Jump to content

RickD

Active Members
  • Posts

    12
  • Joined

  • Last visited

Recent Profile Visitors

662 profile views

RickD's Achievements

Newbie

Newbie (1/14)

  1. Imho the only thing you will get out of certifications is the fact that you can pass the recruimtent/hrm stage of getting a new job/project. These days, in that stage, talking about your skills is not important because these people would not understand what you are saying. They just wanna check the default boxes on the hiring form so their ass is covered when anything goes wrong in a later stage. And some of the best tech people i worked with didn't have any kind of post college certifications, and i think there is little of no connection between skill and certain certs (i've also seen certificated people who could only use pre-learned procedures, unable to be creative and think outside the box). So my advice is. Unless you are a great networker and can circumvent hrm, first look what certifications you need to get the job you want and then just get those. That being said. I think the world would be so much better if hrm and recruitment was removed from the hiring chain, and would just do the paper work (and maybe provide some information) at the end of the proces like they used to do and were meant to do in the first place. But maybe i'm becomming an old cynic and don't understand the new world.
  2. Hello all, I was wondering if a method exists to hide a windows window from a remote terminal connection snooper (like a domain admin or such). Same for a usb disk station, but i think that is harder to do. Like giving the window a false windows id so, the tsc protocol won't pick it up, or something like that. This way you would be able to work safely on a desktop without someone else on the network looking in on you. Regards, Rick
  3. I've been playing around with kali live persistence last week, and decided i need a full bootable install on the stick for it to be usable. I have two questions about that: 1) Is a usb stick robust enough to run an os from, or does it fail after 100.000 or something writes, and should i use a usb harddrive instead. 2) Is it possible to make it boot from the usb stick/drive directly (not the mbr on my hd) by using the default kali installer, or does it need some custom grub installation. This whole thing seems to be extremely tricky anyway and is probably best done when the main hd is unplugged. Regards, Rick
  4. Is it possible to use veracrypt from the usb stich only (without it being present on the host,only a container with the data and a veracrypt executable to unlock it on the stick) ?
  5. Hello all, I'm looking for an easy way to password protect the data of the usb stick that is on my key chain (should work on at least any windows machine without special software on it). Doesn't have to be nsa grade protection , just not easy to use if i lose it and somebody finds it. Until now i used an u3 stick with a build in partition loader and password option, but that one has become too small, and the new one doesn't have any kind of build in protection. And rebuilding the new stick as a u3 seems to be hard if not impossible. I still find it strange that these days regular usb sticsk don't come with some kind of hardware pin code option. And most encrypted container software options are either not free or need to be installed on the host computer. There are probably some good methods to do this out there, but so far i've not been able to locate them. Any help on this is appreciated ! Regards, Rick
  6. Thanks for the answer. After some more research and a boot from a puppy/slacko linux cd to look into the files (2 and 3 are really not there as far as i can see) , i think this is a case of false positives. Which brings me to the next question. Puppy/Slacko linux is a nice thing for the easy stuff, but can anybody point me to a free .iso of a boot cd/dvd with a good set of tools (fdisk. mbr tools, imaging, memtest, hd test, hex editor, etc ..) on it (windows seems to have lost the boot/rescue cd/dvd/usb option). I'm sure something like that is out there, but i haven't been able to locate it so far.
  7. Hello all, After performing a rootkitscan with spybot search and destroy, these results are detected: 1 KGyGaAvL.sys in c:\Windows\SysWOW64\ (no administrator acl) 2 KGyGaAvL.sys in c:\Windows\System32\ (no administrator acl) 3 DRM:[arab text]:$DATA in c:\Users\Public\ (unknown ads) Some googling tells me that the first/second one seem to be be legit and are part of divx. The third one: i have no idea what the hell that is. Also the 2nd and 3rd don't seem to show up in any file list (both explorer and command line) ?! Removing these 3 with spybot s&d doesn't seem to do anything, they keep showing up. Anybody seen these before and knows what to make of this? Thanks for any help on this! Regards, Rick
  8. I guess the big question is: are you in any tense (company) situation where someone might wanna take you down/ hurt you, and plant false evidence on your computer? If not, the whole thing does not make much sense to me. Why would a random outside hacker plant something like that just for fun? And if it's a data theft they would just have gone in and took it without a skype record. Like i wrote before analyse the skype data (or have it analysed by an independent person not related to the company). If it is not yours there will be flaws in it somewhere that can prove it was not you and you are being framed. BTW: The most logical explanation to me, is that someone figured out your password and used your laptop for this while you were at lunch or something (like i said the answer is in the (skype) data on the laptop ).
  9. If done correctly i guess a hack can't be traced technically. So try to disprove the evidence. 1) Maybe you can prove you weren't near your laptop at the time of one of these skype incidents. 2) If there are skype recordings maybe they can work in your favor. 3) If your password was weak at the time (several old password may still be in the system), you can claim someone else hacked your account. 4) Maybe you have obvious enemies and if they had motive/means/opportunity, you can claim they did this .. 5) Etc .. Also it may be a good thing to lawyer up depending on how serious the situation is.
  10. I guess you are right and from a security point of view even trivial stuff like checking personal email can't be done without maybe revealing your password. However these laptops are also sometimes supposed to be used from home. And I don't know if I want to connect such a thing to my home network. And you could probably argue that if you have nothing to hide, who cares. But I just don't want any company sysadmin scanning my lan, just because it's possible. .
  11. Hello all, I recently got a new company laptop and there are rumours the new laptops contain some kind of advanced spyware on it, that monitors pretty much anything you do with it. I know a company has the right to monitor employees, but i would like to know to what extend the monitoring is happening. Netstat -aonb doesn't show any suspicious activity. And also the tasklist seems to be clean. I have admin right so in theory i think i should be able to find any monitoring software .. In fact i don't see how one would be able to do this and hide it without rootkitting the laptop. Could anybody help me out here and tell me what is and is not possible in this area in a regular company context and how to find the software? Any help is much appreciated. Regards, Rick
  12. Hello everybody, I'm a starting user of kali linux. And i have a question about the possibility of using a tool like wireshark or airodump-ng on *one* kali linux client to monitor *all* traffic on my wifi network (also data requests from other clients -> http, smtp, ftp, etc). So far i've been able to intercept all traffic from 1 client to the router, and have played around with wifi in monitor mode (using airmon-ng). I imagine something like below, but with added decryption using my wpa2 password might be able to work (not sure how to do it though): airmon-ng start wlan0 airodump-ng -c (channel) --bssid (bssid) -w filename mon0 But so far i've not been able to find the right documentation (or maybe it's just not possible), Can anybody point me in the right direction with this? Thanks in advance for any ideas or information. Best regards, Rick
×
×
  • Create New...