Posts

Showing posts from August, 2010

Discover host information through NetBIOS

This was run on Metasploit using auxiliary scanner.Below is the step taken. msf > search nbname [*] Searching loaded modules for pattern 'nbname'... Auxiliary ========= Name Rank Description ---- ---- ----------- scanner/netbios/nbname normal NetBIOS Information Discovery scanner/netbios/nbname_probe normal NetBIOS Information Discovery Prober msf > use auxiliary/scanner/netbios/nbname msf auxiliary(nbname) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- BATCHSIZE 256 yes The number of hosts to probe in each set CHOST no The local client address RHOSTS yes The target address range or CIDR identifier RPORT 137 yes The target port THREADS 1 yes The number of concurrent t...

GYMKHANA 2.1, BLOCK vs DYRDEK

Watch it and be amaze...

August Updates..??

Image
Sorry guys I seldom updates my blog..Is anybody out there watching my blog?har har har ..who cares as long I can update its.. :D Now I teach you all how to do a SPAN Port to monitor / or sniffing :- Of Course In CISCO wayss.. :P Configuration Steps Explanation In order to configure port Fa0/1 as a destination port, the source ports Fa0/2 and Fa0/5, and the management interface (VLAN 1), select the interface Fa0/1 in the configuration mode: Switch(config)#interface fastethernet 0/1 Enter the list of ports to be monitored: Switch(config-if)#port monitor fastethernet 0/2 Switch(config-if)#port monitor fastethernet 0/5 With this command, every packet that these two ports receive or transmit is also copied to port Fa0/1. Issue a variation of the port monitor command in order to configure the monitoring for the administrative interface: Switch(config-if)#port monitor vlan 1 Note: This command does not mean that port Fa0/1 monitors the entire VLAN 1. The vlan 1 keyword simply ...