Jump to content

Sector.Xero

Active Members
  • Posts

    14
  • Joined

  • Last visited

Recent Profile Visitors

1,480 profile views

Sector.Xero's Achievements

Newbie

Newbie (1/14)

  1. I got it from desterman too. I was hoping it was Darren PMing me to be his new best friend. FUUUUUUU....
  2. No, this is only education purposes. I have plenty of friends who Guinea pig for me.
  3. Hey thanks Pyschosis, I was thinking about the loop back concepts also. As I was posting, I thought "what if its like calling your own phone number?" Do you have any tutorials on the port forwarding and changing IP tables?
  4. I'm analyzing the whole proof of concept behind SET. SET creates a fake website, that sends a user a malicious java applet. I understand. The tutorials demonstrate this whole proof on concept in private / local networks. If a person wanted to test this across the internet, what is the trick to make it work? I know that same ISP's block port 80 by default (in TOS). I tried using a virtual machine to connect to my own external IP address, but with no success. Can anyone shed light on this?
  5. Wow, that is a really interesting link. Thank you for that.
  6. Do zipits have a wireless network manager? I can't recall. I remember Darren having to manually enter the ESSID of his home network. I guess my question is, once the Zipit is up and running, are you able to view available wireless networks around you?
  7. I have one more question. Can you crack all WPA handshakes? Or is it more like specific types of WPA handshakes?
  8. I'm pen testing my home networks. I've noticed that there are alot of WPA / WPA2 cracks that involve capturing the handshake and running it against a dictionary. Has there been any other attacks that have come out? I've been Googling it crappy results? Is there any other methods?
  9. You guys are so good at mindless consumerism. The game isn't even 2 months old.
  10. Hi. It's snowing and I'm bored. Could any of you guys tell me the trick to viewing these malicious scripts? I would like to see examples on how they are trying to attack my UB3RLE3T3 HAXoR BOX!!!!!!
  11. I browse the web all the time. When I do browse the web, I feel like I redundantly check the same sites over and over. Here are a couple of mine: http://www.vimeo.com/1442860 - John Strand Securtiy Videos maddox.mission.com - Funny blog since 1998 or so. www.cryptome.org - General Declassified Documents and Stuff Can you guys give me some links to your favorite sites?
  12. I have a router setup at home. Now I've heard having a router is a level of protection, but can it be defeated? The question I'm asking is. Can a hacker who knows my external IP address of (77.77.77.77) go across the internet and connect to my router. Then ultimately running an exploit on specific client on my private network. Like specifically targeting 192.168.1.1? Is there any guide to this?
  13. 250 views and no one can relate?
  14. This is my first post. First off. Hak5, you guys really know your stuff. Very admirable. This USB project is quite intriguing. For my nuubie question: Just like the title says I can't get past the first initial step. I have the LPinstaller.exe and the iso. I'm trying to flash the CD partition of the U3 with the modded version Hak5 provides. My problem is that it the status bar for the installation goes up to 100% and then just sits there. I've let it sit there throughout the night, but nothing. I deny the LPinstaller access to the Internet because I figured the software being installed is on my hard drive? Should I allow it Internet access? Has anyone had the same problem? Any suggestions would be appreciated. Thanks.
×
×
  • Create New...