Преимущества использования 64-разрядной Windows 7

Преимущества использования 64-разрядной Windows 7

Преимущества использования 64-разрядной Windows 7

Все больше пользователей переходят на 64-разрядную операционную систему, а новые компьютеры комплектуются этой современной версией Windows 7. Так что же дает переход на 64 бита?

Вы можете использовать больше оперативной памяти

32-битные операционные системы ограничены использованием 4 Гб оперативной памяти (в действительности и того меньше). Это одна из главных причин, по которым пользователи выбирают 64-разрядную версию Windows и других ОС.

Расчетная величина оперативной памяти, с которой способна работать 64-битная ОС, равна 17 миллиардам гигабайт. Хотя корпорация Майкрософт в своих продуктах ограничивает эту величину 8, 16 и 192 Гб из-за вопросов лицензирования, а не физических возможностей компьютеров.

Увеличение производительности

64-битная операционная система позволяет не только устанавливать больше оперативной памяти, но и использовать ее эффективнее. Также, благодаря 64-битного способа обработки данных, вторичные системы (например, видеокарта) будут меньше занимать памяти.

Backtrack 5: Metasploit attack on Windows 7 32 and 64 bit


Описание:
Today, I show you how you can use the metasploit framework together with the social engineering toolkit to create and deliver a payload to a remote target. This video is completely educational and I do not endorse nor recommend and sort of "black-hat" hacking.

Credits
==========
Backtrack———-http://www.backtrack-linux.org
Tutorial #1 ———http://www.backtrack-linux.org/forums…
Tutorial #2 ———http://www.question-defense.com/2009/…
UAC Bypass ——https://www.trustedsec.com/files/bypa…
Metasploit ———http://www.metasploit.com/download/
VMWare Player — http://www.vmware.com/products/player

Technical
==========
Created by —— Joseph North
Capture ———- Camtasia Studio 7
Microphone —— ASTRO A40 Built-in Mic
Software ——— Adobe Premiere Pro CS5

Комментарии:

homes24 пишет: and what if there is a 3rd party antivirus instead of windows defender, how u gunna disable that

Mark Buhh пишет: How to start Backtrack?

ReconTek пишет: I have no idea what you are trying to ask me.

SuperFailSpy пишет: Before you do the part where he tells you to do "./set" do "svn update" That fixed it for me

Kenneth Kwateng пишет: What are you trying to say and where do you know me from jayynecobb?

Mohammed K. Ali пишет: learn Metasploit from the MineCraft Guy…….. :)

Zeroc00l300 пишет: is it possible to hack windows 7 on port 135 netbios didn't work thought its port 139

Mohammed K. Ali пишет: وين اخلاق دينك P:

sudo aptget пишет: You missed old ruby there;(

Raman Walavalkar пишет: May i know your Full name Ashok!
and do use facebook

ReconTek пишет: Well thanks for the sub, it means a lot to me. And yes, people don't seem to understand the negative repercussions from doing this anywhere outside of a pentest on their own system or for a client. Anyone thinking of doing this criminally is a fool. All of this leaves easily traced footprints that will lead right back to you. At least you have the better judgement to do otherwise. The same can't be said for all.

ReconTek пишет: Oh absolutely, it can break through anything. All you need is a diamond pickaxe.

vivek trivedi пишет: it might not work if there is a firewall in other pc

Innanet Stalka пишет: Minecraft: The most powerful utility ever

Sushil Dc пишет: very nice

sudo aptget пишет: forumotion* LOL Make a real site. dude.

ReconTek пишет: msf.exe is the payload that you generate. it's located where ever you decided to create it.

ReconTek пишет: MSF.exe is created in whatever directory you decided to make it in. Not much I can do to help but tell you to pay attention to where you are running things from.

Matthew Boyette пишет: Just wanted to point something out: Picking 443 for the listener doesn't help you as much as you think it does. When you connect to a remote server implementing SSL, the remote server is listening on their port 443; you are not necessarily sending your data through your own port 443. Also, two applications/servers cannot both be bound to the same TCP port so your backdoored EXE trying to listen on port 443 will be prevented from doing so by whatever web server happens to be running.

Tuan Vy Tran пишет: excuse me! but i can't find the file msf.exe, where is it ? HELP ME

MRhammerJammerable пишет: This is detectable by both McAfee, windows firewall AND Norton, and proberbly a bunch of other anti virus programs!

Pompiduskus пишет: Thank you Dude )) it's a pleasure to watch yoars videos, And its realy funny to ))) thx

jayynecobb пишет: ugh why is BT6 (Kali) so effed up? This is way better

ReconTek пишет: Did I say I was showing you how to hack the fucking Pentagon here? I didn't say I was showing you some advanced hacking or anything to that extent. If you're unsatisfied with the video I don't know what to tell you, look somewhere else. What's the point of posting this on my video? It's not contributing to the community nor it is helping to teach anyone so I'd appreciate if you leave these kinds of comments in a message to my inbox.

