Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - @R7un

Pages: [1]
1
then whats the point of such service if the recipient won't be able to see until he checks Spamboxes which most likely won't happen....

2
but the mail goes to spam folder, tried both https://emkei.cz/ and http://www.webwizny.com/sendemail.php, both sends email to spam..
any other way to make it legitimate?(my conscience says no, fingers crossed!)

3
is there a site that offers the service of sending emails to any person without registering (like mailinator.com but it receives, rather i want to send)...

4
Hacking and Security / Re: Real World Scenario
« on: August 28, 2014, 08:15:13 pm »
thanks man you helped me find the path... :D

5
Hacking and Security / Re: Real World Scenario
« on: August 25, 2014, 08:10:41 pm »
so from where would you have started lets say the server is [redacted] what scans would you ahve performed and how you would have proceeded?? I'm a noob right now..forgive me for my mistakes...

6
Hacking and Security / Re: Real World Scenario
« on: August 25, 2014, 07:53:53 pm »
i did some research:
it runs windows NT (after ftp grabbing)
server windows IIS/7.0- no vulnerability found..
runs Microsoft FTP  ver-7.0
 running throgh nessus as well as openvas
what more can i do??

also i want to try default password on ftp, but i'm unable to find default password and username of Microsoft IIS 7.0??

Staff note: I can see you can use the modify button, then why the fuck did you doublepost nigga?

7
Hacking and Security / Real World Scenario
« on: August 25, 2014, 05:37:49 pm »
So i am testing against my own server:
NMAP(output)

PORT     STATE SERVICE
21/tcp   open  ftp
25/tcp   open  smtp
80/tcp   open  http
443/tcp  open  https
1248/tcp open  hermes
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows Vista|7|2008 (89%)
OS CPE: cpe:/o:microsoft:windows_vista::sp2 cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008
Aggressive OS guesses: Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008 (89%), Microsoft Windows Server 2008 R2 (89%)

SMTP grabbing:
SG2NW8SHG132.sin2.gdhosting.gdg Microsoft ESMTP MAIL Service, Version: 7.0.6002.18264



i would like to find the vulnerabilities as well as exploits or any other hack so that i can get a shell...

Pages: [1]