H@L0_F00
-
Posts
834 -
Joined
-
Last visited
-
Days Won
2
Posts posted by H@L0_F00
-
-
Dont worry i have sorted it thanks anyway
Post how you fixed it, please. I'm sure it will help somebody with the same/similar issue.
-
You won't be able to reprogram normal USB's as they normally store stuff as read only...
lol not quite. Most flash drives can also be written to... that's usually what their intended purpose is.
-
Or you could just not let random people use your cellphone without you there, watching them...
-
DynDNS + SSH + Preconfiged & distributed KiTTY
-
Wow, Mikogo is also free for commercial use...
That's cool :)
-
http://hak5.org/forums/index.php?showtopic=14121
Use the second method mentioned.
You could also make a separate "real" menu and have it as the only password protected option (besides maybe reboot/poweroff) on the FIRST menu.
-
I wish there was a place on the internet where you could search for things and find more answers than you'll ever need... :(
-
As long as these tools are installed on the computer, where SSH is running you should be able to capture any information that is passing along. Wireshark may not be able to look at https traffic itself, but ethercap is capable of since its a suite for man in the middle attacks. You should also do a bit of reading on sslstrip, I think it may come handy at some stage.
Ethercap: http://ettercap.sourceforge.net/
Wireshark: http://www.wireshark.org/
Wireshark would be able to see all traffic because it is no longer encrypted (unless it's HTTPS, another SSH server, etc) when the communication is between the server you are running and the server your friends are connecting to.
Friends PC ---encrypted---> SSH server ---normal traffic---> Internet ---normal traffic---> SSH server ---encrypted---> Friends PC
-
It was a joke.
Except for the part about nobody liking userbars.
-
It's obviously a DDoS because nobody likes userbars
-
Here's a typical way I learn about things.
1. I read about X from a forum post, blog, tech "news" site, etc. I don't know much about X, so I research it because it seems interesting or I just want to broaden my knowledge, if I already have some sort of an understanding.
2. While reading about X, I come across Y. I don't know much about Y either, so step one repeats.
3. I don't get to step 3 very often, because I get lost in learning about whatever it may be that I somehow ended up at.
Example:
Google SSH
Read about SSH
Come across "public-key cryptography"
Follow the link to "public-key cryptography"
Read about public-key cryptography
Come across "RSA"
Follow the link to "RSA"
Read about RSA
Anyways, some sites you may want to check out are:
-
30 minutes in a windowless room with an electric drill, claw hammer & pliers and I could have any volume of passwords I wanted.
The Autopwn of social engineering, I'd say, except it requires more effort while success rate is much higher.
-
7x11 Issue
in Hak5
It's on iTunes.And Revision3
-
It's a Human Interface Device that can do... pretty much anything a user can with whatever they plug in, whether it be a mouse, keyboard, joystick, etc.
-
-
Why would you use the OSK when keys can be sent directly from the Teensy? Seems like the most roundabout way of getting things done, with no advantage (that I can think of, at least).
-
-
I AM NOT A SCRIPT KIDDIE!!
Your showing signs:
CAPS LOCK
Multiple exclamation points
"hacker" in your handle
So i herd u liek mudkipz?
-
-
Pretty much everyone on the forums is using the Teensyduino plug in.
http://www.pjrc.com/teensy/teensyduino.html
It includes all the files you need to get it to work.
Who are you to speak for the majority forum? lol
I will be using C, once I start developing in the next few days.
OP, what compile errors are you getting?
-
I've always heard them refer to The Pirate Bay as "The Bay" or "Your Favorite Bay."
-
thanks
they work with linux right?
and if they are not is there one for linux?
edit: is there a version of they first one for linux
Most linux distros come with OpenSSH installed by default. It's kind of the industry standard. The server daemon is sshd (Secure SHell Daemon). Google around and you will find tons of documentation as well as step-by-step guides for setting up sshd on your OS of choice.
-
No, the size on the Teensy would be equal to the size of the executable normally.
-
Yeah, Alt+Y works, but Left-arrow and Enter should be used.
Remote *nix Shell Hosting
in Applications & Coding
Posted · Edited by H@L0_F00
You should require the user to enter their email address twice in order to avoid spelling mistakes.
And yes, nice work.