newb question
- visser
- Fame ! Where are the chicks?!
- Posts: 472
- Joined: 03 Apr 2007, 16:00
- 17
- Location: online
- Contact:
newb question
so heres the deal. im a newb and dont really know what to go off of. i know a lil bout exploits and programming and such. and was curious about where to start. im not asking you to spoon food me how to use an exploit. just looking for an usual procces that you go through to exploit a computer. and yes i will be using this on my own computer. just was hopin i could get some help on how to go about exploiting. tell me the process and ill google asmuch as i can to teach myslef. i have been googlin it up and not finding much. hence forth why im here!!! any help would be apreciated. thanks for looking though!!!!
- JuggaloMushroom
- Fame ! Where are the chicks?!
- Posts: 252
- Joined: 18 Jul 2006, 16:00
- 17
- Contact:
- visser
- Fame ! Where are the chicks?!
- Posts: 472
- Joined: 03 Apr 2007, 16:00
- 17
- Location: online
- Contact:
thanks, howevere if anybody would have like a list eg
1 get ip
2send exploit
3 your done
just keep it basic and i will do my best to learn the rest. thanks for those sites by the by didnt know ther was a new hacking library!!! (site thingy whatev)
just need as much to go off of as possible. i can be a slow learner. thanks for any and all help though!
1 get ip
2send exploit
3 your done
just keep it basic and i will do my best to learn the rest. thanks for those sites by the by didnt know ther was a new hacking library!!! (site thingy whatev)
just need as much to go off of as possible. i can be a slow learner. thanks for any and all help though!
-
- Kage
- Posts: 732
- Joined: 31 Mar 2007, 16:00
- 17
- Location: Hidden in a Buffer Protection.
- Contact:
Re: newb question
Well ever heard of Metasploit? A skiddies wet dreams come true? Well.. this program is made for exploiting. Basically these are the steps:visser wrote:so heres the deal. im a newb and dont really know what to go off of. i know a lil bout exploits and programming and such. and was curious about where to start. im not asking you to spoon food me how to use an exploit. just looking for an usual procces that you go through to exploit a computer. and yes i will be using this on my own computer. just was hopin i could get some help on how to go about exploiting. tell me the process and ill google asmuch as i can to teach myslef. i have been googlin it up and not finding much. hence forth why im here!!! any help would be apreciated. thanks for looking though!!!!
1.Compile Exploit.
2.Add the exploit to the framework.
3.Select your exploit.
4.Configure the options (ip address, port number)
5.Select your payload.
6. Exploit.
As simple as that! Check out the metasploit site for more details:
Code: Select all
www.metasploit.com
Code: Select all
http://www.securiteam.com/
Code: Select all
www.milw0rm.com/
Code: Select all
http://www.governmentsecurity.org
Code: Select all
http://packetstormsecurity.org/
[edit] To exploit you need the users IP address, there are different ways to getting this. You would also need to get a port scanner to scan for a port vurnablity, the best port scanner out there is nmap. You can get nmap at:
Code: Select all
http://insecure.org/nmap/download.html
Well ever heard of Metasploit? A skiddies wet dreams come true? Well.. this program is made for exploiting. Basically these are the steps:
1.Compile Exploit.
2.Add the exploit to the framework.
3.Select your exploit.
4.Configure the options (ip address, port number)
5.Select your payload.
6. Exploit.
As simple as that! Check out the metasploit site for more details:
Code:
www.metasploit.com
lmao
a skiddies wet dream bcome true
this one really cracked me loughing..lol it reminds me of someone.those bloody feds
j/k
- isapiens
- Fame ! Where are the chicks?!
- Posts: 533
- Joined: 05 May 2006, 16:00
- 17
- Location: Turn around
Haha.those bloody feds
"No one in our society can be safe nowadays. These so called hackers can easily steal your bank accounts and single handedly start nuclear wars. Blame the god damn video games!!!!"
~ your truly Mr. Fed
Fluoridation is the most monstrously conceived and dangerous communist plot we have ever had to face.
-
- Kage
- Posts: 732
- Joined: 31 Mar 2007, 16:00
- 17
- Location: Hidden in a Buffer Protection.
- Contact:
rhysh wrote:Well ever heard of Metasploit? A skiddies wet dreams come true? Well.. this program is made for exploiting. Basically these are the steps:
1.Compile Exploit.
2.Add the exploit to the framework.
3.Select your exploit.
4.Configure the options (ip address, port number)
5.Select your payload.
6. Exploit.
As simple as that! Check out the metasploit site for more details:
Code:
www.metasploit.com
lmao
a skiddies wet dream bcome true
this one really cracked me loughing..lol it reminds me of someone.those bloody feds
j/k
Well metasploit is a skiddies wet dreams come true, its the closest you can get to a point and click exploiting GUI framework. But it's useful for learning a variety of different stuff.