InfoSec, Linux help

Kali Linux unable to install VBox Guest Additions after upgrade

I've searched far and wide and found numerous answers to this question, but none of them seem to work...SO, if they don't work for you then please try this one. Firstly every time I tried to run this I got an error about my missing headers: ./VBoxLinuxAdditions.run Building the VirtualBox Guest Additions kernel modules. This… Continue reading Kali Linux unable to install VBox Guest Additions after upgrade

Advertisements
Microsoft help

MS: The content type text/html; charset=utf-8 of the response message does not match the content type of the binding error

This problem is because the .Net Framework was installed after IIS. You can correct it by registering .net in IIS again. From an administrative command prompt type the following: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe -ir Source: https://social.technet.microsoft.com/Forums/office/en-US/4e11483c-e910-476f-897c-381d365f06ec/wac-server-getofficewebappsfarm-the-content-type-texthtml-charsetutf8-of-the-response-message?forum=officesetupdeploy

Microsoft help

MS: Grant yourself admin access to a local SQL Server instance

After inheriting an SQL server with an already revoked SQL administrator account I needed to take ownership of the DB that the previous SQL admin had access to. So I had admin access to the server, but I needed sysadmin access to the SQL Management tool and the databases within it. Step 1: Stop the… Continue reading MS: Grant yourself admin access to a local SQL Server instance

InfoSec

Three tools for bruteforcing

Hydra, Ncrack and Medusa (although ncrack is no longer being actively developed and supported): hydra -L /usr/share/seclists/Usernames/top_shortlist.txt -P /usr/share/seclists/Passwords/top_shortlist.txt ssh://192.168.1.5 medusa -h 192.168.1.5 -M ssh -U /usr/share/seclists/Usernames/top_shortlist.txt -P /usr/share/seclists/Passwords/top_shortlist.txt ncrack -vv -U /usr/share/seclists/Usernames/top_shortlist.txt -P /usr/share/seclists/Passwords/top_shortlist.txt 192.168.1.5 -p ssh Please make sure that you have a good word and password list for this exercise. It might… Continue reading Three tools for bruteforcing

InfoSec

Performing MitM attacks using arpspoof

In this scenario we will perform a MitM attack though arp spoofing. The concept basically comes down to ensuring that you can poison the arp table of the target machine and also the arp table of it's default gateway. For this example we will use arpspoof with the target's IP set to 10.10.10.20 and it's… Continue reading Performing MitM attacks using arpspoof

InfoSec

WHOIS for gathering more domain information

To find out information pertaining to the owners of a domain you can make use of the whois tool: whois website.domain.domain Of course you do not have to settle for the information returned in the previous request - you can specify the whois server you would like to query to perhaps return even more information:… Continue reading WHOIS for gathering more domain information