Jump to content

PC646

Active Members
  • Posts

    48
  • Joined

  • Last visited

Everything posted by PC646

  1. I remember the switchblade had a payload to run VNC hidden on a target's computer. Does anyone have this for the rubberducky? Suggestions to write it? Thanks
  2. When I log in and look at the ROOT level I see 15+ directories vs. on the episode I don't see any directories or files in the root access. Should I delete them? Am I looking in the wrong area? Thanks
  3. Nothing new, thus why I stated "Script Kiddies will shit themselves..." but still pretty smooth setup.
  4. All you script kiddies are going to shit yourself today. Firesheep, a cookie sniffing extension for firefox was released today. Simply run Firesheep and it collects user's cookies and info in an easy to use menu that you simply double click to log in as that user. No real hacking skills needed. http://codebutler.com/firesheep
  5. I sent you a private message to contact me.
  6. EPSILON, Thanks for the info... StraightEdge???
  7. I prefer Mac MakeUp 1.95d at http://www.gorlani.com/publicprj/macmakeup/macmakeup.asp Not only can you randomly change your mac address but if you do a sniff with cain on a network you need to pay for, you can clone a mac address and log onto the network for free ;) Or so I hear...
  8. So are the feeds with "feeds.feedburner.com" yours so you can collect ad-sense from us?
  9. Companies like Accessdata even allow PS3's to be connected to help crack passwords...
  10. In the forensic world we call it distributed processing. I use it for indexing large amounts of data across 465 computers here at work. We also use it to crack passwords. My personal idea was to use Amazon's EC2 to do this. I have seen some people use the Ec2 to crack passwords but I'm running into online transfer speeds and security issues for indexing sensitive information.
  11. Not capturing Pcaps, but pulling files from pcaps. Photos, docs, etc on a large scale...
  12. So it sounds like their isnt much out there to pull files from pcaps... Wetwork- When you say large what are we talking about here? I'm doing multiple 250mb files (51GB total) and one at a time or a handful it's slow or crashes.
  13. As you have seen in my other posts I love Netwitness for analyzing pcaps, but I'm looking for other windows based programs for quickly data carving files. I have played with Network Miner but it tends to crash with the large amounts of pcaps I have, any other suggestions? Thanks.
  14. PC646

    IP Changer

    Has anyone played with this freeware called IP Changer? http://www.softpedia.com/get/Network-Tools...p-Changer.shtml
  15. It can be done with many data types for a price. We use to do it with cctv video fairly easily 10 years ago... Although the "tool" cost a shit load 10 years ago I doubt the price has dropped due to the niche market of taking over a cctv system without physically splitting or touching the line.
  16. Other than using the pineapple as MTM attack, does anyone have any other scripts you could share on here? Thanks!
  17. Try netwitnesses investigator. Its free, easy to use and decrypts ssl. I capture with wireshark, remove the 802 header and load into investigator. Poof! http://download.netwitness.com/download.php?src=DIRECT
  18. Mac Make Up works great... http://www.softpedia.com/get/Network-Tools...ac-Makeup.shtml Or watch my video on using it: http://securitytube.net/How-to-Covertly-Mo...orks-video.aspx
  19. "Im not the kind of guy who can sit behind a desk all day and program." Then forensic work is not for you. I give two examples regarding forensic work, the first is fishing. You can sit in an office all day waiting for a bite and get nothing... Second I tell people forensics is an art, not a science. Yes there are scientific principles behind your work, but doing forensics is more of sitting in an office and digging for something. Tools like Encase and FTK exist to make searching easier, but it really comes down to your own dedication and drive to find that one piece of code or information to make or break your case.
  20. Your logic is wrong... A) Decades old information would be worthless or reencrpyted and B) even with where computers will be someday the math for 128 bit still is millions of years of cracking... So why be so paranoid of something that truly is next to impossible to crack in any of our lifetimes? Backdoor, supermachine, super rainbow tables, something has them spooked. I vote for UFOs.
  21. Actually that isnt true. AES 128 is ok for two levels of classified data. This is how you know its been cracked... The United States has three levels of classification: confidential, secret, and top secret. Each level of classification indicates an increasing degree of sensitivity and type of encryption. The NSA doesn't use AES 128-bit for TOP SECRET for a reason, they know its been cracked or has a back door (probably made by them). If they trusted AES like the math shows, it shouldn't be able to be cracked with today or tomorrows computers. Also lets look at who would have similar resources to crack it, Britain, Russia, China...
  22. Triangulation isn't that hard with the right TSCM (Technical Surveillance Countermeasures) equipment. Most LE won't have this, but their private industry buddies and feds will. Even if they can't narrow down to an exact person like this device claims, they can focus on a building or coffee shop and then manually search individuals...
  23. Looking at the other threads, number of comments and information shared vs. this post I would say my question wasn't crazy, noob or bad at all. It sparked a good conversation and was answered by people that want to help others. As continuing to attack the police comment, shit happens. If you don't prepare for the worse, you can find yourself knee deep in that shit. Sharing information about preventive measures isn't something to dis, there are plenty of famous hackers that got caught because of tunnel vision, lack of information, behind the technology curve of LE (rare) or simple slip ups. A board of this nature should be happy to share mistakes, tools and challenges to hacking.
  24. Actually some of us in here would be a target by local, state and/or federal police from past mistakes or current connections. The reason for my post and others that I post like it aren't for collecting answers for a noob, I'm trying to spark conversation on here and get people talking. I hate seeing the same BS stuff on forums after forums. If someone has a creative and different way to change an IP or redirect it, I want to know and share.
×
×
  • Create New...