Forum Replies Created
June 9, 2014 at 8:22 pm #53835
slmgr -rearm from the research I have done dose not seem to work in XP I would have to use the rundll32.exe syssetup,SetupOobeBnk.
Supposedly, “msoobe.exe” is used for the XP activation. Haven’t used it myself though.
June 9, 2014 at 2:31 pm #53833
If I understand your question correctly, you want to have one “baseline” VM that’s good for 30 days after you distribute it. Would “slmgr -rearm” work?
I think you’ll then be able to create your baseline VM. Before you send it out, run slmgr -rearm which resets the activation timers for 30 days IIRC. If this works for you you could always automatic it via a script so it runs once after the VM is configured and first starts up then deletes itself.
December 10, 2013 at 10:31 pm #53690
dynamik – I should have mentioned that I’m going to the live courses. 660, for whatever reason, isn’t being offered this time around. Same goes for the advanced web app. In your opinion is 760 at/above/below OSCE? From the course description it seems like it’s above (don’t recall 64 bit anything in the latter).
Sooooooo, looks like I’m going with the forensics class.
September 5, 2013 at 5:41 pm #53457
Great article. Good to know if one of my family members ever loses their phone – time to change my router’s password.
BTW – I noticed the screenshot says “Kali Linux” but the picture suggests it’s actually a Backtrack machine. I suppose it’s possible that someone would put a BT wallpaper on Kali. 😉
April 17, 2013 at 7:45 pm #52702
On a related note…I’ve heard of a person getting a bump to passing based on their report, but have never heard of someone *failing* because of a poor report, despite having garnered enough points.
I know for a fact that they do require a report. I had an e-mail snafu when I took my exam where they sent out an message indicating that they’d not received my document, even though I had passed point-wise. Talk about scrambling! No way was I going to blow my exam due to a technical difficulty with my e-mail!
April 17, 2013 at 1:56 pm #52705
Went fairly smoothly overall. While Kali seems generally better organized, it’s very slow on my machine compared to BT 5 R3. Despite giving it more resources than I did for the aforementioned.
April 17, 2013 at 4:41 am #52692
You submit the report after you take the exam. As for the material changing since ’12…highly doubtful.
On a related note are you sure it’s a good idea to go into the exam “cold” (i.e. after so long a break since the labs)? Or have you been working on your own?
April 15, 2013 at 5:41 pm #52667
Personally, I’m not that fond of Kali – it’s slow (in my VM) compared to the Backtrack versions. However, it’s unlikely that they’ll continue to support BT so if you’re starting out, you might as well go with the latest version and the one they’re going forward with…Kali.
April 14, 2013 at 2:48 pm #14458
Can someone explain me why EAX+ECX is the entered serial address.
Why it isn’t only ECX ?
My Assembly isn’t the best but I’ll take a stab…ECX points to the serial address and it’s a DWORD. The routine is comparing BYTE. So ECX is the base address of of the serial addy and adding EAX allows you to step through it byte by byte.
One thing that helped me in learning how to read assembly is stepping through it in a debugger. It makes loads more sense when you can see the registers being modified.
Now for some coffee…
April 6, 2013 at 4:06 pm #51968
Kick its ass!!
March 21, 2013 at 7:22 pm #52336
I used Matt Walker’s ALL-IN-ONE Guide for the CEH:
It’s much more readable than some of the other guides on the same topic (the CEH official materials included). It also points out some of the more archaic things about CEH v7.
March 5, 2013 at 5:36 pm #52184
Re. OffSec programming languages…I took the OSCP last year and didn’t write a single line of Ruby. Strictly Python & C.
February 24, 2013 at 3:55 pm #51938
I 3rd (or 4th) what ajohnson said…a password attack shouldn’t be your primary vector. Personally speaking, in the lab and on the exam, I didn’t put much effort into password cracking/guessing other than the obvious ones (username, defaults, etc). I felt that there were more direct/less random ways to get into the machines.
February 12, 2013 at 7:50 pm #51911
IIRC, this is a vulnerability that hasn’t had an exploit (to do what you want) written for it (yet).
I seem to recall seeing exploits that claimed to allow remote code execution or something similar on Pastebin BUT in reality they were bogus and ended up pwning the downloader’s machine.
February 12, 2013 at 3:07 pm #51495
He’s beginning to sounds more and more like Gregory D. Evans.
(http://attrition.org/errata/charlatan/gregory_evans/) Except that Joe, actually knows something.
Hard to believe that Anonymous hasn’t taken this guy down already. World’s #1 Hacker indeed. http://gregorydevans.com/
He could have made the same points using a bit more tact.
Never a good idea to drive, e-mail, or blog angry.
I’m thinking McCray has some other things going on in his life besides the financial troubles and (intense) dislike for the folks at exploitlabs.