Jump to content

H@L0_F00

Dedicated Members
  • Posts

    834
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by H@L0_F00

  1. You should require the user to enter their email address twice in order to avoid spelling mistakes. And yes, nice work.
  2. Post how you fixed it, please. I'm sure it will help somebody with the same/similar issue.
  3. lol not quite. Most flash drives can also be written to... that's usually what their intended purpose is.
  4. Or you could just not let random people use your cellphone without you there, watching them...
  5. H@L0_F00

    Home Proxy

    DynDNS + SSH + Preconfiged & distributed KiTTY
  6. Wow, Mikogo is also free for commercial use... That's cool :)
  7. http://hak5.org/forums/index.php?showtopic=14121 Use the second method mentioned. You could also make a separate "real" menu and have it as the only password protected option (besides maybe reboot/poweroff) on the FIRST menu.
  8. I wish there was a place on the internet where you could search for things and find more answers than you'll ever need... :(
  9. Wireshark would be able to see all traffic because it is no longer encrypted (unless it's HTTPS, another SSH server, etc) when the communication is between the server you are running and the server your friends are connecting to. Friends PC ---encrypted---> SSH server ---normal traffic---> Internet ---normal traffic---> SSH server ---encrypted---> Friends PC
  10. It was a joke. Except for the part about nobody liking userbars.
  11. It's obviously a DDoS because nobody likes userbars
  12. Here's a typical way I learn about things. 1. I read about X from a forum post, blog, tech "news" site, etc. I don't know much about X, so I research it because it seems interesting or I just want to broaden my knowledge, if I already have some sort of an understanding. 2. While reading about X, I come across Y. I don't know much about Y either, so step one repeats. 3. I don't get to step 3 very often, because I get lost in learning about whatever it may be that I somehow ended up at. Example: Google SSH Read about SSH Come across "public-key cryptography" Follow the link to "public-key cryptography" Read about public-key cryptography Come across "RSA" Follow the link to "RSA" Read about RSA Anyways, some sites you may want to check out are: SecurityTube Social Engineering Back|Track Linux Metasploit Unleashed
  13. H@L0_F00

    Dumb Noobs

    The Autopwn of social engineering, I'd say, except it requires more effort while success rate is much higher.
  14. It's a Human Interface Device that can do... pretty much anything a user can with whatever they plug in, whether it be a mouse, keyboard, joystick, etc.
  15. Why would you use the OSK when keys can be sent directly from the Teensy? Seems like the most roundabout way of getting things done, with no advantage (that I can think of, at least).
  16. http://backtrack.offensive-security.com/in...le=HCL:Wireless
  17. Your showing signs: CAPS LOCK Multiple exclamation points "hacker" in your handle So i herd u liek mudkipz?
  18. Who are you to speak for the majority forum? lol I will be using C, once I start developing in the next few days. OP, what compile errors are you getting?
  19. No, the size on the Teensy would be equal to the size of the executable normally.
  20. Yeah, Alt+Y works, but Left-arrow and Enter should be used.
  21. I found this site a few months ago and realized just now that I haven't ever seen it talked about here. Academic Earth Overview:
  22. I'm running Win7 and Alt+C doesn't auto-accept the UAC. Is the key-combo different for Windows 7? Also, we should use Ctrl+Esc to bring up the Start menu because it's possible to disable the Windows key completely, but Ctrl+Esc still works.
  23. This seems to actually be an older update. I tried to google it and see what problems it fixes, and it seems to be something about screen savers not displaying due to Microsoft keyboards/mice. Some forum posts about it date back to 2007. What is the Knowledge Base (KB) number?
  24. Maybe representing the Teensy as a HID keyboard accommodating special buttons (Home, Internet, Back, Forward, etc.) would allow more communication between the Teensy and the OS that would be more OS specific?
  25. Yes, you're right. I was thinking base64 encoding would be larger than just representing the program in hex for some reason.
×
×
  • Create New...