Kait Seth пишет: This isnt hacking. This is script kiddying at its finest.

Khien Do пишет: please. i am a student. i'm learing IT. i very like hack. and i i'm leaning c#. i have a question. i should learn language? c, c++ or………
i search many forum an ebook. hackers use C and python perl. plz help me
thank u

AnorexicSeal пишет: That i do know, i have VMs with different types of AVs also i can write my own payload all iam trying to do now is to get my actual Immunity Debugger to learn NOP hands on but i cant get it.

puredevill пишет: Can somebody help me hack facebook game? War commander is the name of the game.

ReconTek пишет: I use Xubuntu 13.04 on my laptop and Windows 8 on my desktop.

ReconTek пишет: The bypassuac script automatically opened a second session.

ReconTek пишет: Yes, I'm sure it's possible to do but you will have to do a bit of digging through a network to find something usable. I found an old article on the subject that might be handy. I'll send the link to your inbox.

x99wildonesteam пишет: thanks boss

RaYn CJ пишет: i cant connect to srever i connect but give me error

Bam Kovacs пишет: doesn't using ''n00b'' mean you're a noob? i don't know though xP

smuggbg пишет: …then how the second session started?!?…you are in meterpreter> when a second session started?

Harry Tris пишет: Can you explain about the bypassUAC please ? I did download that and how can I use that in meterpreter session ?

Mac Sam пишет: u need a hardwire connection to do this right? wireless dont work?

Akrofilero пишет: Thanks for the tutorial. These ip's are internal, is there a possibility it can be done whitout being connected to the same router ? Good work

Steven Verheezen пишет: Thank you, and yess i come from holland. So my english is not so good

ReconTek пишет: kill the process or get around it.

Bajskorv? пишет: Thank you for your reply! =) Appreciate it.

The reason i asked is because the bypassuac doesnt seem to work when migrated to Notepad. And i've read that it can cause Bypassuac to behave weird.

ReconTek пишет: Hack how? There are a lot of different things you can mean by that. Do you mean just getting access to the network? Or actually getting root access to the device?

Macadoof пишет: I just discovered this video and I must say that you are pretty good. Honestly I knew most of the things you did except for the disable UAC, I never really understood why I needed to. If people dont understand this then… I dont know what to say. This is really good for learning the possibilities you have do with Backtrack and WIN. Well done mate, well done.

sudo aptget пишет: Partion your Hard Drive in half. If you wanted Ubuntu or BackTrack (use ubuntu windows installer, if you have Windows) if not just download backtrack and extract into the new partiton and reboot.

ReconTek пишет: Nessus is great, especially since you can import the report into armitage.

Malcolm Boyd пишет: That is a comment for another video

zezo alharazi пишет: hey bro .. why do we have to send something to the victim , its same the RAT program like spynet . i really would like to found the way to hack someone with out sending anything , sure i need a exploit that work in windows 7 , coz xp have it , but for 7 i search a lot i couldn't found it , anyway thanks , and i will keep watch ur videp :)

Stef Timpau пишет: is this working with kali linux or is just for backtrack?
thank you so much

Macadoof пишет: No problem, I know, take credit for making the video though. I think I disabled UAC manually before I tried doing this. Anyways, I hope you'll upload some more videos. I just hope people are concerned about the consequenses of doing this to random people you know. There are alot of people that just search up hacking on forums and get in trouble for it. Just keep it going :) Subscribed and liked!

Tiago Simões пишет: i'm getting the same error

smuggbg пишет: idk….reaver is useless against wps lock on…

FloppyDisk0 пишет: i might be wrong with this question but..does it work over wireless wlan0 instead of eth0

Montauk1111 пишет: Yeah this video is just crap. You really don't know what's going on and you're setting up all sorts of ftp stuff… lol make it as EASY as humanly possible. Sorry bro. I stopped watching as soon as you started typing passwords in

Darren Vortex пишет: Are the other windows exploits? This UAC bypass is the only one I've ever found!

smuggbg пишет: I did not get second session.The lesson is great,I only cant make that remote desktop connection — everything else works as a charm ;)

Kenneth Kwateng пишет: I am sorry i am not hearing and seeing anything in this video.
can you please re-post this video. Thank you.

Mega Mente пишет: The backtrack so invades the network computers, or computers also invades from outside?
I need your answer as fast as possible

ReconTek пишет: Ok, well seeing as how that's illegal I'm not going to help you with that. If there is anyone who would help you hack a neighbor's router they are extremely irresponsible.

TheEvileYee пишет: how i can dual booting

EvEngl пишет: thanks for reply ) I figured out how to get it from set! ))
but now I stuck in run bypassuac! ) it's on my desktop — I suppose it's wrong. I should put it to ftp? or how it can be run? cos I've got = could not be found

Tiago Simões пишет: apt-get update && apt-get install framework3

puredevill пишет: Nope its not my router, its a nabours router. I use to use it till they switched provider and has a password on it now.

