|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 74
Members: 0
Total: 74
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
fizzi |
|
Replies: 2 |
Views: 8310 |
|
|
|
|
|
|
Clear your cookies, clear your cache, use a proxy server. or just take another browser. |
|
|
|
fizzi |
|
Replies: 4 |
Views: 15724 |
|
|
|
|
|
|
Anybody found already the login screen to the matrix?
<lol>
|
|
|
|
fizzi |
|
Replies: 2 |
Views: 8938 |
|
|
|
|
|
|
I don't think you will get access to a remote computer at any time without having a rootkit installed. Even if you got a rootkit running, chances are high that your compromise will be detected. |
|
|
|
fizzi |
|
Replies: 3 |
Views: 36664 |
|
|
|
|
|
|
Perhaps, i dunno ssh much, your data sent to host B which forwards to host A are not beeing encrypted, which is in fact a design flaw. is the data sending host B to host A encrypted? also it could be ... |
|
|
|
fizzi |
|
Replies: 5 |
Views: 17507 |
|
|
|
|
|
|
What challenges do they got? You have to register to get to the challenges ... i don't like that.
I stay with pulltheplug.org, if i can afford the time |
|
|
|
fizzi |
|
Replies: 5 |
Views: 16803 |
|
|
|
|
|
|
i would try to make a php script which logs the url the visitor came from. this php script has to be renamed to the original image file. (and your server must interpret this file as a php script) some ... |
|
|
|
fizzi |
|
Replies: 7 |
Views: 13536 |
|
|
|
|
|
|
use nmap to portscan, unless you have no root rights, you can't perform several tasks with nmap, but at least you can see if there is a firewall, which keeps your remote computer away from connecting ... |
|
|
|
fizzi |
|
Replies: 2 |
Views: 12249 |
|
|
|
|
|
|
Portscanner: http://www.insecure.org/nmap/
Vulnerable Scanner: http://www.nessus.org/
But nessus isn't open source anymore, but they offer you a trial version which is very handy
But there ... |
|
|
|
fizzi |
|
Replies: 7 |
Views: 13536 |
|
|
|
|
|
|
mhm. perhaps you want to find some setuid/setgid programs on that machine which are vulnerable?
find / -perm +a+s -type f -ls
or try to detect services on that machine which are running and perhaps ... |
|
|
|
fizzi |
|
Replies: 1 |
Views: 10187 |
|
|
|
|
|
|
I guess tree should do the work.
But the name of the command could differ.
Also i found "tree for windows": http://prdownloads.sourceforge.net/gnuwin32/tree-1.5.0-bin.zip?download |
|
|
|
fizzi |
|
Replies: 7 |
Views: 13536 |
|
|
|
|
|
|
Reboot with
init=/bin/sh
and add
getmein::0:0:0:0:::
(or similiar) to your /etc/shadow
then reboot normally and log in with getmein and no pass.
edit:
http://aplawrence.com/Linux/lostlinuxpas ... |
|
|
|
fizzi |
|
Replies: 4 |
Views: 10309 |
|
|
|
|
|
|
If John failes (e.g. due to lack of time) backup your files and ask your rootserver-provider for a reset
Or try some exploits from milw0rm:
http://www.milw0rm.com/search.php?dong=linux+kernel
there ... |
|
|
|
fizzi |
|
Replies: 7 |
Views: 13343 |
|
|
|
|
|
|
perhaps you want to install a rootkit
http://en.wikipedia.org/wiki/Rootkit |
|
|
|
fizzi |
|
Replies: 5 |
Views: 17947 |
|
|
|
|
|
|
As i can see, you have to be registered to that forum and put your data as arguments to that exploits. After that you should be admin at the forum. |
|
|
|
fizzi |
|
Replies: 5 |
Views: 17947 |
|
|
|
|
|
|
As i can see, you have to be registered to that forum and put your data as arguments to that exploits. After that you should be admin at the forum. |
|
|
Page 1 of 4 |
Goto page 1, 2, 3, 4Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|