kdodge

Active Members
  • Content count

    73
  • Joined

  • Last visited

  • Days Won

    1

1 Follower

About kdodge

  • Rank
    Hak5 Fan ++
  1. just last week I was looking through various abandoned software sites looking for that vary game. I remember playing one of them years ago, but I can't remember which one it was. I'll have to go check that out now, thanks!
  2. How did you get the game? Is it download able from somewhere?
  3. If your handy with hardware, you could use a normally open (NO) reed relay to connect/disconnect the red power usb wire. reed relays are typically very low current to switch on/off and I think the raspberry pi should be able to do that. Just need to hook it up to one of the GPIO pins. https://en.wikipedia.org/wiki/Reed_relay
  4. From what I've read, tor + torrents is no bueno. it's something about udp or open ports I think, but I can't remember exactly. Maybe google about it. I have read that I2P is a good alternative to tor for using torrents, but I think that project might not have as much activity as tor gets so it might not be as well kept up to date. And i would not suggest any free vpn, any more then I would suggest free wifi;)
  5. if it's not compiling easy, then it might have been created with a different version of Atmel Studio. I would suggest downloading several versions and plug'n'chug the different versions. I think version 5 worked for me on one iirc, It's easier then trying to modify the code to work with version 7
  6. something that would slow most attacks down https://support.microsoft.com/en-us/help/216893/how-to-enable-or-disable-the-keyboard-windows-key
  7. In Episode Hak5 2206, at about 5:00 minutes in hes writing a different script, but looks like a re-purposed version of the above script. I know not the same script but still, I was wondering what he meant by "better way" referring to $() verses ``
  8. Hey Darren, thanks for the reference you made in your podcast about this little script a few weeks ago! I just had one question though, you said that its better to use $() over `` for getting the output of commands, and I was just wondering why that is?
  9. "Victory Loves Preparation" - the movie Mechanic
  10. Ok, Hum. It's hard to see whats going on, especially cause you can't even pcap whats happening inside the pre/post part of the tables, you'll only see the output after the fact. I can think of 3 more things to try, might give more insight to whats going on. 1. run a pcap without any -t nat rules in place and no need to be listening with nc, and look at if/how packets are arriving at the openvpn pi server. Specifically make sure SMAC=router, DMAC=openvpn_pi, SIPADDR=remote ip from cafe wifi, DIPADDR=10.1.1.101. also look if it just drops the packet of if it returns a RST or ICMP stopping packet. I'm also kinda curious if it will try to leave via the gateway or not if it does. 2. Try with just the first iptables command above. I was thinking that you need a sending rule and a receiving rule, but maybe I was wrong. 3. Try with just the second iptables command above. same reason. Like I said, I can't really test these myself, but I'm more then happy to shout out suggestions. Or if other people want to chime in that would be great too;) It is possible the DNAT rule it too restrictive too, especially the ! part has given my trouble in the past.
  11. ok, i think understand now. Sounds like you might need to somehow masquerade the external packets so that they look like they are on 10.1.1.0/24, in order for th pi server to see them. Understand, that I don't have your exact setup to test this (kinda trial by error), but my initial thought is this on the openvpn pi server: iptables -t nat -A PREROUTING -i eth0 -p tcp -m tcp ! -d 10.1.1.0/24 -j DNAT --to-destination 10.1.1.101:1234 iptables -t nat -A POSTROUTING -o eth0 -p tcp -m tcp -s 10.1.1.101 --sport 1234 -j MASQUERADE (hopefully) would allow you to test this externally, with the openvpn pi server not using the router as the gateway. $ while [ true ]; do echo 'hello world' | nc -l 1234; done this is a simple network test for connectivity I think you'll need DNAT+MASQUERADE or you'll need DNAT+SNAT, but I'm thinking the former. It might also be possible to bounce packets through the NordVPN server to the openvpn pi server but I think the easiest thing to do is work with the first one for now.
  12. Having a bit of trouble understanding your setup, these pictures are what I'm envisioning your setup currently is, and what your trying to do with external access: Is that correct or am I wrong?
  13. Would you be willing to provide a copy of the PCAP file for us to view? Also, see if there is any firmware available to download (smh 'unbranded'), might get lucky and find the username and password in plaintext in there using the tool 'binwalk'.
  14. Is it not possible to port forward your router to the openvpn pi server?
  15. cool, thanks. I don't know what happened, but the link is working now. Theres a cmdline tool for playing around with this in the Ubuntu repos $ echo xn--pple-43d.com | idn -u