Jump to content

digininja

Global Moderators
  • Content Count

    3,697
  • Joined

  • Last visited

  • Days Won

    137

About digininja

  • Rank
    Hacker

Contact Methods

  • Website URL
    https://digi.ninja
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    Sheffield, UK
  • Interests
    Hacking, Coding, Climbing

Recent Profile Visitors

20,427 profile views
  1. Burn it all down, go live on a dessert Island as far from technology as you can, you are obviously cursed by the tech god's.
  2. Asking questions like this, you are asking to be scammed again.
  3. Looking at that, they don't have a second parameter on the upload command, just the file that they want to upload. Did you try that?
  4. It looks like the metasploit team have labelled your issue as a bug so if I were you I'd hang on till they work out a fix for it.
  5. Did you try googling for There are lots of results with sample code for doing it.
  6. At this point you've gone beyond what I can help with, I work at the web app layer, not all the way down here. Are you working in Windows 7? Try searching some of the other modules and try searching for something that you know exists like the XOR EAX,EAX in your last screenshot to see if you can find that. If you can't, then something is wrong with the search.
  7. I think so. I'm not a buffer overflow expert so may be wrong on it, but that is the way I read it. You need to make sure that you overflow the buffer, replace EIP with your address of choice, and then have enough room for your shell code.
  8. They initially sent 5050 bytes and hit the overflow. Then used the pattern to send 5040 bytes which found the overwrite of EIP at 2003 bytes in. If they had sent 2020 bytes or 6020, it wouldn't have mattered, the overflow of EIP was done at position 2003. I don't know why 5040-5060 was used, there is probably a good reason for it based on average length of shell code or the default size of the stack, something like that.
  9. wget does what you want wget -m <url>
  10. Just buy yourself a second access point and you can then configure that however you want.
  11. digininja

    MSI Laptop

    Looks like a BIOS password to me, I assume it is shown pretty much as soon as the machine is turned on. You could test this be trying to get into the BIOS settings by hitting whatever key it needs, usually F2, escape or sometimes delete. If it is that, and you've tried resetting the BIOS using whatever method the manufacturer says to use, then you might be out of luck. I'm not a hardware hacker so don't know of any other ways to reset it. Worst case, you can still pull the drive and access all your files by putting it in another machine. It does seem odd that this could hav
  12. digininja

    MSI Laptop

    Can you send a screenshot of the password screen? BIOS info isn't battery backed any more and some of the settings, like requiring a password, can't be cleared with a reset as they are designed to lock the machine down regardless of what happens to it.
×
×
  • Create New...