addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupsimageimagesinstagramlinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1outlookpersonJoin Group on CardStartprice-ribbonImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruseryahoo

Re: [NESIT] Thanks for stopping by

From: john
Sent on: Tuesday, June 4, 2013 10:34 AM
This is Childs Play man, lets get into creating reverse shells or simple worm creation, then create our own worm/exploit, iv been working on a super stealthy program that once ran on a windows 7 PC (and will prob work with windows xp as well) a bunch of kittens walk around the screen (I set it ro a random day/time execution). That's all this worm does , spreads kittens. infect one computer with kittens scan their network for this vunerbility and send the kittens to the next PC. it will be the most adorable non evasive (kind of) worm ever.

--- On Tue, 6/4/13, William Reyor <[address removed]> wrote:

From: William Reyor <[address removed]>
Subject: [NESIT] Thanks for stopping by
To: [address removed]
Date: Tuesday, June 4, 2013, 6:47 AM

Thanks to everyone that was able to make it, I hope you found the class interesting, educating, and entertaining.

One thing for the future be sure to have backtrack/kali setup ahead of time - anticipate this will take a good hour.

For virtual box see instructions here:

For Parallels desktop be sure to choose linux type debian and disable the "Show battery" option to avoid the crashes that Nick saw last night
Or lastly just make a USB bootable distribution, and plug into any machine that's available.
For next mondays workshop we'll be focusing on active reconnaissance (sneak peak here:  http://null-byte.wonderhowto.com/how-to/hack-like-pro-conduct-active-reconnaissance-and-dos-attacks-with-nmap-0146950/) For this workshop Kali is required, this will focus strictly on our test environment.
 
We hope to see you there!

Thanks,
Bill




--
Please Note: If you hit "REPLY", your message will be sent to everyone on this mailing list ([address removed])
This message was sent by William Reyor ([address removed]) from NESIT Hackerspace.
To learn more about William Reyor, visit his/her member profile
To unsubscribe from special announcements from your Organizer(s), click here

Meetup, POB 4668 #37895 NY NY USA 10163 | [address removed]

Our Sponsors

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy