Search:
Type: Posts; User: hunterhunter; Keyword(s):
Search:
Search took 0.02 seconds.
-
Thanks for the ideas everybody.
I'll post back with some results shortly.
Regards
-
That's a good idea.... I probably would be able to set up an ssh server at home on port 80 or something else just as common. One guy stated earlier that it might filter applications as well.
I guess...
-
I figured that port 22 was blocked. That was obvious.
I was just thinking that I could set putty up to make the request over port 80. Thence my ssh tunnel would be entering through port 80,...
-
Obviously port 22 is blocked. Is there a way that I can set up a tunnel on an open port? Or does the server reply on port 22 regardless? I'm trying to tunnel to rootshell.be but the router here keeps...
-
Another thing. I also understand that this is encrypted using several keys. Thusly, encrypted several times.
So how would a brute-force attack work in this case? Because I believe there are a...
-
Unfortunately my friend formatted his hard disk. He did not save the recovery key. Also, the administrator account that would be able to see the data was on that disk that we wiped. I might try some...
-
Why would I get flamed for trying to broaden my skillsets? Cracking my own file would be a legitimate option for me. Nothing illegal, nothing taboo.
Thanks for the advice, any and all others are...
-
Yeah I liked Sygate a lot too. Great firewall, low memory usage too. Unfortunately Symantec bought the rights to the software and will not be releasing a new version. They probably just stole the...
-
I'm sure there's a way.
Unfortunately all my friend has left is the encrypted file. Nothing else, no recovery key, no hashes, nothing.
How can we crack this file?? What are the algorithms used...
|
|