Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - bluephantom

Pages: [1]
1
Tutorials / Re: Linux Exploit Tutorials
« on: September 04, 2012, 06:39:16 am »
thx for great inf0  :o

2
Tutorials / Re: Basic Forensics with Wireshark
« on: September 04, 2012, 06:24:37 am »
nice share  ;D

3
Tutorials / Re: Linux Shell Scripting Tutorial
« on: May 08, 2012, 08:59:32 am »
good share  ;D

4
Hacking and Security / Re: Earn discovering bug and security issue
« on: April 20, 2012, 05:53:00 am »
LOL  ;D Yes I will do as you and m0rph said :) and yes I am a nice person  ;)

i think so  8)

5
Use Google or any other PDF search engine for searching EBooks.
 -> filetype:pdf intitle:Trojans
-> filetype:pdf allintitle:Trojans virus

 :D


the power of google  8)

6
Hacking and Security / Re: BT5 and wifi cards
« on: April 06, 2012, 05:18:31 pm »
So you're saying you have a realtek? Do you have to get an Alfa card in order for backtrack to work?

i mean no, in my case my wlan card is detected but can`t be used. so i use the "wicd-client" syntax to my terminal to connecting wifi.

7
i usually use this command to observe the web server  :P may be it`s suit to you.


8
Metasploit doesn't use bash or batch. They have their own command line which is _similar_ to Bash and it's written in Ruby, so you cannot choose how to operate MSF and you have to use what is supplied.

nice explanation  :o

9
Hacking and Security / Re: BT5 and wifi cards
« on: April 06, 2012, 08:03:12 am »
i have the same problem on BackTrack 5 RC 1, but i use "wicd-client" to solve it. you can try  ;D

10
Hacking and Security / Re: Found CMS exploit.. Now what?
« on: March 06, 2012, 09:02:54 pm »
upload a asp shell...

yeah i think so  8)

11
Hacking and Security / Metasploit Megaprimer Video Series
« on: December 16, 2011, 05:01:33 pm »
Video Series Link (Original source)
 
 1. Metasploit Megaprimer Part 1 (Exploitation Basics and need for Metasploit)
 http://www.securitytube.net/video/1175
 
 2. Metasploit Megaprimer Part 2 (Getting Started with Metasploit)
 http://www.securitytube.net/video/1176
 
 3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)
 http://www.securitytube.net/video/1181
 
 4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)
 http://www.securitytube.net/video/1182
 
 5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)
 http://www.securitytube.net/video/1183
 
 6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)
 http://www.securitytube.net/video/1184
 
 7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)
 http://www.securitytube.net/video/1185
 
 8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)
 http://www.securitytube.net/video/1187
 
 9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)
 http://www.securitytube.net/video/1188
 
 10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)
 http://www.securitytube.net/video/1189

11. Metasploit Megaprimer Part 11 (Post Exploitation and Stealing Data)
 http://www.securitytube.net/video/1190
 
 12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)
 http://www.securitytube.net/video/1191
 
 13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)
 http://www.securitytube.net/video/1192
 
 14. Metasploit Megaprimer Part 14 (Backdooring Executables)
 http://www.securitytube.net/video/1198
 
 15. Metasploit Megaprimer Part 15 (Auxiliary Modules)
 http://www.securitytube.net/video/1199
 
 16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)
 http://www.securitytube.net/video/1215
 
 17. Metasploit Megaprimer Part 17 (Scenario Based Hacking)
 http://www.securitytube.net/video/1219

12
Operating System / Re: Windows 8 developers preview
« on: December 15, 2011, 08:19:14 pm »
I think ubuntu it`s more better, easy to use easy to tweak . :D peace

Pages: [1]