Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - Kulverstukas

Pages: 1 ... 68 69 [70] 71 72 ... 357
General discussion / Re: Lock picking.
« on: April 24, 2014, 03:56:54 pm »
Haha good thing I did some reading before I bought mine :D
Where do you plan to buy yours?

Android / Re: dSploit - android network pentest suite
« on: April 23, 2014, 08:57:59 pm »
How can i use the hijacked session which i did using dsploit ? The file format is in .dhs. 
You swallow it.

Reverse Engineering / Re: Reversing Office files
« on: April 23, 2014, 08:13:02 pm »
That looks like HEX and why would you need to encode it? I think you meant decode and it translates to garbage, so it's taken from some binary data.

General discussion / Re: Lock picking.
« on: April 23, 2014, 06:17:42 pm »
Ahhh, well i got the PXS-14 now and it's also great. I just liked to have more different hook picks but i can also order those to have with my current set :D
I read that PXS-14 is not made for EU locks. Slim type lockpicks are for Japan and EU locks, with slightly narrower keyways and whatnot. So that's why I bought those (were shipped today btw).

Hacking and Security / Re: My computer got infected
« on: April 22, 2014, 07:02:50 pm »

Also if you are going to reinstall the OS, why would you go through all the hassle removing stuff in the first place?
If it's a nasty case of rootkit, then you should do that...

General discussion / Re: Lock picking.
« on: April 22, 2014, 07:01:15 pm »
Ok, finally found a shop that seems legitimate and the prices EVEN with the shipping aren't as bat-shit crazy as others.
I just ordered this set:
With shipping and tax it was 26GBP (44$), including some free book about tumbler locks.
According to their terms and services I should get the set in 30 days since shipment. So we'll gonna have to wait and see. Gonna post pics when I'll get it :D

Members introduction / Re: alpaca
« on: April 22, 2014, 03:58:33 pm »
That isn't such a long period at all. Welcome back, it's nice that you decided to come back :)

Weekly challenge / Challenge 13 - Arabic to Roman
« on: April 21, 2014, 08:39:55 pm »
I have started reading a book titled "Data Structures and Problem solving using Java" (which is a really nice book btw) and at the end of each chapter it has some cool tasks to code, so I thought I could post more interesting ones as challenges to do in other languages as well :)

Here's one:

Write a program that receives input, which is a number, from the command line and prints that number in Roman form.
So, 10 == X; 11 == XI and so on.
Bonus points for making it work for large numbers, maybe up to a thousand or larger, not just 2 digit numbers.

Hardware / Re: Hardware destroying virus
« on: April 21, 2014, 08:29:43 pm »
It is possible and was done in the past. However it's very unlikely nowadays.
You didn't define the hardware you are speaking of, so generally speaking yes it is possible. There was a way to override the firmware of a MACBOOK battery to make it explode (sorta) and Stuxnet was built to destroy centrifuges in Iranian nuclear power plants by making them spin out of control.
Back in the day it was much easier to make computer hardware go poof and I know of one virus that was designed for that purpose, watch this video:

Hacking and Security / Re: Helping me testing my Cams
« on: April 21, 2014, 10:53:00 am »
Well generally IP cams (if that's what you are referring to) have a simple log-in interface with no break-in countermeasures. Cheaper cams just gives you a basic HTTP auth window which can be easily brute-forced with shit like THC-Hydra or Medusa (personally I like Medusa more).
For countermeasures, I'd say, if it is possible, assign them local static IPs from your router DHCP and only make them accessible from the inside of your LAN. Oh and set an uber strong password too.

Members introduction / Re: Im Mopex
« on: April 21, 2014, 10:45:52 am »

Members introduction / Re: Hello World
« on: April 21, 2014, 10:36:41 am »
Oh hello. Simple and concise, this intro will suffice, yes the rhyming was intended, you should do the same if you didn't get suspended!

welcome OP, have a cookie.

One does not need fancy exploits to pull a prank on a computer on the same LAN. IMO netcat would work fine. You'll need to disable a firewall and probably turn off any AV's he has, or at least include netcat as an exception.
Netcat is a nice little tool and it can be set as a simple backdoor to listen for incoming connections, and when you connect it drops you a shell in which you can do pretty much anything, that is if you know how :D
This might help, but you really don't need such a lengthy "tutorial" complete with images lol:

Code: [Select]

General discussion / Re: cubox , the worlds smallest computer
« on: April 20, 2014, 07:58:46 pm »
Damn that's tiny :D I doubt it could get even tinier, but technology tends to astound me.
It's really cool, run on Android it seems. The way I see it, this tiny computer is built to be more like a storage server or a media center, which is very cool.

Look out RaspPI, there's a new kid in town :D

Feedback / Re: EZ embedded dev board
« on: April 20, 2014, 03:46:36 pm »
That is a nice idea indeed. I like it, however my narrow hardware mind cannot think of any uses :P
That ethernet logger seems like a legit idea, but it would need to be programmable to capture specific things :)

Pages: 1 ... 68 69 [70] 71 72 ... 357

Intern0t SoldierX SecurityOverride programisiai
Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.