Jump to content

Mat

Active Members
  • Posts

    131
  • Joined

  • Last visited

Everything posted by Mat

  1. Mat

    USB Thumbscrew

    You could probably make the USB key bootable with an instance of grub that would chainload the windows partition on the hard drive. That would allow the USB drive to boot the hard drive, and if you erase the MBR from the hard drive, then it wont be able to boot itself. I dont see how this would be beneficial though.
  2. As already posted, a program is not your answer. If you install an application on your computer to monitor bandwidth use, then it will only monitor you. Get a better router, build a smoothwall or monowall firewall or something like that. You need to monitor the usage at the source. You would measure water consumption by fitting a meter to the main supply, not to the kitchen tap, right? ---- *** EDIT*** Yeah, I should learn to read better! The original question was not about measuring the amount of bandwidth used on the network, it was about throttling the use for a single user. The post below me is right to a large degree, CoS will handle most of it, but it's not always 100%. have a look at NetLimiter http://www.netlimiter.com/ I've not used it, but it seems like it may be what you want.
  3. Mains power and wifi use vastly differing frequencies, so the interference wont be too much of an issue. Think what would happen if you write a message in green pen, then I write all over it in yellow, good chance you can still read it, but it I write all over it in a similar shade of green, things get a lot harder. That's what happens with mains 'hum' and audio frequencies; or wifi and microwaves, but 50-60hz and 2GHz, nah. Wrap the device in paper/cardboard for insulation and wrap that in tin foil connected to a ground tag - just for good measure. Make sure to put the antenna outside of the tin foil though! Oh, and the wifi should pass through the wall with no problem.
  4. nope, you would use a power meter for that. However, I dont think electricity works in quite the way you think it does. A usb port will not 'give off' 500ma, they will offer an amount of current up to their maximum supply rating (which should be limited to 500ma) that the connected device needs. So if you plug in a device that has a 200ma draw, then 200ma is what will be drawn, even if you build your own 10A 5V supply and connect it to that, it still wont draw any more current. You may have a problem with the voltage coming from the ports, it's possible that the 5v rail is actually 12v, but it's unlikely. Get a power meter, set it to the 200V DC and connect it to the outer two pins of the port, step down the range on the meter one step at a time to get a more accurate reading. Once you confirm the power rails on the USB port are indeed 5V, go ahead and check the current, but in order to do that, you'll need something in circuit with the meter, else you are not really measuring what you think you are.
  5. Looks good. I've just ordered books 1 & 2 and I'm hoping they'll be here in time for Christmas break so I can kick back and read them.
  6. http://hak5.org/forums/index.php?showtopic=10152 The video about shows how to hide files in an image so you can retrieve them later, not so someone who does not know it's there will run the exe when opening the image
  7. Mat

    Hi boys

    Try http://portableapps.com/apps/utilities/toucan
  8. My opinion on Warez is that if you steal it, you are on your own. If you need help then you should have paid for it.
  9. Mat

    I got hacked!

    Sounds like this is progressing nicely :) WPA2 is the way to go, if the router does not support it then throw it away. All modern wifi access points will support WPA2 and should be inexpensive, although I do understand that's a relative term. A no-name access point can be bought in the UK for around £30. WPA-PSK has always been suseptible to a brute force attack but it's getting easier, it's still not 'broken' in the way that WEP is though, but it's definatly an end-of-life encryption method. Now, MAC addresses. The MAC address is a joke. MAC filtering on the router is damn near pointless. The MAC address of any network card can be changed to anything you like on any operating system. So the attacker just scans the air, finds the access point, finds a wireless print server or your laptop and sets their own mac address to be equal to it. It's that easy. I still recommend using MAC filtering on the AP though, but please understand that it offers an amount of protection equal to putting the lid back on an opened bottle of pop. People will still be able to drink from the bottle with very little extra effort. I like the confrontation idea. Just ask the guy and see what happens. With all that said, there's one last thing to do, and that's to turn off the wireless access point when you are not using it. Everyone leaves them on because it's convenient and most of the time there's no reason not to, but in your case, if you only turn it on when you need to use the net, then you greatly limit the access window for other people to use your connection. This may be enough to convince the attacher to buy their own internet.
  10. Mat

    I got hacked!

