This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Tuesday, January 31, 2012

How to Crack LInux Password Using John the Ripper

We have get /etc/passwd and /etc/shadow in the last article Privilege Escalation (Step by Step to get Linux username and Password) in Backtrack 5 Now we try to crack it. The first step is save the two files in txt files. In this case we will save /etc/passwd in pasword.txt and /etc/shadow in shadow.txt. Then combine the two files by using ./unshadow command. root@bt:/pentest/passwords/john# ./unshadow pasword.txt shadow.txt >> crack.txt root@bt:/pentest/passwords/john# ./jhon-mmx crack.txt The next step is crack the crack.txt using...

Privilege Escalation (Step by Step to get Linux username and Password) in Backtrack 5

1. Information Gathering  Step A. Using Zenmap Out IP target is 192.168.0.21  We have known the running service sssh, http, and netbios  B. Open our taeget via web browser Because the http service is running we will try to open it via browser We can try to follow how the web site work. The try to change the GET parameter. In this case we change the "true" parameter in address bar. and the...

Friday, January 27, 2012

Using Nessus For Vulnerability Analysis and Xploitdb for Exploitation

1. Scan host that have been connected to the network by using zenmap 2. Define the target for the vulnerability analysis. 3. Open Nesuss by typing https://127.0.0.1:8834/ at the browser address bar 4, Create new case and type the address of the target.. 5. Click Launch Scan 6. Choose which service that have high severenity 7. Click it for detail information 8.  Open xploitdb in Apps-Exploitation Tools-Open...

How to Exploit Windows XP using Metasploit and Nessus

In this tutorial we use Windows XP in Virtual Machine. We assumed that we have known the IP target. Here the onnection between Windows XP as target and LInux...   Picture 1. IP Linux : 192.168.1.144    Picture 2. IP Windows: 192.168.1.145  Picture 3. Checking Windows Connection in LInux      Picture 4. Checking LInux Connection in Windows  Now, we try to analyze the vulnerability of...

Wednesday, January 25, 2012

Information Gathering for Sites

A. domain : is2c-dojo.net 1. Using dmitry root@bt:/home# dmitry -wnsepb is2c-dojo.net Deepmagic Information Gathering Tool "There be some deep magic going on" HostIP:216.239.32.21 HostName:is2c-dojo.net Gathered Inic-whois information for is2c-dojo.net --------------------------------- Domain Name: IS2C-DOJO.NET Registrar: CV. JOGJACAMP Whois Server: whois.resellercamp.com Referral URL: http://www.resellercamp.com Name Server:...