All Posts Tagged
Tag: ‘backtrack’

Windows 7 Fake Access Point With Alfa AWUS036H

In my previous post I discussed how to Setup a Fake Access Point with Backtrack Linux  Although I love Backtrack Linux one of the tools I really miss is Cain & Able, I thought some of you will want to setup a Fake AP when Pentesting on Windows systems as well. So, here it goes… I am using an Alfa […]

Read More

Setup a Fake Access Point With BackTrack5

Recently I needed to setup a fake access point for a presentation, I fired up my Backtrack5 VM, Connected my Alfa AWUS036H USB adapter and started to configure the Fake AP. There are a lot of Tutorials and Scripts for setting up a Fake AP,  The “Gerix”  tool also have an option to auto set […]

Read More

Wophcrack – Ophcrack web interface

Rainbow tables are really useful when cracking password hashes, One disadvantage of these tables is their size which can get up to tens and even hundreds of gigs. I really liked the Offensive security Crackpot online hash cracker and  i thought it would  be really nice to have a web interface for my rainbow tables which i can access from web […]

Read More

Metasploit Java Meterpreter Payload

If you haven’t noticed the Metasploit Framework has a JAVA meterpreter payload for some time now It supports all the commands supported by the PHP meterpreter, as of SVN revision 9777, and additionally the ipconfig, route, and screenshot commands. It is not fully implemented into the framework yet and in order to get it up and […]

Read More

How strong is your fu for charity – iVuln Writeup

On June 19th 2010 I attended the Offensive Security “How strong is your fu for charity” challenge , The objectives were to pawn 5 machines in 48 hours time frame. After some enumeration and rumors on the IRC channel it became clear to me that the easiest machine to pawn was the 192.168.x.200 (named iVuln),  a […]

Read More

Pivoting into a network using PLINK and FPipe

Although the metasploit framework meterpreter have pivoting capabilities which include Port forwarding and Routing, you may find yourself need to pivot your tools outside of the framework. For example, you may want to open a Remote Desktop connection to other internal host on the compromised network. This could be done using SSH Tunneling and Port […]

Read More

Recent Posts