Recent Posts

Pages: 1 ... 6 7 [8] 9 10
71
Hacking and Security / Re: wpa-psk TKIP crack
« Last post by proxx on Yesterday at 09:23:55 am »
Who threw in the NMAP suggestion ? da fuck.
All you have is the handshake right, no IP connectivity so no nmapping..

You could look for some specific vulns online but most of them wont get you very far.
A dictionary attack makes far more sense than this random character attack.

Did they change the SSID?
This is no hard math but often when people change the SSID chances are they change to key as well.
Considering most are not techsavy enough to understand the need for a proper password a dictionary attack with some alterations is probably the best shot you have.
Calculate that bruteforce time before you are actually attempting to do so, it quickly becomes a lifetime or 2.
Also you are running this on the metal with full driver support right ?
If not that is the first thing you want to do.
72
Hacking and Security / Re: Helping me testing my Cams
« Last post by DeepCopy on Yesterday at 09:19:08 am »
Are the camera's connected wireless or over ethernet ?
If they are connected wireless you are fucked basically, there is nothing more stupid than this.

They can run to a router that's not connected to the internet, and then either run the router as the VPN or a dedicated machine for more flexability.
73
Hacking and Security / Re: Helping me testing my Cams
« Last post by proxx on Yesterday at 09:10:17 am »
Hello Guys,
I am a bit paranoiac when it comes to privacy and I learned hacking basically for not being hacked. Yesterday I installed some cameras over the house and connected them to my hub they are controlled over ip. So I would like to test how secure these cams are I have Kali Linux installed and I want to know if someone can have access to them if he is connected to my wifi. If there any method that is know or techniques to try to "take over" my cams so I can set countermeasure. I really never tried it before. I don't want in details tutorial just the tool and a general idea.
Thanks fellow hackers
Are the camera's connected wireless or over ethernet ?
If they are connected wireless you are fucked basically, there is nothing more stupid than this.
74
General discussion / Re: Amd build your opinion
« Last post by proxx on Yesterday at 08:56:35 am »
I have always been on of those Intel people.
That is mainly because I know linux just runs better on it than on AMD.
As for power consumption, the speedstepping is really great, not sure how this is on AMD these days.
75
General discussion / Re: Amd build your opinion
« Last post by Darkvision on Yesterday at 07:22:14 am »
This:http://www.newegg.com/Product/Product.aspx?Item=20-145-345
is probably the most solid memory in the 4gb/ddr3 range ever produced, and its a damn good price. id advise picking up two sets. ( i still feel unless you do a lot of rendering anything over 16gb of memory is not really necessary, though mroe than 8 is advised for current games.)

The PSU is decent, but id suggest upping the wattage to 650-750, both for future expansion purposes as well as helping to keep the psu from being under a heavy load.

will echo those above me in recommending to also get a SSD, load OS/games to it, it will greatly reduce load times.
76
Hardware / Re: WD My Passport not accessible
« Last post by proxx on Yesterday at 05:54:51 am »
I used chkdsk /F /X /R and shouldve used /C also but I had to abandon ship with that process even though it was seemingly nearly done. Because my laptop is being troublesome and will not recognize the AC adapter being plugged in, I have an idea of when the problem may have occurred but for now I have live booted a linux system and am not liking my results, the chkdsk seemed to work great but now I ran a few commands on linux and it is the exact opposite

Code: [Select]
root@ubuntu:/home/ubuntu# fsck /dev/sdb1
fsck from util-linux 2.20.1
dosfsck 3.0.12, 29 Oct 2011, FAT32, LFN
There are differences between boot sector and its backup.
Differences: (offset:original/backup)
  65:01/00
1) Copy original to backup
2) Copy backup to original
3) No action
? 3
Both FATs appear to be corrupt. Giving up.
root@ubuntu:/home/ubuntu#


The GUI recognizes the drive but when I try to mount it, I get an error saying
Code: [Select]
Unable to mount HDD 3.0
Error mounting: mount: /dev/sdb1: can't read superblock

Any suggestions on where to go from here?
If you are going to ignore the suggestions then dont even bother to ask.
Never ever do that on the real data!!
Make a full byte copy of the entire drive first!

