So now i should?
http://download.insecure.org/nmap/dist/nmap-4.65-setup.exeh
http://www.sofotex.com/downloads/d14815.html
those might work :happy:
You should spin around in circles, press escape three times, and hold insert and F9 for 12 seconds exactly. Any more or any less will result in the death of your IP fairy and your chances for hacking any poor noob you might run into.
Once you have that done, you must open the command prompt, change the font color to green, and start typing random things in with the IP at the end. Eventually you'll figure out the victim's phone number. That's where things begin to get fun. Put the person's phone number before the IP, and you'll get unlimited access to everything that he owns, including, but not limited to, credit card info, name, location, and 18 year old daughter.
In all seriousness, though, google shall provide. I'm sure there's tons of articles/forum posts here that could help, too.
Oh, and by the way, nmap is kind of like JTR. It operates through the command prompt.
Futility wrote: You should spin around in circles, press escape three times, and hold insert and F9 for 12 seconds exactly. Any more or any less will result in the death of your IP fairy and your chances for hacking any poor noob you might run into.
Once you have that done, you must open the command prompt, change the font color to green, and start typing random things in with the IP at the end. Eventually you'll figure out the victim's phone number. That's where things begin to get fun. Put the person's phone number before the IP, and you'll get unlimited access to everything that he owns, including, but not limited to, credit card info, name, location, and 18 year old daughter.
hahahahahaha…. but seriously he's right
kiyoura wrote: Learn HTML at least, in order to have SOME kind of knowledge.
HINTS Google is your best friend, abuse it. Google XSS, SQL injections, JavaScript Injections, PHP injections, HTML injections and the word "exploits".
So you mean if you want to check a system (which I suppose is a personal computer in this case) for vulnerabilities, HTML and javascript injections are the most important things to know? Geez…
He wasn't talking about pentesting a website, you know ;)