This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - neom

Pages: [1]
1
General discussion / Re: Half-Life 3... and why it wont happen
« on: January 20, 2016, 02:33:38 PM »
You may be right but I "want to believe" that a number 3 is coming.

Played all the saga specially HL2 with the episodes, all of them were awesome.

2
I strongly recommend you to read:

Metasploit, The Penetration Tester's Guide by David Kennedy et al.

Take a look at chapters 13-16
  • Building your own module
  • Creating your own exploits
  • Porting exploits to the metasploit framework
  • Meterpreter scripting

Since you're asking about exploit writing i assume you already know what Metasploit is. If not, it's an platform for building and executing exploits that you should take a look.

3
Beginner's Corner / Re: Discover all IP addresses in a Local network.
« on: January 19, 2016, 01:13:47 PM »
Check which IP address your host gets when you plug it in the network. For example, if it is something like 192.168.xxx.xxx, you can use Nmap or any other tools stated above to look after live hosts or at least hosts that respond to ICMP. By doing that you should discovery every responsive IP address in the range of 192.168.

If you are in a at least a decent corporate network you shouldn't be able to connect to others subnets from a regular workstation and by that I mean you won't reach different networks like 10.xxx.xxx.xxx or something like that.

A quick Google search returns the following command to use in a CMD on Windows systems:

FOR /L %i IN (1,1,254) DO ping -a -n 1 192.168.10.%i | FIND /i "Reply">>c:\ipaddresses.txt

This will try to ping all addresses contained in 192.168.10.1-254, resolve their names and write it down on a .txt file at "c:". "%i" is the variable

4
Beginner's Corner / Re: What kind of attacks viable here
« on: January 19, 2016, 12:58:48 PM »
Please use the following template:

Problem: So I'm new or relatively new to the hacking scene.... and I was wondering what type of attacks are used for when you have access to a user/computer on a network, what kind of attacks you can do to gain access to other computers on the network


If you do have physical access to a machine, there is a known (and i think still unpatched) vulnerability with some versions of Windows. If it is a Windows 7, 8 machine it is really simple, you just need to have a windows disk, boot it up and use command prompt to make a few changes.

Take a look at this for more detailed info:

http://www.howtogeek.com/96630/how-to-reset-your-forgotten-windows-password-the-easy-way/

If you just have have access to the network, I would recommend the same as already stated above, first thing I would do is to run Nmap on the network.

Nmap should give you some IP addresses with juicy info about them, like current OS, possible vulnebs, open ports etc. With that in hand you can start searching more information about what you have found.

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.