You can only mess it up twice.
77
Operating System / Re: (Link) A Guide to Writing Your Own Complete OS
« Last post by NHAS on Yesterday at 05:10:30 am »
Hey this is great I've been hunting around for a very long time for a good paper on building an operating system in C++ .

Big thanks for the share.
78
Operating System / (Link) A Guide to Writing Your Own Complete OS
« Last post by Daemon on Yesterday at 04:35:41 am »
Found this while browsing teh webz the other day and couldn't find it on the forums, it's an e-book guide in progress on how to make a complete OS and the Author does this in C++ .

https://github.com/SamyPesse/How-to-Make-a-Computer-Operating-System


Cheers,
Daemon
79
Hacking and Security / Re: help needed for a cyber challenge - level 5
« Last post by Architect on Yesterday at 03:24:54 am »
If you do manage to get it to work, or somehow or another mount the damn thing:
http://old.honeynet.org/scans/scan29/sol/spidernick/Scan29.pdf

That's the solution to a forensics "Scan of the Month" in which a compromised Linux Red Hat system was analyzed by a shit ton of security researchers/trainees. It might point you in the right direction. Good luck.
80
Java / Re: [question] Java decompiler for exe
« Last post by qespresso on Yesterday at 02:55:45 am »
Thank you very much for your response. I did it with no luck. Hope to see another solutions for this case. Cheer :)

Code: [Select]
C:\Users\buda\Downloads\jwscan>java -jar jwscan.jar SSH.exe

____ _  _ _ _    ___  ____ _  _ ____           _ _ _ _ ____ ____ ____ _  _
|___ |  | | |      /  |  | |\ | |___    __     | | | | [__  |    |__| |\ |
|___  \/  | |___  /__ |__| | \| |___          _| |_|_| ___] |___ |  | | \|
                             by Deque

scanning file ...

file name: SSH.exe

Exception in thread "main" java.lang.IllegalArgumentException: MALFORMED
        at java.util.zip.ZipCoder.toString(Unknown Source)
        at java.util.zip.ZipCoder.toStringUTF8(Unknown Source)
        at java.util.zip.ZipInputStream.readLOC(Unknown Source)
        at java.util.zip.ZipInputStream.getNextEntry(Unknown Source)
        at com.github.katjahahn.tools.Jar2ExeScanner.readZipEntriesAt(Jar2ExeSca
nner.scala:47)
        at com.github.katjahahn.tools.Jar2ExeScanner$$anonfun$getZipAddresses$1.
apply$mcZJ$sp(Jar2ExeScanner.scala:104)
        at com.github.katjahahn.tools.Jar2ExeScanner$$anonfun$getZipAddresses$1.
apply(Jar2ExeScanner.scala:102)
        at com.github.katjahahn.tools.Jar2ExeScanner$$anonfun$getZipAddresses$1.
apply(Jar2ExeScanner.scala:102)
        at scala.collection.TraversableLike$$anonfun$filter$1.apply(TraversableL
ike.scala:264)
        at scala.collection.immutable.List.foreach(List.scala:318)
        at scala.collection.TraversableLike$class.filter(TraversableLike.scala:2
63)
        at scala.collection.AbstractTraversable.filter(Traversable.scala:105)
        at com.github.katjahahn.tools.Jar2ExeScanner.getZipAddresses(Jar2ExeScan
ner.scala:102)
        at com.github.katjahahn.tools.Jar2ExeScanner.createReport(Jar2ExeScanner
.scala:78)
        at com.github.katjahahn.tools.Jar2ExeScanner$.invokeCLI(Jar2ExeScanner.s
cala:192)
        at com.github.katjahahn.tools.Jar2ExeScanner$.main(Jar2ExeScanner.scala:
173)
        at com.github.katjahahn.tools.Jar2ExeScanner.main(Jar2ExeScanner.scala)
Pages: 1 ... 6 7 [8] 9 10


Intern0t SoldierX SecurityOverride programisiai
Want to be here? Contact Ande, Bluechill or Kulverstukas on the forum or at IRC.