ExemptOA Æ пишет: Ok so im trying to do this exactly, but every time i get to backdooring the exe i get this error..
[-] Backdooring a legit executable to bypass Anti-Virus. Wait a few seconds…
ruby: No such file or directory — /opt/metasploit/msf3//msfpayload (LoadError)
[*] Backdoor completed successfully. Payload is now hidden within a legit executable.
[*] UPX Encoding is set to ON, attempting to pack the executable with UPX encoding.
[-] Packing the executable and obfuscating PE file randomly, one moment.

ReconTek пишет: As for you, learn to spell before you try to flame you wannabe tough guy.

ReconTek пишет: The UAC Bypass is a metasploit module.

Shaheer mahmood пишет: use nmap, google if you dont know how it works.

AnorexicSeal пишет: lol you dont even know what you are talking about

Ahmed Essam пишет: ليش تمطك ابن الكلب :)

robert hagen пишет: Do I have to install the msf.exe file or? cause I get this " Your payload is now in the root of directory of SET as msf.exe. I've watched your clip many times now and done exactly as you have but seems like there is something wrong with the version or something?

ISaaCi521 пишет: So what OS do you use?

Frank Doberman пишет: cant pass comodo
lol

jonny jon пишет: google hackerszone.forumotion

smuggbg пишет: actually there is a slight correction in the listener/payload settings for the x64 systems

for the listener — windows/x64/meterpreter/reverse_tcp
for the payload Windows Meterpreter Reverse_TCP X64

creds to p0f

puredevill пишет: I didn't mean make a video on it, I was just wondering if you knew how to and if so to just tell me how to, doesn't matter anyways, oh by the way, you know how to hack a wireless network? Pref Virgin Media wireless router?

brok3n proxy пишет: when i run 443 port it stops working and they say nameerror :name 'choice2 in not difined

Gypsy Bostwick пишет: is the victims computer going to be showing those security alerts? wouldn't that defeat the purpose? I'm just a little confused, are you using your machine that is running a virtual machine with bactrack as the victim machine?

Henry arms пишет: mine didnt work comes up with this: cp: cannot stat `msf.exe': No such file or directory
and i put in cp -rf msf.exe ~/Desktop
and the symbol you put at ~/Desktop the ~ is that the right one?

AnorexicSeal пишет: true but when he/she did the video it was based on a 32 bit also you would be a total noob if you dont read the payload and the listener to make sure you got it right.

Payl0ad пишет: Any antivirus testing on this 'backdoored executable' ??

ReconTek пишет: Yeah it probably will not work if there is an active firewall, but there are always those people who don't use one. Plus getting past the firewall is half the fun anyway,

LeonNova пишет: ZUNE!

ReconTek пишет: Yeah I think I may have forgotten to mention it in the video that it is an external module that I installed into the metasploit framework. The link to the module is in the video description.

ReconTek пишет: Sorry but no, that's child's play.

ReconTek пишет: Most likely no, you'd have to deliver the payload in a different way.

Henry Flynn пишет: Hey — I tried this on a 64bit Win7 install. Followed the readme and when I ran run bypassuac at meterpreter it told me "stdapi_sys_process_execution failed: The version of %l is not compatible with the version your running. Check your computers system information to see whether you need a x86 or x64 version of the program and then contact publisher…. So is this bypass program independent of 32 / 64 bit? — Sure like to get it going…

ReconTek пишет: Alright well I'm guessing English isn't your first language but I think I get what you mean. Metasploit is an extensible framework written in Ruby that is basically a command center for you to launch multiple attacks simultaneously against one or several targets There's a lot more to it than that of course but to get more in-depth about it requires a lot more than 500 characters. I hope that helped a bit.

Metis M пишет: Use virtual machine

Are Sega пишет: you better start reading….silently …. Backtrack 5: Metasploit attack on Windows 7 32 and 64 bit

ReconTek пишет: Odd, are you sure you're running it from within a meterpreter shell on the victim's box?

Ricardo Pizarro пишет: Nice tutorial. Please post other videos related to metasploit.

homes24 пишет: and what if there is a 3rd party antivirus instead of windows defender, how u gunna disable that

Mark Buhh пишет: How to start Backtrack?

ReconTek пишет: I have no idea what you are trying to ask me.

SuperFailSpy пишет: Before you do the part where he tells you to do "./set" do "svn update" That fixed it for me

Kenneth Kwateng пишет: What are you trying to say and where do you know me from jayynecobb?

Mohammed K. Ali пишет: learn Metasploit from the MineCraft Guy…….. :)

Zeroc00l300 пишет: is it possible to hack windows 7 on port 135 netbios didn't work thought its port 139

Mohammed K. Ali пишет: وين اخلاق دينك P:

sudo aptget пишет: You missed old ruby there;(

Raman Walavalkar пишет: May i know your Full name Ashok!
and do use facebook