Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - IpLayer

Pages: [1]
1
Hacking and Security / Some Clues
« on: November 09, 2013, 06:47:49 am »
I was should say RTFM.. :o
But here's some Clues..









And the Third one is that the Ports some times are closed and sometimes are open..


But any one Gave me any Clues? ???
By the way Thanks for Closing my Thread.. "the Soab"
AS some MF say : )

2
Hacking and Security / Re: Hacking on lan.
« on: November 03, 2013, 02:29:49 pm »
Thanks too ;D
Ok it's Over my head..
But can i find someone it's not over his head ?(then he will find a way in and manage this instantly)i Think.
and again i mean that skype is who using the Ports as nmap scan apparently shows..
and the service or Program who's running in the Port is the Important ,Right?
I mean in I'm ready ..that you ask me to run some commands ,And I'll tell you the Results,Not from my Experience.
Finally,Ok sorry my stupid Question,But you don't have to be so Polite ;)

LOL autopwn.
Also why are you attacking skype? that'll never work... try thinking out of the box.
His computer run windows and has netbios enabled... RTFM bro.
P.S the netbios method didn't Work cause he have a firewall and he turned off network discovery..and i can't see him in network..even i can't Ping his device..
Plus he don't share anything and there's no <20> value
and as you can see Port 139 isn't Open.
only IP scanner detect him.

Staff note: Try not to double post, there is a modify button. Use it.
 

3
Hacking and Security / Re: Hacking on lan.
« on: November 03, 2013, 01:53:57 pm »
Thanks 4 Great Welcoming.It's appreciated.
First i didn't say that i gonna hack Skype,I meant the Only 2 open Ports in his system ,
is 80 and 443,and this is skype Ports..
I don't need Open Ports ?
second,im not a Hacker I would like to learn to be one,but now i need Quick solution ,to hack this certain Device..
So if you can be So Generous ,Please Help me out ,and give me an Clues or Good link..
If you want me to Gain information ,Im ready..


4
Hacking and Security / Hacking on lan.
« on: November 02, 2013, 09:37:49 pm »
HI, I've Cracked some AP ,and I want to Access the Victim Pc..
So I tried metasploit ..and Preformed an nmap scan..
Code: [Select]
msf > nmap -sV -T4 -A -v -Pn 192.168.1.2
[*] exec: nmap -sV -T4 -A -v -Pn 192.168.1.2

