This is my walk though of how I broke into the De-ICE.net network, level 2, disk 1.
The De-ICE.net network is on a "live PenTest CD", that creates a target(s) on which to practise penetration testing; it has an "end goal" to reach.
This is my walk though of how I broke into the De-ICE.net network, level 2, disk 1.
The De-ICE.net network is on a "live PenTest CD", that creates a target(s) on which to practise penetration testing; it has an "end goal" to reach.
This is my walk though of how I broke into the De-ICE.net network, level 1, disk 2.
The De-ICE.net network is on a "live PenTest CD", that creates a target(s) on which to practise penetration testing; it has an "end goal" to reach.
This is my walk though of how I broke into the De-ICE.net network, level 1, disk 1.
The De-ICE.net network is on a "live PenTest CD", that creates a target(s) on which to practise penetration testing; it has an "end goal" to reach.
If you didn't know already, 'Backtrack 4 Final' is now out, and to celebrate its release/my way of giving back to the community, I've released a new video on how to install, update and tweak it (as requested)!
I've also applied a new template to all my posts (blog and forums), plus added a header/footer to all my videos. Note: All the links have been updated/fixed.
I've also spent a little bit longer working on: 'Man in the Middle', and, shaved off two minutes of total running time.
This video shows how to install BackTrack 4 (Final) in VirtualBox, as well as applying a few tweaks and updating it. You can also use this method to install BackTrack on a real machine, just skip out the first part.
This video shows that with SSL encryption, it isn't secure. Proof of this is seen by showing a web based email (Google Mail) & online bank (PayPal) password.
By setting up a fake web site, we social engineer our target to run our exploit. The end result gives us command line access to our target's PC.
A basic guide on how to use hydra to crack a http password on a 'home' router.
How to crack a wireless network using WPA/WPA2 (PSK/AES) encryption with a connected client (as both have same method!) . Then using a pre-computed hash table which has been "pre-salted" with the ESSID for the network to get the pass-phrase.
I've had a go at making a bash script to automate creating a 'Fake AP' (Access Point) and 'pwn' who connects to it!
This is a bash script and a few other things to make a fake access point which is transparent (allowing target afterwards to surf the inter-webs after they have been exploited!).