Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - ram1r3z0

Pages: [1] 2
1
Found it on the Webs / Re: VPN Pivot!
« on: February 29, 2016, 08:38:41 pm »
Do you know something like that for Windows environments ?
Windows client and server

Thank you

2
Great tool thank you.
After py2exe it run also under Windows

3
Found it on the Webs / SQL server exploitation without a password
« on: February 07, 2016, 12:02:58 pm »
Very useful tutorial, how to exploit MS SQL server by MITM changing payloads of packets

https://blog.anitian.com/hacking-microsoft-sql-server-without-a-password/

4
Great share.
But the link is not corrcet, it says 404 not found.

this link work :https://github.com/bhrigu123/classifier

5
Found it on the Webs / Re: Command & Conquer: The First Decade
« on: January 19, 2016, 08:51:44 pm »
Great share bro :)

6
Tutorials / Re: Ettercap MITM
« on: November 01, 2015, 02:55:30 pm »
Yes and know ... ssl strip attack can work in some environments  .


For example : this tool can be used

https://github.com/byt3bl33d3r/MITMf

7
Reverse Engineering / Re: Finding encryption algorithm
« on: November 01, 2015, 02:50:50 pm »
Reply: Finding encrypption algorithm from only two ciphertext is not possible.

You can "guess" by see the length but it can send you wrong way.


I would take rather another approach ... to  look from where it is and try to determine which algorith the system uses,

8
Hacking and Security / Re: Fuzzer tool http/https anyone?
« on: November 01, 2015, 02:48:37 pm »
I recommend

http://www.edge-security.com/wfuzz.php

I have very good results with it ... .very convinient usage in another scripts.

9
Found it on the Webs / Re: youtube-dl - A Command Line YouTube Downloader
« on: November 01, 2015, 02:46:51 pm »
Great tool,

I have tested it and it can be very ghood used as a external program in scripts.

10
Beginner's Corner / Re: What to look for in a nmap scan ?
« on: October 07, 2015, 09:34:39 pm »
It depends what you are looking.
The start
nmap -sV -O target
is good one

11
I do not know. .... I think i2p is bether because it chooses nodes randomly

13
Found it on the Webs / Re: Invoke-BypassUAC
« on: October 02, 2015, 11:24:23 am »

14
Star trek teleportation is not available , but it is the step to good direction

Pages: [1] 2