Archive

Archive for Marzec 2012

Disable Metasploit / Enable Metasploit in windows.

Marzec 20, 2012 Dodaj komentarz

Disable Metasploit / Enable Metasploit in windows.

Disable stop script

 net stop "Metasploit Pro Service"
 net stop "Metasploit Thin Service"
 net stop metasploitPostgreSQL
 sc config metasploitProSvc   start= disabled
 sc config metasploitThin  start= disabled
 sc config metasploitPostgreSQL  start= disabled

Enable start script

 sc config metasploitProSvc   start= auto
 sc config metasploitThin  start= auto
 sc config metasploitPostgreSQL  start= auto
 net start "Metasploit Pro Service"
 net start "Metasploit Thin Service"
 net start metasploitPostgreSQL
 
Kategorie:Metasploit Tags:

Update Back Track 5

Marzec 18, 2012 Dodaj komentarz

Update and upgrade your BT5 (R1) installation

apt-get update
apt-get dist-upgrade
apt-get install beef
reboot

Verify that you are running a 3.2.6 kernel:

name -an
Linux bt 3.2.6 #1 SMP Fri Feb 17 10:40:05 EST 2012 i686 GNU/Linux

Apt Commands

apt-get install Downloads and all of its dependencies, and installs or upgrades them.
apt-get remove [–purge] Removes and any packages that depend on it. –purge specifies that packages should be purged.
apt-get update Updates packages listings from the repo, should be run at least once a week.
apt-get upgrade Upgrades all currently installed packages with those updates available from the repo. should be run once a week.
apt-get dist-upgrade [-u] Similar to apt-get upgrade, except that dist-upgrade will install or remove packages to satisfy dependencies.
apt-cache search Searches packages and descriptions for .
apt-cache show Shows the full description of .
apt-cache showpkg > Shows a lot more detail about , and its relationships to other packages.
man apt Will give you more info on these commands as well as many that are in less common usage.

dpkg commands

dpkg -i Installs a package file; one that you downloaded manually, for example.
dpkg -c Lists the contents of a .deb file.
dpkg -I Extracts package information from a .deb file.
dpkg -r Removes an installed package named
dpkg -P Purges an installed package named . The difference between remove and purge is that while remove only deletes data and executables, purge also deletes all configuration files in addition.
dpkg -L Gives a listing of all the files installed by . See also dpkg -c for checking the contents of a .deb file.
dpkg -s Shows information on the installed package . See also apt-cache show for viewing package information in the Debian archive and dpkg -I for viewing package information extracted from a .deb file.
dpkg-reconfigure Reconfigures an installed package
man dpkg Will give you more info on these commands as well as many that are in less common usage.
Kategorie:Back Track 5 Tags:

Using Netsh with Windows XP And Windows 2003 Firewall

Marzec 11, 2012 1 komentarz

Using Netsh with Windows XP And Windows 2003 Firewall

This post examines how to configure Windows Firewall using the Netsh command line utility. The procedures covered apply to both the Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1 operating system platforms.

Windows XP Service Pack 2 (SP2) ( Windows Server 2003 Service Pack 1 (SP1) ) includes the Windows Firewall, a replacement for the feature previously known as the Internet Connection Firewall (ICF).Windows Firewall is a stateful host firewall that drops all unsolicited incoming traffic that does not correspond to either traffic sent in response to a request of the computer or unsolicited traffic that has been specified as allowed.

Comamand Line Configure Windows Firewall step-by-step

 

Default settings is shown in the following figure.

windows_firewall

windows firewall general

  • On (recommended)
    Select to enable Windows Firewall for all of the network connections that are selected on the Advanced tab. Windows Firewall is enabled to allow only solicited and excepted incoming traffic. Excepted traffic is configured on the Exceptions tab.
  • Don’t allow exceptions
    Click to allow only solicited incoming traffic. Excepted incoming traffic is not allowed. The settings on the Exceptions tab are ignored and all of the network connections are protected, regardless of the settings on the Advanced tab.
  • Off (not recommended)
    Select to disable Windows Firewall. This is not recommended, especially for network connections that are directly accessible from the Internet, unless you are already using a third-party host firewall product.

Strony: 1 2 3

Kategorie:FireWall

Install the Metasploit Framework on VMware – BackTrack 5 Linux

Marzec 8, 2012 Dodaj komentarz

Install the Metasploit Framework on VMware – BackTrack 5 Linux

BackTrack includes the Metasploit Framework, but not always the latest version. To install the latest version of Metasploit Framework in BackTrack:

$ sudo bash
 cd /pentest/svn
 rm -rf framework3
 svn co https://www.metasploit.com/svn/framework3/trunk framework3

In order to use the raw socket modules, the pcaprub extension must be installed:

 cd /pentest/svn/framework3/external/pcaprub
 ruby extconf.rb
 make && make install

In order to use the WiFi modues, the lorcon2 extension must be installed:

 cd /pentest/svn
 svn co https://802.11ninja.net/svn/lorcon/trunk lorcon2
 cd lorcon2
 ./configure --prefix=/usr && make && make install
 cd /pentest/svn/framework3/external/ruby-lorcon2
 ruby extconf.rb
 make && make install

Once a fresh Subversion snapshot has been installed, it can be updated with the following command:

 svn update /pentest/svn/framework3/