice that if you try facebook.com, the login is different from the actual login page with SET. for example when you write facebook.com in your browser you get the login at the top, but if you use SET you get the login on the middle. I think, I THINK... is because java scripts, cookies and all that stuff that SET won't be able to copy. What that in mind, is not surprise that you can't copy hotmail directly. Best Regards
  11. At some point you'll have to learn how to create your own crypter on your own any how. I will suggest you to stop relying on someone else work, and get on the computer and start to coding on your own. Because like you said, there's no FUD meterpreter for now, and guess what? as soon as there is, it will get flagged. You know why? because AV developers get paid for that. You honestly think, for even a second, that they don't check on the latest updates for well-known software of the likes of Metasploid? As soon as someone uploads a FUD, it will go straight to the lab of some AV product, BUT if you make your own, you will only know how to do it and how to get rid of it.
  12. No problem my friend, Welcome to the Security world. Once you learn the basics, questions will start arising from your mind by themselves such as "Okay, I know what a virus is... but how does it work? how can I stop it? is a virus capable of doing this or that?" so further. But for this questions to be automated you need to fully understand the basics. Like I said, study that, and we'll address you to the next steps. Good luck
  13. Okay let's see. I'm going to tell you what other people will tell you in this forum and many many others. SAINT GOOGLE. It never get's old, and it contains any information you may be looking for. I will recommend topics such as, but not limited to: IP networking Networking Protocols Ports Firewalls NAT Security Products What is a virus? What is a worm? What is a trojan horse? What is a rootkit? What is a spyware? What is a malware? What is a keylogger? and be EXTREMELY curious (sorry for the capitals, but I just can't stress enough this requirement ) Yes the topics are extremely simple and basic, but like my martial arts teacher said, "without a proper root, the three would fall" Never get tired of asking questions, let me quote once again, this time my teacher of computers "I rather look stupid and ask questions, than be a stupid with a question" After you learn those topics better than you know yourself, come back for more topics. (this topics should give you enough to study for a couple of months if you really look in deep on each topic) If you have a particular question in regards to security, don't hesitate to contact me. No I'm not the best, not even close. But I have been doing research of security related stuff for like 7 years. So I do know where to find the answers. I'm currently enrolled on my bachelors program of Information technology and cyber security. I'm a network systems administrator already. Best regars
  14. I think I got it, let me know guys if I'm wrong. If I'm right I propose this threat to be edited and pinned because I've seen a lot of people having problems with this and no direct or working answer, I already look everywhere on this forum, internet, I memorized the Guide for the pineapple, and the answer is nowhere to be found, which kind of sucks. You have to ssh to the pineapple; on windows can be with a program like Putty. Once you are in you need to move to the root directory cd in pineapple cd in logs and ls to show the logs you find the one you want to take a look at and then you cat to whatever log you want to look. The commands would look like this cd / cd /pineapple/log/ ls /------look for the log you want-------/ cat "log you want to look".log Am I right?
  15. I have no clue why he is doing it, but If he needs help I'll just answer his question and that's it LOL
  16. Ok, I'll take your advice Just like you said, Karma tracks clients that want to connect. I'm stating that there should be a module (or infusion) for the pineapple that tracks clients trying to connect to the Home AP and whitelist the ones that are ok or "accepted" and the ones that are trying to connect that are not in the whitelist, should go connected to Karma for protection of your home AP. Better? I will definitely will look into Kismet, but the idea was to be implemented in the Pineapple
  17. I'm apparently new to the pineapple and I can't read the logs on the urlsnarf and sslstrip I have the application installed on 2.8.1 to the usb help and thank you
  18. Ok here is the thing. We know how to use karma for Penetration testing and why not. Suddenly I got the idea of using Karma to check on the MAC addresses that were trying to reach my Home internet connection, such as cellphones, laptops, tablets and why not. I don't know about you guys, but I know what MAC addresses are mine and which ones are not. So I though It would be a pretty good Idea a Karma module to verify that there's nobody out there trying to do some Wireless hacking on your internet connection or already connected to your wireless connection, or something like that (being the last one kind of pointless since you can go manually to check on your internet gateway who is connected or not.) After that I continued dreaming, and I though it could be possible to actually make Karma an actual Wireless Honeypot. Were white-listed MAC addresses are allowed into your SSID, and unrecognized MAC addresses trying to reach your SSID are automatically added directly to Karma in the Pineapple. Allowing you to do some type of warning "Stay out of my wireless" What you guys think? is it possible to do so with the current Karma? or Does it needs to be written from 0 a module like that? Cheers and beers
  19. I am so sorry for reposting then. I did try though to look for the answer before posting, but did not find it. Thank you for your reply though.
  20. I know it looks like a ridiculous question but I'm really careful with my devices, and I feel something everytime that I just unplug the power cable. So I was wondering if there was any way to shutdown the pineapple without possibly damaging anything on the process?
  21. I've never use Cain but, here is the range of the pineapple in a regular setup like ICS 172.16.42.0/24 That is: 172.16.42.0 = network address 255.255.255.0 = 24 = subnet mask = address range This should give you results. Let me know if anything doesn't work
  22. My spanish is excellent, If you guys need help just let me know n.n
  23. You know what would be funny guys? Something like a prank for the friends or in an actual penetration test. To setup the pineapple to get all the devices around to connect with it, and when they try to browse a web page; Let's say; they go to their web browser and try something like www.google.com and the pineapple will reply with something like... are you searching for www.youtube.com? why not instead we do this? and re-route the link to this link http://www.lmgtfy.com/?q=pineapple+by+hak5 So it will appear in the browser like this; "Are you looking for www.youtube.com? Why not instead you learn how you got hacked?" Redirect; http://www.lmgtfy.com/?q=pineapple+by+hak5 That would be awesome LMAO
  24. The Solution is always the police (or authorities) period. Never try to "hack" the thief or things of that sense, otherwise you will become also a criminal. I'm glad to hear that the situation got resolved though, let's drink some beers on your behalf n.n Best Regards
  25. That's it!!! I am confusing Java with Javascript I definitely committed a n00b mistake, Thank you for the clarification!!! :)
×
×
  • Create New...