Paralys Posted January 5, 2007 Share Posted January 5, 2007 Well, I don't mean to sound like a skiddie, and this will. But I have a few questions. Nor do I intend to use these tools for anything malicious, only very curious as to how they work and how secure they actually are. Well here we go (flame away if you find it n00bish, and yeah, I read the documentation for all this stuff too so RTFM wont help lol) I've been trying to learn more programming and hacking by using my own knowledge not skiddie tools. Though after this long, I've decided even though theyre sorta n00bish, I at least should understand how to use them. 1.) When I'm running Cain and Abel, it has a choice for IP Spoofing, I assume I can put a proxy server in here, if I'm incorrect someone please explain how IP Spoofing works. 2.) When I tried scanning my own home network with Cain and Abel, I get an error message and the program closes itself when I try to read the packets that it's caught. It's the whole "process has preformed an illegal action and needs to close" spill. 3.) If I ran a packet sniffer on a network what data would it give away that could be traced back to me. (once again, I only wish to know how to do this because how the programs work interest me greatly.) 4.) Where can I get more wordlists for Brutus (I realize that brute forcing is a last resort, extremely obvious option.) 5.) When I'm using a proxy on the net, does it keep logs of my actions, and also, am I tracable if I'm on a proxy? Could someone teach me how to trace myself when I'm behind a proxy? 6.) And finally, if I disconnect from a proxy, am I still tracable? Please don't flame, I've not really bothered working with these tools until now, and I'm having a small amount of trouble understanding them. Thanks everyone. Have a nice '07. Paralys Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.