Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - b0whunter

Pages: [1] 2 3
1
Hacking and Security / Re: Linux RAT
« on: March 02, 2014, 11:47:49 pm »

Fucking forget the term "RAT" not only because it pisses me off but coz *nix is built this very principle.


Exactly!! damn its stings inside, i dont know why, but it does every time I hear/read RAT... geez even netcat can do the trick, but proxx is spot on.

2
Hacking and Security / Re: backtrack wicd bad passwords
« on: February 16, 2014, 04:38:47 pm »
try ditching the network managers and connect using the command line and see if that solves it.


ex:


ifconfig wlan0 up


iwconfig wlan0 essid [put essid to connect to] key [wireless key]


dhclient wlan0






4
Hacking and Security / Re: Get past group policy
« on: February 06, 2014, 12:38:59 am »
To reset the bios password on the laptop, try some passwords until it locks out (until you reboot) and spits some digits. Go to this website http://bios-pw.com and put that number in. Now you can get it to boot from a cd or usb. You can easiky delete or change the administrator password from a liveCD/USB.

5
Hacking and Security / Re: Get past group policy
« on: February 05, 2014, 10:47:23 pm »
I just noticed hes talking about a laptop lol

6
Hacking and Security / Re: Get past group policy
« on: February 05, 2014, 07:52:06 pm »
Well they also have things called passwords and yet... tampering with computers are probably actions that will get him expelled as well. He asked how, I just answered, hes the one facing consequences and he should be ready to answer for them too before doing any of this. So its possible but at your own risks

7
Hacking and Security / Re: Get past group policy
« on: February 05, 2014, 07:10:26 pm »
Wait for a school event where every classes are called to the gym or something and sneak out or wear a shirt with staff printed on the back or gather a bunch of friends to block the view. Gather info on the motherboard beforehand so you know exactly where the battery is located, it should only take a minute ;)  and it shoukd be fun lol oh and you'll be the coolest geek  8)

8
Hacking and Security / Re: Get past group policy
« on: February 05, 2014, 05:56:18 pm »
^^ what he said plus if theres a BIOS password, open up the pc box and remove the battery (looks like a big watch battery), that will reset it.

9
Tutorials / Re: Easy intro to (local) exploitation
« on: February 04, 2014, 04:55:42 pm »
32-bit does as well. The reason to disable security protection is to focus on the basics first.

10
Tutorials / Re: Easy intro to (local) exploitation
« on: February 04, 2014, 04:42:40 am »
The example was done on a 32-bit intel architecture and you are on a 64-bit version. eip is rip on 64-bit.


Also prior to attempting the example, issue the following command:
"echo 0 > /proc/sys/kernel/randomize_va_space"


Compile the vulnerable program with these flag also:
" gcc -fno-stack-protector -z execstack"


If you would rather follow the example like it is (in 32-bit environment) use this option also when compiling the vulnerable program :
"gcc -m32"

11
Hacking and Security / Re: 2014 Phishing (new Methods?)
« on: February 04, 2014, 02:19:33 am »
dead/boring  forum.


This forum is rather like an interactive library. There' new content, questions, discussions, etc. Most importantly, as you probably noticed, the irrelevant stuff gets thrown out.

12
Hacking and Security / Re: 2014 Phishing (new Methods?)
« on: January 30, 2014, 12:03:30 am »
SET is a great tool, copy a login page on the fly in conjunction with DNS spoofing, you dont need to send any email, just wait for them to type the url.

13
Check jack the ripper or hashcat's documentation... I think its a double sha1, but im not sure.

14
Hacking and Security / Re: List of Vulnerable Web apps
« on: January 26, 2014, 09:46:40 pm »
i was thinking in the lines of mass portscanning, finds open  ports, sends crafted packet, reads it and compares to see if vulnerable.

15
Tutorials / Re: Easy intro to (local) exploitation
« on: January 26, 2014, 07:05:28 pm »
You're welcome. Stack-based buffer overflow exploits are basic. If you clearly understand this simple example, you know the foundation of such exploits. Overwrite eip and control the flow of execution. The input can cone from the user locally, remotely, from an application; from a mp3 file to a player or a game server connection. Im writing some more on evading security measures but theres also a 2 more tutorials I wrote with more details that you can find on this board.

Pages: [1] 2 3