Jump to content

H@L0_F00

Dedicated Members
  • Posts

    834
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by H@L0_F00

  1. UPX, then encode it. Also, why are you not using base16?
  2. A keylogger can be designed to communicate with the Teensy. See here.
  3. Exactly... Just found this. We're in business... ;)
  4. If the Teensy is considered a HID, what is to stop someone from coding a program to communicate with it?
  5. Yeah, I didn't receive a private message either.... BUT I GOT ONE!! :D Thank you, Hak5 Crew :)
  6. H@L0_F00

    Kon Boot

    We've hijacked the OPs thread. That's not very nice lol If you are going to do that though, I say do something more than just create rainbow tables with it! lol If you really want to talk about this, start a new thread. Here's what I found while looking around though: CHAOS which lead to openMosix I haven't done a lot of reading about it, but it looks like you can run almost any normal linux program on a system like this? If so, just use rtgen... which I can't find the current source code for (since you'd have to compile from source on linux)... Buuuut I decided to keep looking and found rtgen-mt Edit: That took me almost an hour to find... <_<
  7. H@L0_F00

    Kon Boot

    Passwords longer than 14 are hashed only as NT, so you can still crack them... If you have a lot of time or a pseudo-supercomputer and NT tables that went that high (the storage space required for such tables would be enormous...). But then again, you could also just submit it to one of the few free password cracking services. 1, 2, 3, 4 Yes, you can create your own rainbow tables. It will take you quite some time though. Winrtgen rtgen You can read for days rainbow tables, time-memory trade-off, etc. and still be only scratching the surface of password cracking. With rainbow tables you have to start looking at keyspace, chains, etc. If you really want to read up on it, start here and google until you are satisfied. :)
  8. A tiny bit for a second, but it could have happened for any reason. I don't suspect it was OpenDNS, because it only handles DNS resolutions, which could take several milliseconds without you ever noticing anything or even caring if you did notice it.
  9. H@L0_F00

    Kon Boot

    I didn't mean to be harsh, btw. It sounded funny in my head... lol But, the XP free tables are still not going to catch everything (Although I've only came across a few "normal users' " passwords that it couldn't crack). This is because the charset for the XP free tables is only mixalpha-numeric of length 5-14 (1-4 is bruteforced), which means a password from 1-14 digits will be cracked as long as it contains only the characters "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ" so a space, exclamation point, period, comma, etc. would render your results half-successful, at best. I say "half-successful" because if there is only one special character, you may still get the other half of the password (passwords larger than 7 characters are actually split at the 7 char limit, and both parts are hashed, which is why they are so quick and easy to crack. (2x1-7 requires much less time than 1x8-14)).
  10. I don't remember. I just checked the boxes that said "porn", "sex", or whatever. I didn't play around with it a whole lot because I was only checking it out; I don't really need it.
  11. I recently found (I don't remember how...) WZCook which isn't deleted upon access by McAfee at my school like WirelessKeyView is.
  12. Kon-Boot works on some computers and fails on others. Their commercial version is said to support more BIOS and be rid of many previous bugs.
  13. Although a good option, a simple google for "porn" turned up quite a few sites in the first two pages that weren't blocked. szczepam, just make sure to thoroughly test your choice (or choices, you could always combine more than one option) before deciding it's "safe." A friend wanted help blocking sites he didn't want his little brother from seeing. He also wanted it for free, of course. I recommended K9, although I have never used it. You might want to combine maybe OpenDNS and K9 (or whichever), because one will block sites the other won't.
  14. H@L0_F00

    Kon Boot

    Wrong, wrong, wrong. The Vista free tables are VERY limited. For cracking NT passwords, you can try Ophcrack with the Vista free tables, but if it the password isn't cracked try here or crack it yourself.
  15. There have been a few times I have wanted to do this. I have searched and searched, but what I've found doesn't do what I want/need. Maybe somebody here will understand and know what program or script I could possibly use to accomplish this... Suppose I have a website (http://www.nirsoft.net/utils/) that has a bunch of things I would like to download. Suppose the page actually only has links to subdirectories though (http://www.nirsoft.net/utils/blue_screen_view.html, etc) and it's the subdirectories that contain the link to the download I want. Now suppose I can make it even easier by saying essentially, "Follow HTML links up to 2 pages deep and download (or even just list) just the ZIP files." Does anybody know of a program or script that can do such a thing? Thanks.
  16. http://linuxoniphone.blogspot.com/
  17. This might help. Bruteforce attacks against an FTP server are usually pointless because most, by default, have measure against it. You won't be able to bruteforce any FTP server that is worth anything because after about 5 bad login attempts, you will be blacklisted.
  18. H@L0_F00

    Scam ?

    1. Anybody can buy a botnet 2. "planing on puttin linux on it" doesn't impress anybody, make you leet, or suggest that you have a botnet 3. Most people with any sense as to how the Internet works wouldn't even bother with something like that 4. I could go on, but I have better things to do with my time
  19. I don't think the Hak5 crew would really want this "Hak5 keylogger" in production or distribution. It's a dumb idea. Hak5 has been accused of spoonfeeding the skiddys since about season 3ish(?)... This will just increase said negativity. Put your own name on it. There is really no reason to associate it with any of the Hak5 crew.
  20. 1. Restrict the router to the LAN with no encryption. 2. Captive portal sends all requests to a page explaining how to pay for an (SSH) account to get secure, fast, wireless internet and free support. 3. Host KiTTY (PuTTY fork that saves session settings to files and folders, not registry, which means you can include the settings preconfigured to connect to your SSH server, use compression, not request a shell, etc.) on the same server you are going to run the SSH daemon on, as well as anymore files you may need (WinVNC for support?). 4. ? 5. PROFIT
  21. Wow... That could have so many more applications... I was thinking some RF transceiver could allow the attacker to communicate with the device without having to be there the entire time. Also, Eye-Fi card as AP + ZipIt = LAN (I know... ZipIt couldn't handle VNC and the screen is too small to be of any use anyways.) to computers that aren't networked or are only on the company LAN... Since backdoors wouldn't work :) edit: It would probably be easier to use existing drivers for a WiFi card that supports AP mode as the AP and the Eye-Fi card as the "client."
  22. We can't help you if you don't help yourself. Use the resources that are extremely plentiful on this forum, as well as others. I'm sure you can find most of your problems/questions have already been answered/solved here.
  23. Why not attempt to execute something that would result in feedback to the actually Teensy after every attempted login? Something could coded and included on the SD card that would communicate to the Teensy. It would obviously make the process somewhat (maybe a lot) slower, but maybe you could try after a set amount of login attempts? Just an idea. Can't wait for this to get off the ground...
  24. And THAT'S why we (well, some of us, at least...) get paid.
×
×
  • Create New...