bsd-roo

Members
  • Content count

    175
  • Joined

  • Last visited

Community Reputation

-1 Noobie

About bsd-roo

  • Rank
    SUP3R 31337

Recent Profile Visitors

1,955 profile views
  1. Hello all and thanks in advance. I have a Samba server for network access and backup usage, it appears that the hard disk has filled up faster than I had predicted. Unfortunately I did not set up raid to easily add new disks. and also I have partitioned the disk in the way that all folders are in /and all the files are stored in /home/<userAccounts>. what I would like to know is to increase the size of /home now, could I just copy /home to a new hard disk and add this to /etc/fstab "/dev/sda2 /home ext3 defaults 0 1". and hope it will from now on point /home to the new disk? or am I being hopefull? Thanks
  2. Another one for Amarok, but I have a third gen ipod and it always mess things up every time I connect it to my PC so I use rythmbox for Ipod sync.
  3. say port 80 is open, and the service is http. I find a matching exploit for port 80, what payloads can I attatch to it? like if I bind a reverse tcp shell payload, does it talk to the OS or the service? Since we are already this far into the conversation and presuming you were using it as a pen testing tool on a server you own even though you did comment that it is too noisy. there are different kinds of payloads for different needs, injecting VNC, spawning a shell,setting up nc at home waiting for a reverse shell or whatever. depends what you want to do and ofcourse depending also on what kind of exploit you used. not all exploits are going to give you root, some will probably just crash the system or do wierd stuff. also, you would have to know what service (and likely what version of that service) is running. for example, an exploit for apache wouldn't work on lighttpd. they're both http servers, but you'd have to know which one was in use before you could choose an exploit to try. hehe, remember this is presuming that he knows exactly what server hes up against because he owns it.. right? otherwise he wouldn't have been performing this vulnerability assessment. And I don't think companies hire black box security testers if they don't know their tools.
  4. say port 80 is open, and the service is http. I find a matching exploit for port 80, what payloads can I attatch to it? like if I bind a reverse tcp shell payload, does it talk to the OS or the service? Since we are already this far into the conversation and presuming you were using it as a pen testing tool on a server you own even though you did comment that it is too noisy. there are different kinds of payloads for different needs, injecting VNC, spawning a shell,setting up nc at home waiting for a reverse shell or whatever. depends what you want to do and ofcourse depending also on what kind of exploit you used. not all exploits are going to give you root, some will probably just crash the system or do wierd stuff.
  5. well, if the database is set up for metasploit to use with nmap properly then it should really do that automatically. so you should probably read more of their documentations, particularly the nmap bit. not sure if its the right thing for me to give you step by step instructions as you can potentially be using it maliciously so im gonna leave that to somebody else.
  6. Clever people need idiots so that society can actually distinguish the clever people from the slightly less intelligent people, without these idiots, everybody will be just as clever as each other. and the word "clever" or geeks simply will not exist. Thank you Idiots
  7. Had a look at it, Looks very ...... skiddish. Sorry do you mean "Hack Ring"? if so, i would have thought they would be more anonymous.
  8. OMG just saw that now!!! YOU LEGEND
  9. have to tried configuring xconfig? does it do the same when you boot a live distro?
  10. 1. routine activities vary depends on what you specialies in, im in my second year at uni studying secure and forensics computing so i guess routine activites include collecting data, analysing data and the most important of all, learning. life is an eternal quest for knowledge, it never stops and you can never know too much especially in IT. 2. everything, to identify how the crime (hack) was committed, i need to understand pretty much everything, i think in IT you can benefit from having a wide range of skills. 3. the best preparation for success i think personally is the mental attitude, with the right attitude anyone can learn anything if they wanted to. that is the key to success, nothing about learning or assignments are "gay". hope that answers your question, i wasnt sure if thats what you are looking for. with regards roo
  11. well, first of all you need to know what you are doing, install an setup a database server like mysql or postgres. then learn to use the db_autopwn function. but like i said make sure you know what you are doing, otherwise you can get into trouble for using such tools. hope this answers your question.
  12. A degree in secure and forensics computing showed me the way to start, the importance of understanding code.
  13. i have an 11 inch laptop, the only thing that slightly annoys me is when i code on it, i find the screen a tad too small. that is definitely something that il be considering when i buy my next laptop.
  14. how do you code colors in ascii text? nice work btw