Search found 29 matches

Return to advanced search

Re: Exploiting my own system

Thanks, It's going to be kind of fun. I just installed Win2k on an old dell just to mess around with. It's so funny how exploitable it is. Of course I'm just using scripts that were written by people that have much more talent than I ever will.. but I'd like to learn to write my own shellcode.
by ph4nt0m
on Mon Jun 29, 2009 4:15 pm
 
Forum: Web
Topic: Exploiting my own system
Comments: 2
Views: 2516

Exploiting my own system

I had an idea recently to set up a server on my home network just for me and my friends to hack. I want to set up a crappy server with little security and then try to exploit it. Then as I learn more up the security to make it harder. What I was wondering is if my ISP would get upset about something...
by ph4nt0m
on Mon Jun 29, 2009 3:03 pm
 
Forum: Web
Topic: Exploiting my own system
Comments: 2
Views: 2516

Microsoft Frontpage Hashes

How would I go about cracking microsoft frontpage hashes? Does anyone know how they are encrypted?
Here is an example of a few:

Hq2XSflzlZdkE
HYpfTjLNfYm6Q
JSQos95l7SW9A.
o5Q7L/O/aECw.
by ph4nt0m
on Tue Jun 23, 2009 2:31 pm
 
Forum: Graveyard
Topic: Microsoft Frontpage Hashes
Comments: 2
Views: 4593

Re: im new

I google myself sometimes.


Also.. Aircrack, Airodump, Kismet ect. Google away my friend.
by ph4nt0m
on Mon Jun 22, 2009 8:16 pm
 
Forum: Networking
Topic: im new
Comments: 11
Views: 7797

Re: True Hacking - How does it work?

"Hmm, I wonder what happens when I do this..." or "What could be behind that last locked door...". I think that is most every hackers motivation. Most hackers mind runs on curiosity. We may not do everything legally, but it is usually without malicious intent. It's simply the ru...
by ph4nt0m
on Mon Jun 22, 2009 8:13 pm
 
Forum: NZone
Topic: True Hacking - How does it work?
Comments: 8
Views: 3272

Re: How do remote exploits work?

Thanks, that makes much more sense.
by ph4nt0m
on Mon Jun 22, 2009 5:24 pm
 
Forum: Microsoft Windows
Topic: How do remote exploits work?
Comments: 4
Views: 11229

Re: How do remote exploits work?

First off this should probably be moved to Malware or Networking. Scenario: Lets say I want to attack hackthissite.org. First I would do an Nmap scan of the target, from that I learn the server is running Apache 2.0 on port 80. So I go to milw0rm and search "Apache". Now I find an exploit...
by ph4nt0m
on Mon Jun 22, 2009 4:48 pm
 
Forum: Microsoft Windows
Topic: How do remote exploits work?
Comments: 4
Views: 11229

How do remote exploits work?

This is an extremely noob question, but I assure you I have no malicious intent. I understand how shellcode works, but I don't understand how an attack is used against another computer. I can't write shellcode, but I understand the process of it. From what I gathered if you have an unpatched securit...
by ph4nt0m
on Mon Jun 22, 2009 4:04 pm
 
Forum: Microsoft Windows
Topic: How do remote exploits work?
Comments: 4
Views: 11229

Re: What's the reason for existence?

I agree with half of what you said. Don't think too hard on it. Just live! But I also do not like thinking about this being my only life. I don't want to stop living! I want to go somewhere instead of the ground whether it be reincarnated or sent to some after life. And also the feeling of somethin...
by ph4nt0m
on Wed Jun 17, 2009 9:31 pm
 
Forum: General
Topic: What's the reason for existence?
Comments: 62
Views: 89725

Arch Linux

I have experimented with a few distros, mainly Ubuntu, as a windows replacement. I am very interested in Arch Linux. I want to use it strictly for penetration testing on my network and my server. I know backtrack has a lot of tools already built in, but I want a hardrive install with all the program...
by ph4nt0m
on Wed Jun 17, 2009 9:00 pm
 
Forum: Operating Systems
Topic: Arch Linux
Comments: 2
Views: 9960
Next

Return to advanced search