Well correct me if I'm wrong, but the whole premise of an un-regulated forum is
for people to collaborate on opinions, even if they don't necessarily agree.
You clearly didn't like the comments directed toward the INSECT devs, so aren't
you 'wasting your time' by replying to them yourself?
Would you care to offer what particular tests you did to compare your tool to
Hydra?
Just curious.
Ryan
On Nov 19, 2010, at 6:52 PM, n...@myproxylists.com wrote:
There are several fixes done in this release compared to the 1st version.
It is encouraged to upgrade to the latest version.
In all fairness I do use proxychains for all of my proxy randomization and all
that kind of stuff if I need it. That way it's consistent regardless of what I
throw at it, even tools without random proxy chaining like nmap and hydra.
Good job coding it though, I can't imagine that was easy.
Ryan
I mean it's a nice thought, but the steps to get something like that indexed
are quite silly. You would have to have your webserver indexing your
application data, which is clearly a HUGE mis-configuration on their part. I
personally don't care because I don't know if it's really going to do
Seriously. The only reason CANVAS and IMPACT are still used is because
of the 0-days that come packaged with them. Metasploit if far superior
not only in exploitation, but post exploitation, persistance,
networking pivioting, and just generally being a badass!
Can ANYTHING really compare to
And what of the pass the hash group of attacks, not to mention the
insecure hashing to begin with? Combine that with token manipulation
and process migration and you have a very deadly combination to almost
any windows network that you don't see anywhere else. Exploiting
windows networks