    It's impossible to help more than to say "Change your password" Changing a password is one of the first things you should do if you suspect unauthorised access to anything. It's hard to offer any more advice because it's clear that you dont know enough about the equipment that you are using to be able to ask an informed question. I'm afraid the only thing you can really do is spend some time reading information on the web about the subject. Go to the webpage of the manufacturer of your modem and read everything you can find. Then read the wikipedia entried for wifi, and wep and wpa and wpa2 and dont stop until your eyes bleed (figuratively of course) Once you understand the kit you are using, you will either discover the answer yourself, or you will be able to ask your question in a way that someone else will be able to understand and answer. I'm not trying to be elitist here, just honest. It's not possible to answer an unasked question.
  11. I knew that Goblin King had it in for me.
  12. So I think I killed the Hak5 BBS. I was playing DoorMUD, and I decided to go see the Goblin King, as you do. So I move south into his room, and a messge in red saying "Error 6" appears, and then is shows "Critical error, returning to BBS..." I picked option 7 to reconnect to the game, but nothing happens, so I force a disconnect and try to reconnect, and there's nothing there. The telnet session connects, but there's nothing at the other side. Oops. Hopefully it can be fixed, sorry all :)
  13. Does the info here help? http://www.fsf.org/licensing/licenses/ I'm no expert on licensing, but I'd expect that those guys are, it may be worth emailing them with a link to the project pages and I'm sure they'd be in a good position to make a recommendation.
  14. I've looked for this in the past without success. While it's possible to take (for instance) a live Ubuntu CD and make it bootable via PXE, I've not found a method that will network boot to a menu that will subsequently network boot unmodified ISO images. Frankly, I think that product would simply be too useful to exist in this world :)
  15. Mat

    is the BBS offline

    I've been unable to connect to the Hak5 BBS for about 12 hours and I've tried from multiple locations. I'm not complaining, it's a free service etc, I dont expect an SLA, I'm just wondering if it's gonna come back?
  16. That's the idea, yeah. Peer review increases security, closed source non-free apps that claim to be secure may not be as secure as they claim. Please do take a look at truecrypt. I have looked at both, and while folder lock does look pretty, with it's nice graphical interface that looks like a safe (so it MUST be secure, right?) I find that the simple encryption used and the fact that the software is not free would put me off using it for any real data. Worse yet, they seem only to have windows versions available, which in my opinion makes their software broken by design.
  17. Short answer: Not possible. Longer answer: The OS is responsible for deciding what to do with a file you open. So if the OS is configured to open JPG files with mspaint, then that's what will happen when you double click the jpg. Now, if the file in question is built in a way that will cause mspaint to crash and cause a buffer overrun instance then it may be possible to execute some arbitrary code. Getting this to work is very difficult and it would be patched out of the code in short order. Hacks that generate increased usage are great, hacks that basically break the way a computer is supposed to work are not. Is there any possible 'good' use for having unknown code execute when opening an image file?
  18. That's both untrue and misleading. Selecting a png or jpg image for a wallpaper in windows make no difference to anything, windows will handle the image internally in the same way, if I remember correctly, it converts it to a device independent bitmap anyway. As for the original poster, I think he's talking about jpg compression artefacts, but without a screenshot, zoomed on the affected area, I dont think anyone can help worth more than a guess.
  19. Locating the Fon 2100 seems difficult. Will this guide be usable with the "La Fonera+" as available here https://shop.fon.com/FonShop/shop/GB/ShopCo...product=PRD-019 or can the guide be updated to work with this. After all, if the hardware cant be found, the hack cant be performed :)
×
×
  • Create New...