Starting Nmap 6.40 ( [url=http://nmap.org]http://nmap.org[/url] ) at 2013-11-02 21:00  Standard Time
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating ARP Ping Scan at 21:00
Scanning 192.168.1.2 [1 port]
Completed ARP Ping Scan at 21:00, 0.53s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 21:00
Completed Parallel DNS resolution of 1 host. at 21:00, 0.00s elapsed
Initiating SYN Stealth Scan at 21:00
Scanning Ghazal-PC.Home (192.168.1.2) [1000 ports]
Discovered open port 443/tcp on 192.168.1.2
Discovered open port 80/tcp on 192.168.1.2
Completed SYN Stealth Scan at 21:00, 4.90s elapsed (1000 total ports)
Initiating Service scan at 21:00
Scanning 2 services on Ghazal-PC.Home (192.168.1.2)
Service scan Timing: About 50.00% done; ETC: 21:03 (0:01:44 remaining)
Completed Service scan at 21:02, 106.87s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against Ghazal-PC.Home (192.168.1.2)
NSE: Script scanning 192.168.1.2.
Initiating NSE at 21:02
Completed NSE at 21:02, 20.30s elapsed
Nmap scan report for Ghazal-PC.Home (192.168.1.2)
Host is up (0.0069s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE VERSION
80/tcp  open  http?
|_http-title: Site doesn't have a title.
443/tcp open  skype2  Skype
|_http-title: Site doesn't have a title.
1 service unrecognized despite returning data. If you know the service/version,
please submit the following fingerprint at [url=http://www.insecure.org/cgi-bin/servicefp-submit.cgi]http://www.insecure.org/cgi-bin/servicefp-submit.cgi[/url] :
SF-Port80-TCP:V=6.40%I=7%D=11/2%Time=52754BC6%P=i686-pc-windows-windows%r(
SF:GetRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions
SF:,3B,"\xc4\x9f\x0boo\xb1I\xf0}\xf7\x10\xb5zIg\xc2\xc4\x86\xf5\xa5\|\x88~
SF:\xda\x166\x05b\xc7\xd7\xdeu\x8d\|d_\xfd\xe2\xc1&\xec\xafW\x89\xba\xf9%I
SF:\xc6\xff\xa4\xc52{\xf0\xa1\^\xb7\xfc")%r(RTSPRequest,5F,"Y\x9c\xc5\xbc\
SF:xf6\xc8\xe60\xeecT\xf8\xd8\x86>\xad\xa2SI\xe4\xd4\(\xbdV\xc2\x8a\xea\xa
SF:0\x88o}l\x9a\x89\x15\xbf\x9d\xf9p\xad\x8bUa\x05k\x9en\xc4\xeb\xa0\x91\x
SF:8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\
SF:x95\xc2\xcb\0q\xee\x07\x0c\r\xda\x03\xd8i\x86\xbfd\x85")%r(FourOhFourRe
SF:quest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,37,"\xc
SF:8q/\xdc\x16v\xe3\xe3Q\xb5k\xc2\xae\x06\xd3\x08\x0e\x8e-Z\x9fcs\xc3\xc5C
SF:z\xf8\x16\x14\xacNo\xa2\x88~\x1d}4=\xbd\$\xf7\xc9\xa9`NF\xc01\xae\xc7\x
SF:cc\xcd\x9a")%r(DNSVersionBindReq,69,"\x91\x8e~\x02\xa1N\xacn\.I\xe0%\xe
SF:e\x13\xc0\x8c/\xe7B\x83#\x9eS\x8e4\xe8\xf5\xf9\x9fu\xc9\xf6\xb1\[K\xc3\
SF:xc7\xb7~b\x84\xdb\x134c\xae\*\x1ff\x1fD\xe5\xd2\x9b\x90\xc1\xfe\xd7\x9c
SF:\]\xea\xd3h\xb9\x96\x8f\xf4\xd5\x02\x0b@\xb1\.GLM\x1aC\x18\xa9\xc6\xff\
SF:xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e")%
SF:r(DNSStatusRequest,30,"m\x15\xe6\xca\x91y>\xe8\xb2n\xe0G\x10\xd5C\xa8\x
SF:9d\xd0\)&\xc8\xc0\xc4\xecn\x13\x83UA\xfb\xc9c\xc92\xb4Tj\+MD\x01\x0ejzE
SF:VV\xdc")%r(SSLSessionReq,43,"\x1b\x8f\$\xe4\xc2\x8e2\xd3\x8b#\xbd\x16\x
SF:86\xb9\xbbA\xbbBc\x8aOh\xc6\x8eC\xf7\xf5\x85\$;\x06M\x89'\x12t\x9e0c0\x
SF:cc\x1a\xea\xdf{G\xfa\xd8\xb8\xc9f\x1fD\xe5\xd2\x9b\x90\xc1\xfe\x8d\xec\
SF:xd6\xd8\x90\xd8\xf4-")%r(Kerberos,6C,"Z\x15\x02\x0f6\xcf\.\$8r\xacs\x01
SF:z\xffE>\xb7SsIuO\xe1\x14\x01\xe2Lk\xc3\xe3Y\$\xf3\xa14uT-\x90\x20\xdaE;
SF:z\xd3e\xc8\xa1\^\xb7\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-
SF:z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\
SF:xcb\0q\xee\x07\x0c\x1c\xaa\xc96\x94\xad\x9aB")%r(SMBProgNeg,5E,"\x8dz\+
SF:~L\x1c\x0e{\\'\xe3\x1fW\x88\^\$t\xd0\xc7\xd7-6\?\xcd\xfc\xbe\xf2`SX\x8d
SF:wa_\xa0\x18M>\xb6\xa7\xa8q\(r\xbf\xb0\xdac\xd8i\x86\xbfd\x85\xf2;\xb0a\
SF:x1ew\xbc\xfd\ns\x88Y\xb6/\x14u\"\xab`QN\xe7l\xed:\xe38I\xe6\x9f\xc4eR\x
SF:1b\x10A~W\x1c\xdd");
MAC Address: 02:08:E8:36:E7:C0 (Unknown)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Microsoft Windows 2008|7|Vista
OS CPE: cpe:/o:microsoft:windows_server_2008::beta3 cpe:/o:microsoft:windows_7::-:professional cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1
OS details: Microsoft Windows Server 2008 Beta 3, Microsoft Windows 7 Professional, Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7, Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008
Uptime guess: 0.544 days (since Sat Nov 02 07:58:25 2013)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=256 (Good luck!)
IP ID Sequence Generation: Incremental
TRACEROUTE
HOP RTT     ADDRESS
1   6.87 ms Ghazal-PC.Home (192.168.1.2)
NSE: Script Post-scanning.
Read data files from: D:\metasploit\nmap
OS and Service detection performed. Please report any incorrect results at [url=http://nmap.org/submit/]http://nmap.org/submit/[/url] .
Nmap done: 1 IP address (1 host up) scanned in 143.88 seconds
           Raw packets sent: 2044 (92.488KB) | Rcvd: 16 (780B)

Is the only Exploit in his System is caused by Skype?
What is the Next Step i Should Do(Since the autopwn was removed)?and How to take Advantage of this 2 opened Ports?
Thanks.

Staff note: [ code ] your stuff.

Pages: [1]