Jump to content

blueghosties

Active Members
  • Posts

    8
  • Joined

  • Last visited

Recent Profile Visitors

505 profile views

blueghosties's Achievements

Newbie

Newbie (1/14)

  1. I think I will do just that. I will go over the source and get it ready for review.
  2. You wouldn't know, would you? If I'm not to be trusted, then why would you trust someone you've never known, never met, allow their app on your device at all? If that's case, you shouldn't trust anything on the market to begin with. I'm trying to make a start and hopefully help some people along the way. If people consider what is now known about 'agencies' as a tinfoil hat, then I guess they've made a choice for a blindfold instead. I will gladly allow people on this forum to beta test and try to hack the app if it will help make a more secure program. I will even go so far as to offer certain individuals access to the source code to verify that it is what it is.
  3. It seems that Signal has been under gag order from 'the Courts' for over a year and most likely had to give backdoor to agencies. WhatsApp is owned by FaceBook...that's been a CIA monitoring tool before shares went public. MixyBits doesn't have any messaging capabilities, so it won't be transmitting any data...but could be used in conjunction with Signal and WhatsApp. Keys can be generated easily and shared if one has the ability to share those Keys securely. It has become increasingly difficult to make anything secure these days, but I'm damn well going to try. Help from you and others in the 'security' field will up the chances of that prospect coming to fruition. We all deserve to have a voice without being monitored by a Nanny State. If they won't allow it, then we have to create it and do it anyway.
  4. The app is geared toward everyday users. Uses AES 256-bit encryption. It is strictly text based for the moment. My aim for this app is to give back privacy to users. It seems that with the expanse of the CIA operations, everyone, everywhere seems to be a target. I'm hoping that no one using my app would be a target for the CIA, but it's no longer our definition of who is a target, it's now the government that declares it. I'm hoping to protect journalists. When Trump can claim them as a 'enemy of the State', anyone speaking out then would be as well. I want my app to help allow those voices to continue. Please pardon my waffling.
  5. /** * Created by blueghosties on 31/03/16. * this is a simple port scanner that I wrote. * Nothing spectacular, just does what it's suppose to * do. * When it hits an open port, it logs time, date, * IP and port. * I was going to implement ability to jump across * a range of different IP addresses, then * decided against it as it would raise flags. * Thinking about introducing randomised time * between scans as that would lessen the * suspicion of the scan. * * OK...so I implemented the random timing, so shoot me. * You like...no? (said in an outrageous French accent) * * This has been tested and run on Mac OS X * el Capitain, Sierra, Windows 10 and the intel Edison. * Yes, it runs on that awesome, little board. * * I am not responsible for any misuse by others * from running this program or damage that * may be caused by it. You're on your own. * * Enjoy. */ import java.io.*; import java.net.InetSocketAddress; import java.net.Socket; import java.util.Date; import java.util.Random; import java.util.Scanner; public class PortScanner // Super secret code name clPortPoke { public static void main(String []args) throws IOException { int starting_port, ending_port, rand_delay; // BufferedReader s_in = null; // Time to get some....input Scanner input = new Scanner (System.in); System.out.println("ᦐ Blue Ghosties' Simple Java Port Scanner ᦐ"); System.out.println("--------------------------------------------"); System.out.println("Enter in IP ADDRESS: "); String ip_add = input.next(); System.out.println("Enter in starting port: "); starting_port = input.nextInt(); System.out.println("Enter in an ending port (65535 is your limit): "); ending_port = input.nextInt(); System.out.println("Did you want to randomise scanning delay? y/n "); String delay_it = input.next(); String delay_ans; Random randomGenerator = new Random(); // using a delay range....muhahahaha....EVILLE!!! rand_delay = randomGenerator.nextInt(666); if(delay_it.equals("y")) { System.out.println("Delay starting at: " + rand_delay); delay_ans = "yes"; } else { System.out.println("Full throttle...perfect. Vroom vroom!!!"); rand_delay = 0; delay_ans = "no"; } System.out.println("Delay starting at: " + rand_delay); System.out.println("Now checking: " + ip_add); System.out.println("----------------------------------------"); // log file will be written wherever the app is located File file = new File("java_hits.txt"); // You can scan to port 65535 for (int port = starting_port; port <= ending_port; port++) { if(rand_delay > 0) { // Take a random nap...program has narcolepsy // Making sure rand_delay isn't 0 // Trying to mask scan with erratic signal rand_delay = randomGenerator.nextInt(666); rand_delay = rand_delay + 1; System.out.println("Delay set at: " + rand_delay); } else { rand_delay = 0; } try { Thread.sleep(rand_delay); } catch (InterruptedException e) { e.printStackTrace(); } System.out.println("IP -> " + ip_add + " Port: " + port); try { if(!file.exists()) { file.createNewFile(); } else { // instantiate new socket object Socket socket; socket = new Socket(); socket.connect(new InetSocketAddress(ip_add, port), 100); // s_in = new BufferedReader(new InputStreamReader(socket.getInputStream())); // Need to make sure we log any hits with time, date and ports. FileWriter fileWriter = new FileWriter(file, true); Date now = new Date(); // All output to file is below System.out.println("IP -> * " + ip_add + " Port " + port + " is open *"); // System.out.println("Server responded: " + response); String str_start_port = String.valueOf(starting_port); String str_ending_port = String.valueOf(ending_port); String bline = "--------------------------------------------------------------------------\r\n"; String strPort = "ᦐ Scanning ports between " + str_start_port + " and " + str_ending_port + " ᦐ\r\n"; String data = "--> IP Address: " + ip_add + " Port: " + port + " is open. " + now + " <--\r\n"; String delay_set = "--> Was random delay set for the scan? <-- " + delay_ans + "\r\n"; // IF we hit something...log it! fileWriter.write(strPort); fileWriter.write(data); fileWriter.write(delay_set); //fileWriter.write(server_response); fileWriter.write(bline); // These pipes are clean! Close the connection. fileWriter.flush(); fileWriter.close(); socket.close(); } } catch (IOException ex) { //ex.printStackTrace(); } } System.out.println("We're finished."); } }
  6. Greeting all, I am writing an encryption app for both iPhone and android devices and have come to a fork in the road...(ooo, bad pun)...I wanted to create a 'Save' option to store the encrypted texts locally on the device, but after the revelation of vault 7, I am thinking that maybe it's better to have users save their texts off device elsewhere. The Key is generated on the device locally and stored locally. The Key is protected and has self destruct mechanism, but my concerns are that they would both reside on the device and then could be fully compromised. With the ability of these agencies, where do we go from here? My question: would it be better to save off device or just store it locally? Any thoughts and elaborations are greatly appreciated.
  7. I'm able to now connect and get internet connection through the Pineapple, but when I try to connect to get firmware updates or Show IP address, it gives Error Connecting. I have connection, obviously, through my AP, not understanding why I'm not able to get IP address on the Pineapple itself. It shows in Client Mode the connection that I have on wlan1 and that it has an IP. Is there a configuration setting that I missing? Did I set something wrong? Followed tutorials on setup and Linux connection sharing...using Kali Linux. bg
  8. Greetings all, The Wifi Pineapple did work before. I'm not sure what's going on with it now. I'll state that I have been through many videos on connecting through Linux, I am using Kali Linux 2.0 on an Alienware 14. When it first powers on, I get the Red and the Green light at the same time and they are solid, not blinking. The Red turns off and the Blue turns on while the Green remains on. The Blue does occasionally blink. When I connect the Ethernet cable to the computer from the Pineapple, the Amber light goes on. Connecting to the Pineapple from a browser, it logs in just fine...I get all the common panes with the default firmware. Under the Network pane: Wlan0 Enabled. | Disable Wlan1 Enabled. | Disable Internet IP: Error Connecting LAN: 172.16.42.1 Wlan1: N/A Not understanding why Wlan1: N/A When I try Client Mode...I can connect to the network, yet no ip...nothing. There is no Interface: selector at the top of the Client Mode pane, where you can choose wlan0, wlan1, etc. Not even there. When going into Client Mode, the Red light will come on momentarily, then turn off. It will list wlan1 under connected then when I go to Main Screen to show IP, I get 'Error Connecting'. I'm at a loss on what to do next. Thanks.
×
×
  • Create New...