Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Saturday, 8 February 2014
On 04:47 by Unknown in certified ethical hacking, pen test, penetration testing, Penetration testing training No comments
Let’s build on the concept of combined testing
We’ll discuss useful new tools and techniques, We’ll look at how these concepts can be used in a network/wireless/web app combined pen testToday’s Focus
- In Part 1, the flow was 1) wireless 2) web app 3) network exploitation
- To illustrate the pragmatic and iterative nature of combined tests, we’ll alter the order this time:
- Network exploitation – Useful Metasploit features (Metasploit’s builtin route command, psexec exploit, and its pass-the-hash features)
- Wireless attack – Vista wireless power tools (including VistaRFMON)
- Web App attack – Discovery and exploitation (using w3af)
Network Attack Tools and Techniques
Metasploit’s Route Command
Metasploit includes many server-side and client-side exploits
- Use Metasploit 3.x “route” command to pivot through already-exploited host
– Carries follow-on exploits and payloads across Meterpreter session
– Don’t confuse this with the Meterpreter “route” command
Metasploit’s psexec Feature
- Remember the great free psexec tool from Microsoft SysInternals?
– Allows user with admin credentials to make a remote Windows box run a
command via SMB connections
- Metasploit includes a psexec exploit with very similar features
- A pen tester can use one compromised Windows machine to cause another machine to run cmd.exe for a nice little pivot
- First, exploit victim1 with exploit1 and Meterpreter payload, then…
Metasploit’s Integrated Pass-the-Hash
- Metasploit psexec has built-in pass-the-hash capability!
– Instead of configuring psexec with the admin name and password,
just configure it with the admin name and hash dumped using priv
- First, exploit victim1 with exploit1 and Meterpreter payload, then…
Wireless Attack Tools and Technique
Vista Wireless Power Tools
Vista introduces all-new wireless stack
– Lots of new and powerful features
- NDIS 6 requires wireless drivers to support
monitor-mode packet capture
– Previously limited to Linux or commercial drivers
- Unfortunately, not exposed in any built-in applications
Capturing Vista Wireless Traffic
- With RFMON capture, attacker uses Vista host to discover and attack nets
– It's like having a remote Linux box, sort of
- Packet capture supplied by Microsoft NetMon 3.2
– Silent command-line install and capture… no reboot
- Attacker can enumerate, analyze and attack wireless networks seen by victim
- No attack tools read NetMon WLAN captures
- Solution: nm2lp
– Converts Netmon WLAN captures to libpcap format
Leveraging Vista “netsh wlan”
- Attacker can extract useful Vista WLAN config data
– WPA/2-PSK passwords, configuration settings,preferred networks, certificate store, etc.
- Can also establish new networks
– Ad-Hoc interfaces, bridged to Ethernet interfaces (requires 3rd party tool nethelper.exe w/o GUI)
– Layer 2 connection for local WLAN attacker.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Hello folks, How are you all. Today I'm here to bring you on of the most amazing hacking news or trick you can say. So let's begin ...
-
Hello Everyone, How Are You All. This Week i'm going to introduce some major concepts about Cisco Router IOS. So, Lets start. ...
-
Have you checked our previous tutorial on Cisco's three tier network model. If you haven't, you must check it. Go to previous tu...
-
Hello folks, this is my first post. M gonna explain about Pat and will give configuration for it with an example below. Port Address...
-
OPEN MS-DOS Source Code Early tech fans might remember the good 'ol days of Microsoft MS-DOS, the company's first operating s...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and soc...
Categories
ACL
APPS AND SOFTWARE
Account Hacking
Adobe Flash Player
Android
BREAKING NEWS
Basic Networking
Bluetooth Hacking
Bus Tupology
CCNA
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
FTP
FTP Server
GOOGLE GLASS
Google Hacking
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
algorithms
ccna discovery
ccna exploration
facebook
hacking tool
internet and network security
packet tracer tutorial
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment