This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - @R7un

Pages: [1]
1
then whats the point of such service if the recipient won't be able to see until he checks Spamboxes which most likely won't happen....

2
but the mail goes to spam folder, tried both https://emkei.cz/ and http://www.webwizny.com/sendemail.php, both sends email to spam..
any other way to make it legitimate?(my conscience says no, fingers crossed!)

3
is there a site that offers the service of sending emails to any person without registering (like mailinator.com but it receives, rather i want to send)...

4
Hacking and Security / Re: Real World Scenario
« on: August 28, 2014, 08:15:13 PM »
thanks man you helped me find the path... :D

5
Hacking and Security / Re: Real World Scenario
« on: August 25, 2014, 08:10:41 PM »
so from where would you have started lets say the server is [redacted] what scans would you ahve performed and how you would have proceeded?? I'm a noob right now..forgive me for my mistakes...

6
Hacking and Security / Re: Real World Scenario
« on: August 25, 2014, 07:53:53 PM »
i did some research:
it runs windows NT (after ftp grabbing)
server windows IIS/7.0- no vulnerability found..
runs Microsoft FTP  ver-7.0
 running throgh nessus as well as openvas
what more can i do??

also i want to try default password on ftp, but i'm unable to find default password and username of Microsoft IIS 7.0??

Staff note: I can see you can use the modify button, then why the fuck did you doublepost nigga?

7
Hacking and Security / Real World Scenario
« on: August 25, 2014, 05:37:49 PM »
So i am testing against my own server:
NMAP(output)

PORT     STATE SERVICE
21/tcp   open  ftp
25/tcp   open  smtp
80/tcp   open  http
443/tcp  open  https
1248/tcp open  hermes
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows Vista|7|2008 (89%)
OS CPE: cpe:/o:microsoft:windows_vista::sp2 cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008
Aggressive OS guesses: Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008 (89%), Microsoft Windows Server 2008 R2 (89%)

SMTP grabbing:
SG2NW8SHG132.sin2.gdhosting.gdg Microsoft ESMTP MAIL Service, Version: 7.0.6002.18264



i would like to find the vulnerabilities as well as exploits or any other hack so that i can get a shell...

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.