Jump to content

digininja

Global Moderators
  • Posts

    4,005
  • Joined

  • Last visited

  • Days Won

    210

Everything posted by digininja

  1. digininja

    42.zip bomb

    extract a single file
  2. digininja

    42.zip bomb

    The easiest way would be to grab a copy of 42.zip and have a look how it is made: http://www.unforgettable.dk/
  3. That will probably just be a problem with NAT or open ports. Do some research, it's well documented.
  4. There is no difference in exploiting a box based on its location, the difference is in post exploitation as you might not have direct access between the boxes. You can stimulate this locally with virtual machines, no need to use internet based hosts.
  5. Not everything can be compromised, unless you've installed a deliberately vulnerable versions of software or deliberately configured them with weaknesses. If you have, then get them off the internet now otherwise someone else will compromise them and you'll lose your box. Why are you wanting to attack something over the internet? What are you trying to achieve with it? Attacking a service is the same regardless of whether it is local or remote and you can very easily build a VM environment to simulate a remote network if you really want to.
  6. That has absolutely nothing to do with the original question which was about failure to correctly check authenticated. I would disagree with them even if we were talking about input validation.
  7. What are you talking about? No one mentioned quotes and what is rule 3?
  8. The weirdest one like that I've seen was you could put a . in front of the domain name the requests bypassed authentication, ie https://.hak5.org would bypass things, https://hak5.org would get restricted. Didn't work with any other messing with the host or domain so I suspect a slightly broken regular expression somewhere but could never prove it.
  9. Sounds like they've just messed up their vhost configuration and the authentication is only checking on the site.com vhost but the server returns the same content regardless of whatever vhost is requested.
  10. If you are asking "should I use tools from Github" then yes, that is what most of us do.
  11. I only just the pro version which can install as root or normal user and let's either install extensions. Spend the cash, it's worth it.
  12. I'll bet you installed burp as root but are now logged in as a normal user who isn't able to write to that directory.
  13. Have you tried these? https://sourceforge.net/p/ophcrack/wiki/Frequently Asked Questions/#how-to-use-more-tables-with-the-livecd https://www.top-password.com/blog/ophcrack-no-tables-found-how-to-install/
  14. It is very unlikely but if you timed it just right, and caught the owner of a small firm on the right day with the right mix of sob story and enthusiasm, then you might get lucky. What would be more likely for him, if he tried, he might get an interview or two and during them realise how much he didn't know and then reevaluate his choices. When I do recruitment for junior positions, I look for enthusiasm and background in relevant areas. Stuff like blogs, helping with conferences, CTFs and participating in hackerspaces.
  15. Had a mail this weekend from a guy who hasn't any previous IT experience who was planning to set up as a freelance tester, he wanted my opinion on a few things. My first opinion was not to do it. There is no way to go from nothing to tester successfully. I tried to explain one mistake could be very costly, he said it was ok, he would only be testing for small firms. For their sakes, if he goes through it it, I really hope he never gets any clients. What I recommended was getting a full time job with a testing company for at least a couple of years first to get some experience. He had he had his Comptia certificate and that would be enough.
  16. One of the most annoying things I see regularly is people asking for support on DVWA but refusing to put effort into understanding the underlying OS. All they want to do is focus on the"fun" web app vulnerabilities rather than learning about the entire ecosystem which pays off a lot more in the end.
  17. I had a bad reaction to Backtrack 3 that put me off relying on anyone else packaging tools that I rely on. Things are a lot better now and Kali has come a long way since then but at that point I made the decision to roll my own and have been doing it ever since.
  18. A change I'd suggest to this is to use a different distro and install your own tools. To many people rely on Kali and have no idea how to install a tool from source, debug dependencies and keep it up to date. If you take ownership of the tools you are using you'll understand them a lot better and you get the bonus of additional Linux admin skills.
  19. You aren't going to get any meaningful experience or do a good job for clients if you go out on your own straight away. You need to work with someone who knows their stuff to pick up the real world stuff. I'd say you need at least a couple of years working with others before trying to do anything on your own. The type of company is up to you, someone big like NCC would probably have a graduate, new starter training program that would get you up to speed quickly but would also be fairly generic or a smaller boutique firm which would get you more hands on with skilled testers but probably a little less breadth.
  20. If you are going to use an online one, go with a bigger brand such as Lastpass. I prefer offline Keepass as I have full control over it then.
  21. digininja

    Wireshark

    From the screenshot and what he said it looks like a pcap that he has been given to analyse not a live capture.
  22. digininja

    Wireshark

    If I'd set this as homework (I do teach university classes occasionally) then I'd expect you to write up all the different possibilities. You've mentioned that there are many reasons, write about them all and once you've done that, go through them and speculate on which ones you think could be happening here and which are unlikely. That way, you are showing that you've done the research that you were asked for and showing that you can reason through different options to pick the most appropriate.
  23. digininja

    Wireshark

    Do you understand what the RST flag means and is used for? If not, do some research on that, that might help.
  24. digininja

    Wireshark

    Sounds like you are asking us to do your homework for you.
×
×
  • Create New...