Jump to content

LauBen

Active Members
  • Posts

    59
  • Joined

  • Last visited

Everything posted by LauBen

  1. Hello, Could you not look at setting up at a sharepoint server, and then allow your users to upload and download as required?
  2. dude that rocks!!! I thought my set-up was cool until I saw yours, very very sweet!
  3. LauBen

    BBC botnet

    My point was simply that, because the BBC rented the Botnet from someone and they then went and removed the bot from around 20,000 zombies that the owners of the Botnet would not be happy because they would be down 20,000 zombies. Not a large number I know but still. That was all. :D
  4. Nice case! I have Antec 1200, which is fine for me :D and to be honest is a little on the loud side when the fan's are crankced up :( You new rig should be epic, what ealse you putting init??
  5. Oh yes the good old days before it was bought by BT, it did lose some thing when they stoped having the ability to walk-in. Sorry to hear you had a crap time with them Mat.
  6. Ok so i have just found the url for those sweet keyboards, the URL is http://www.kinesis-ergo.com/freestyle_pc.htm looks like they are US only but I will keep on looking and see if I can find a UK/EU seller :)
  7. How about:- "How the improvements and innovations in computer games, drive the development and improvements in hardware" I have seen a presentation on this many years ago and it was very interesting to see the way spec's were increasing inline with the new release of games.
  8. Now I know what to do with my loft :D I have to say that 7 screen's may be a bit of overkill but hell if I could I would! Anyone know where to get one of those keyboards??
  9. Honeypots Rock! The amount of intel you can gather about hackers and malware is hugh :) I have worked with both low and high interaction honeypot, on and off for a few years now. Just make sure you do monitor it and that you block the Honeypot box from being able to send any traffic out, other wise you may get some nasty call's and e-mails from your ISP, or worse the police. Amazon have some good books on the subject, such titles as:- Virtual Honeypots: From Botnet Tracking to Intrusion Detection Know Your Enemy: Learning about Security Threats (2nd Edition) Honeypots: Tracking Hackers To name but a few. Also take a look at http://www.honeypots.net for even more info. It all depends on what you are trying to do with your honeypot and what level of interaction you are after. I would suggest that you first take a look at the Honeyd (http://www.honeyd.org/) if you are looking at setting up a *nix based one, or HoneyBOT (http://www.atomicsoftwaresolutions.com/honeybot.php) if you are on windows. Hope this helps :)
  10. will-wtf, I understand that we all have to start somewhere when it comes to new things, and I am sure you never intended to do anything illegal with the knowledge you were looking to gain. However, as you can tell just posting a statement asking "If anyone has a botnet tutorial that is good" is not going to help you learn, and will (as is the case here) most likely p$%s people off :) Anyway in an attempt to help you out I will start you off on the road to knowledge town:- 1- Google it - Google has a huge amount of very good information on Bot's and Botnets, from both sides of the camp (black and white) 2- Believe it or not Youtube has some videos showing how easy it is, and also providing a basic overview of what is involved. 3 - Have a look on Wikipedia, this will provide you with a load of good links and detailed information on the history of Botnets. Oh and before you think I am being a dick with my answers, I had to present to around 60 people earlier this month on all types of new (I know Botnets are not new before any one start :) )malware and provide a live demo of how they are made and spread, and the 3 items here provided me with a wealth of info to start and grow my presentation.
  11. Not much of a saving, but Dab's are now selling the Fon+ for £24.95. Now I bet they would sell a whole lot more if they drop it another £4.95 :)
  12. I never saw this until you mentioned it, and I thought my math was bad :D Anyway, you feel like doing a Fon master class when we all meet up in July?? I for one would love to pick your brains and make sure I get it all right the first time.
  13. Sounds good to me! Now all I need to do is get the time off work
  14. Nice Very nice!! I have got a load of old drivers to get rig off, now all I need is a M82 :D
  15. Well depends on what you want to do. They have the Science Museum which is cool, and LOADS of bars. Plus all the UMIST stuff. To me it does not matter too much, I will be happy to travel where ever. I just need to know, where and when :D Anyway, seeing as I am noobe with regards to these meets, what the plan? What do you guys and gals get up to normally?
  16. I would say July (as it's my 30th in June I feel SO old :( ) I would be willing to go to either but has anyone considered Manchester?? Anyway, as soon as it is confirmed post all the details and the hotels we are looking at and I will see you all their!
  17. CBSab, you got the details of the e-bay seller?? I know I'm just being lazy but hell it's weekend and I can't be arsed to search :D
  18. Morning all, I forgot to mention www.securityforest.com they have some fab intel and a wonderful "Exploit Tree". For anyone not familiar with the concept of an exploit tree, it is best described by the explanation on security forest web page, why reinvent the wheel ^_^ "The ExploitTree is a categorized collection of ALL available exploit code. ExploitTree's ambition is to become the most organized, rich and up-to-date exploit repository on the internet. The ExploitTree is based on CVS (Concurrent Versioning System) (http://www.cvshome.org/) and therefore allows the user to keep an up-to-date offline mirror of the repository on their hard drive" Anyway, the really good thing about this is you end up with a full collection of exploits on your local system, which is all nicely organised and segregated.
  19. LauBen

    Conficker C

    Guy's & Gal's, The researchers at SRI International have updated their Conficker paper today. This is by far one of the best analysis of the Conficker malware I have ever read. More malware information is available at SRI's Malware Resource Center, and their URL is http://mtc.sri.com/ These guys produce some of the best analysis of Malware I have ever read. If you are after more intel on botnets and the C&C used by them then take a look at their site. Also if you would like to monitor your own network, then they have a tool called BOTHunter which will monitor the traffic being sent accross your network and alert you to any BOTNET traffic. I use it along with Honeyd and it rocks! I'm sure you guys and gals have already read it and know the dudes at SRI but just in case.
  20. LauBen

    ARPing

    Ettercap all the way dude, it rocks!! Having said that if I am just playing around on a dows network, I will use Cain. If I am doing a pen-test on a *nix based network I use Ettercap.
  21. Viv man, I would just like to say a BIG thank you! I have been enjoying your post for some time and I really think that mad props need to be directed your way!! So well done man, and keep up the good work!
  22. That was my point exactly! We all know that government people and groups have this capability, but unless you trigger your ISP's "What the hell is this guy/gal doing? And why is he downloading 10GB a day?" they will most likly leave you alone, however once you are on the ISP list they will be looking at you for a LONG time.
  23. I have to say that I find Milw0rm and securityfocus are two of the best sites for vulnerabilities and exploit research. you could also try Metasploit and Canvas. On a side note you never said whether you were after a full vulnerability (exploit code/POC) or just the ability detect them?
  24. LauBen

    BBC botnet

    Hi all, I have to say that I have heard from a friend that works for McAfee, they have gone S$%T ape about being shown on a show carrying out illegal acts (or what are illegal in most of Europe). McAfee have published a statement saying they were misrepresented, and they were never told the full story or idea by the BBC, and more to the point that if they had been they would not have agreed to being in the show. On a side note anyone know the BOTNET used in the show, I was thinking Storm or Srizbi but I may have been mistaken. I was also thinking that the owners of the BOTNET will not be taking too kindly to the BBC uninstalling 22,000 zombies, and these guys do NOT play nice, so the BBC boys must have some big balls (or a wish to lose their knee caps :D)
×
×
  • Create New...