Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Saturday, 8 February 2014
On 04:47 by Unknown in certified ethical hacking, pen test, penetration testing, Penetration testing training No comments
Let’s build on the concept of combined testing
We’ll discuss useful new tools and techniques, We’ll look at how these concepts can be used in a network/wireless/web app combined pen testToday’s Focus
- In Part 1, the flow was 1) wireless 2) web app 3) network exploitation
- To illustrate the pragmatic and iterative nature of combined tests, we’ll alter the order this time:
- Network exploitation – Useful Metasploit features (Metasploit’s builtin route command, psexec exploit, and its pass-the-hash features)
- Wireless attack – Vista wireless power tools (including VistaRFMON)
- Web App attack – Discovery and exploitation (using w3af)
Network Attack Tools and Techniques
Metasploit’s Route Command
Metasploit includes many server-side and client-side exploits
- Use Metasploit 3.x “route” command to pivot through already-exploited host
– Carries follow-on exploits and payloads across Meterpreter session
– Don’t confuse this with the Meterpreter “route” command
Metasploit’s psexec Feature
- Remember the great free psexec tool from Microsoft SysInternals?
– Allows user with admin credentials to make a remote Windows box run a
command via SMB connections
- Metasploit includes a psexec exploit with very similar features
- A pen tester can use one compromised Windows machine to cause another machine to run cmd.exe for a nice little pivot
- First, exploit victim1 with exploit1 and Meterpreter payload, then…
Metasploit’s Integrated Pass-the-Hash
- Metasploit psexec has built-in pass-the-hash capability!
– Instead of configuring psexec with the admin name and password,
just configure it with the admin name and hash dumped using priv
- First, exploit victim1 with exploit1 and Meterpreter payload, then…
Wireless Attack Tools and Technique
Vista Wireless Power Tools
Vista introduces all-new wireless stack
– Lots of new and powerful features
- NDIS 6 requires wireless drivers to support
monitor-mode packet capture
– Previously limited to Linux or commercial drivers
- Unfortunately, not exposed in any built-in applications
Capturing Vista Wireless Traffic
- With RFMON capture, attacker uses Vista host to discover and attack nets
– It's like having a remote Linux box, sort of
- Packet capture supplied by Microsoft NetMon 3.2
– Silent command-line install and capture… no reboot
- Attacker can enumerate, analyze and attack wireless networks seen by victim
- No attack tools read NetMon WLAN captures
- Solution: nm2lp
– Converts Netmon WLAN captures to libpcap format
Leveraging Vista “netsh wlan”
- Attacker can extract useful Vista WLAN config data
– WPA/2-PSK passwords, configuration settings,preferred networks, certificate store, etc.
- Can also establish new networks
– Ad-Hoc interfaces, bridged to Ethernet interfaces (requires 3rd party tool nethelper.exe w/o GUI)
– Layer 2 connection for local WLAN attacker.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment