phillips321

Penetration Tester and Linux fanboy!

Okay, so the first thing you’re wondering is “Why the hell would you want to do this?

Well the answer becomes more obvious when the scenario is set: You’re on a social engineering job and you’ve managed to gain access to the target building, you walk around for a bit to see if any of the desks look free. After a while you decide to sit down at… Continue reading

So every time the BackTrack development team release a new version I download it and use it from fresh. I don’t like following the dist-upgrade route as I’ve had trouble in the past and it’s a good idea to get a clean build now and again.

I used to maintain a BT5-fixit.sh script but just don’t have the time. Instead I just use this script here: bt5r3gnome32.sh

I’ll walk through… Continue reading

So I’ve for a while needed to learn how to exploit a service using things like NOP sleds and so on. I decided to follow this great tutorial here but wanted to make my own notes.

First off you’ll need the following:

Background – The… Continue reading

So today I’ve been playing with python and decided to make an arp ping utility. When i get more time i’ll turn this into a simple arp scanner.

I know that this is all possible using scapy but the idea of this was to teach myself how raw sockets work within python.

This requires netifaces and a few other modules that can usually be obtained using sudo easy_install modulename (you’ll… Continue reading

So we all know how great burpsuite is, but don’t we all hate getting nagged by IE and Firefox about the certificate issues? Well here’s a quick way to add burpsuites CA certificate to them.

Background: During install burpsuite generates a new CA certificate and stores the private key on your machine, if you reinstall you’ll have to repeat the steps to trust the newly generated CA again.

Steps for… Continue reading