• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About ali_ali

  • Rank
    DDP Fan club member
  • Birthday 03/14/1989

Profile Information

  • Interests
    Networking Security and Servers Bugs
  • Location

Contact Methods

  • Website URL
  • ICQ
  • Yahoo
  1. You can also use cygwin Check it out:------------->>>
  2. Those are just local to my knowlege (unless you count crack sniffed hashes as remote). Look into THC Hydra as well. if you want to do an inverse brute force attack try ipiterator and the net command. Pwd-Dump6 check out Irongeek video on Brutus
  3. New and updated =
  4. Back|Track is Perfect Linux for Pentesting and It can be Easily Edited BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor Combining the best features from both distributions, and paying special attention to small details, this is probably the best version of either distributions to ever come out. Based on SLAX (Slackware), BackTrack provides user modularity. This means the distribution can be easily customised by the user to include personal scripts, additional tools, customised kernels, etc.
  5. Does Cain already have Definitions in it (library) or not? If not where do i get a good one It comes with what can be considered a sample-dictionary. You will most likely have to look for more complete/complex, though they are incredibly easy to find. Forget the dictionary though, it would take little if any time to crack the LM copy of her password (unless she went out of her way to disable LM, which nobody does and windows still doesn't do by default for some stupid reason or another). 14 character maximum passwords, split into 2 halves (7+7) will take NO time to crack at least one of the sides, and since it is almost guarenteed to be a word or phrase (in part) with even one half the other is easy enough to restrict your search down to. Or just grab the complete LM rainbow table set and crack it in less time than it took me to write all of this. Either or. Edit- oh ya, i forgot, there are online rainbow tables already searchable, just search for the LM hash and it will tell you instantly (i tells ya, kids these days totally spoiled.. back in my day we had to do it all ourselves, while walking through a blizzard on the way to school, 10 miles away, barefoot) Check out These links about local passwd cracking by Irongeek Cheers
  6. Thanx to All for your help now my windows is working
  7. Is it Possible Is it Possible to Boot Live Windows XP.iso with out installing it on Pc but using The Vmplayer Edit:I saw it in Irongeek video tutorial "using Vmwareplayer to boot live cd"
  8. Whenver application is open it Give the common and popular error " This Program has created an illegal opreation........................... Send Error Report Do not Send " if i click send error report it prepare and send error report and if i click do not send nothing happens and application is Closed down as usual and another problem is in Internet Explorer when i try to execute it , it says " There is a error with dynamic library in WININET.dlll........... Ok " i have back up my data and thinking to reformat it with Linux Red Hat
  9. :blowfuse: My Windows Xp Professional Edition is Not working Correctly whenever i open an application it give me a error :: And internet Explorer is no :help: t working whenever i tried to open it It give some error
  10. Well...u r just like me.....i will suggest using "web-copier" it copies an entire site and Fixes all the Links.....WHere to get it.Try google searching.And u will need to config it according to Your Use
  11. I know coz of Mc-Afee Virus Scan it's very old version.But i have uninstall it. Virus Scanners slow-down computers Speed So currently i am having no Virus Scan
  12. This virus will delete all Ms word,Excel,Powerponit etc files on 3 februray.I do not know the exact date but i see this in news channel.It has infected more than 30000 pcs more info can be found at Help My Computer is infected with "win32pateworm" i do not know the exact name some1 plz give some info abt win32pate worm
  13. What can we do After FTP access. ← Umm... really cool like: Upload files Download files ← - SITE EXEC <- - directory transversal (unicode hex and \.) - downloading useraccount/passwords - uploading executables to autorun directories - overflowing cmd buffers.. local shell execution ← But it asks for username and Password After Anonymous log in
  14. Is there any other software which can be use for exploiting like metaSploit Frame Work
  15. Hi Guys, I have just downloaded Zipslack from the internet. :blowfuse: I need a little help configuring it. :growl: I have a 20 Gb Hardisk With Windows XP. I want to install Slackware in D: Drive. How can I install it. :cuss: P.S: I need help and want to use Both Slackware and Windows XP Edit: Fixed some spelling/grammar so it's legible