wasadeq

Members
  • Content count

    13
  • Joined

  • Last visited

Community Reputation

0 Neutral

About wasadeq

  • Rank
    Newbie

Contact Methods

  • Yahoo
    walsadeq
  1. Dears, My PC has been working nicely up until few days back where I noticed that whenever I turn on the hub that is connected to PC, the PC immediately restarts and won't boot at all (keeps restarting)!! I checked settings for NICs but all are normal. I also got doubts about a software that I installed lately called "Hamachi" from logmein. I uninstalled it although I could not take it off the registry entries but the problem persists!!! Any ideas please ... Thanks in advance.
  2. Dears, My PC has been working nicely up until few days back where I noticed that whenever I turn on the hub that is connected to PC, the PC immediately restarts and won't boot at all (keeps restarting)!! I checked settings for NICs but all are normal. I also got doubts about a software that I installed lately called "Hamachi" from logmein. I uninstalled it although I could not take it off the registry entries but the problem persists!!! Any ideas please ... Thanks in advance.
  3. As a windows normal domain user, I am looking for a tool that matches up logged-on user names into their corresponding IPs and vice versa. For instance, I know the username used on some PC but have no idea what the IP for that PC is! Moreover, for an IP I need to know who the logged usernames are? Appreciate your help and many thanks,
  4. I deeply appreciate your guidance on the following urgent matter. I have undertaken the CISA exam two weeks ago and deeply hope to pass. I took a lot of time and effort to prepare and study for the exam. Although I worked in security before, I have learned many concepts and came across many AUDIT TOOLS that I am in need to grap and practise on. My question is, I am in need to be REAL in-the-field auditor and use those TOOLS that I have read about. I tried to search for a source in the net but I was not successful. PLEASE tell how to proceed and put my hands on such tools and their documentations to start the real work and feel more confident. Thank you in advance.
  5. Hi, I am preparing for CISM (Certified Information Security Manager) exam and would kindly like someone with exam material to support and share. Recommended materials are: CISM Review Manual 2010 CISM Practice Question Database v10 English Edition If you thankfully would like to help, you can pm me or use email: walsadeq@yahoo.com and I would be greatful. BR,
  6. It seems that I am facing a display problem on HP Compaq 6510 notebook and HP dc7900 small Form Factor desktop PC too when starting from Auditor linux CD. After booting, resolution options displayed normally, but when selecting any option the display turns black !!!!! Currently I am looking for an up-to-date display driver but if anyone has an input please do feed me with. Many thanks.
  7. Hi There, Local Admin account got corrupted somehow. I can not login with it anymore. I have ways to reset the password by booting with OS CD or a third party software. The problem is that I am not able to boot from CD nor USB even though it is set in BIOS!!!!! Pls acknowledge and for inquiries let me know. Thanks
  8. I don't have the key but practising to break the key. My dilemma is with aireplay-ng command when trying to authenticate into AP and get associated with. It is not accepting at all and keeps displaying "sending authentication request (open system)" without receiving any ACK responses although I used my own wifi MAC and then doubted that AP might be applying MAC filtering therefore I used a spoofed MAC too (which is authenticible to AP) but I wasn't successful and got same response. Thanks for any valuable input.
  9. No I dont have CEH but preparing for it. I am sure that this is one of best sites i can get an answer into my querry although I haven't received fruitful answers yet. Kindly acknowledge.
  10. Dear all, I need some guidance here. I am practising on penetrating into a friend's wi-fi that is encrypted with WPA key. The point I am stuck with was when trying to authenticate using a fake MAC address. The fake address is allowed to authenticate since it is used by a station in that net and I ran deauth in prior. BTW, this is may help, when I ran deauth I noticed that the station I am attacking was still displayed in the auth. stations list. Does it mean it is still connected and this explains why I am not able to auth. using its address or what? Please acknowledge and thanks in advance.
  11. Buddy I am not breaking any security nor policy. I am trying to get useful materials to read to prepare for exams and so forth. Company's Sec configs are the stupid thing in the middle. Tell me something if you have any solutions.
  12. Sorry there was a typo. I meant to say I am not the netadmin but a user in IT dept. I have no special privileges. Is there a way to bypass this troublesome setup using a client proxy or so. Thanks a lot.
  13. Dear all, I have a real problem at the workplace. I am the Net Admin but an ordinary user along with others who really suffer from added network security precautions even on downloading useful material such as rapishare site and similar ones. Whenever I find good resource or so I am faced with the Websence screen blocking me from doing so. Setup has Websence, firewall, proxy ... and name it. PLEASE tell on a way to bypass this "Alkatraz" cage if possible. Thanks a lot. wasadeq