Tutorial: Allow auto login between Linux machines In my work, I create many shell scripts which automate different procedures. Sometimes, it is required that a script will be able to log into a remote machine and run some commands there or get files from the remote machine, so doing this “trick” will allow the script […]
Latest feeds
Nessus: Persistent Changes USB on for BT...
Persistent Changes USB on Nessus for BT5: NOTICE FOR BT5 This how-to will be updated with specifics for Backtrack 5. As it sits, it does not work with Backtrack 5. If you have a 16GB stick, please try this one. ———————————————————— UPDATE 12/16/2010: Updated to use R2 and removed references to R1, the pre-release version and final versions of Backtrack. […]
Bash: The shift command built-in
The shift command built-in What does it do? The shift command is one of the Bourne shell built-ins that comes with Bash. This command takes one argument, a number. The positional parameters are shifted to the left by this number, N. The positional parameters from N+1 to $# are renamed to variable names from $1 to $# – N+1. Say you have a command that […]
Hacking Windows Using USB Stick + Social...
I found this tutorial in the hackingtutorial website, works great: Requirements : 1. Metasploit Framework 2. Operating System Windows or Linux (In Backtrack 5, metasploit already included inside) 3. social engineering toolkit Step By Step : 1. Open your console/terminal (CTRL+ALT+T) and then change your working directory to/pentest/exploits/set. cd /pentest/exploits/set 2. Run your Social Engineering Toolkit using ./set command. 3. Choose […]




