Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

About shawty

  • Birthday 03/12/1973

Contact Methods

  • MSN
  • Website URL
  • ICQ

Profile Information

  • Gender
  • Location
    Northeast, UK
  • Interests
    Pretty much anything to do with technology.

Recent Profile Visitors

1,451 profile views

shawty's Achievements


Newbie (1/14)

  1. Iv'e just done the same with this as I do with all other spam bots. Gave it the email address of my "Spam P***er offer" :-) SOme time ago i set an email address up on my domain, called "spamoff@........" which goes to an eliza style AI chat/bot system, that basicly just argues with the senders, when replying it also ignores the sent from address, unless it can't find a server paper trail in the headers. This is not often since most Email servers publish "sent from... recived by... blah blah in thier headers..." Anyway it's great fun watching the logs sometimes, some of them really do believe that they are arguing with a human being :-)
  2. shawty

    VNC over SSH

    ok, here's how my set-up works: I have an Ubuntu server that has a port opened on my router/firewall. This port is forwarded straight to the Ubuntu server, where SSH is served by OpenSSH on the standard port of 22, on my router I've opened port 8000 and forwarded that to the internal IP of my ubuntu server on 22. That gives us the following: |-------------| | Router | |---------------| 8000 ->> | | -->>> 22 --->>> | Ubuntu box | | | |---------------| |--------------| (Sorry if the ascii gets messed up) At this point, you now have to remember 2 things. A) The ubuntu box can already see any other machine in your network, so you do NOT need to open extra ports on the firewall to get to those machines. B) The ONLY machine you need to connect to is your SSH, what port you open on your FW/Router and how is entirely up to you. Ok.. now you need to install VNC server onto the windows machines that you wish to remote, then have it active and running in service mode, check all is ok by running VNC viewer on one machine internal to your network and checking you can connect to the others. Once this works your good to go. From your remote machine (outside your network) fire up Putty, set up your connection params as required and save them, then in the putty options go down to SSH->Tunnels in the connection section. In the source port, put the port address you wish to use for your connection on the PC that you are currently sat in front of, bear in mind that it does NOT have to be 5900, it can be any port you want assuming that the machine your using gives you privileges to open ports (EG: your root, admin, or a user with those rights etc) In the destination box put the IP (or domain name) of the machine inside your network you want to connect to followed by : and the port number. So EG: if you installed VNC on the standard port of 5900 and your win-pc was called mywinbox, then you would enter mywinbox:5900 Click the add button. You will then see this entry get added to the tunnel list. At this point, you can connect to your SSH, enter your user name/password then minimise the putty window. Fire up VNC and connect to the local port you added above, and you should see your remote desktop. You can add as many tunnels to as many different hosts as you like, and give them all different local addresses, but tunnel them all through the same SSH session. For more info see the article i wrote on the subject for "Enterprise IT Planet" which you can find at http://www.enterpriseitplanet.com/networki...cle.php/3798541
  3. You can use this on another windows box to make a PXE network boot server http://tftpd32.jounin.net/
  4. Unetbootin works with any ISO, but you need to allow it to make a one of it's built in ones first so you get the correct boot block on the disk. Iv'e had it booting from UBCD-WIN and few other goodies.
  5. All Dotfuscator does Somthing... is to mangle the stub names, assemblies and MSIL calling structure. Anyone with enough time and patience can still reverse engineer it, I've done it myself using nothing more than a hex editor. As Drop pointed out, .NET is rubbish for what your trying to do, personally if it where me, i'd go the path you where thinking, that is write your own encryption routine to encrypt your compiled EXE. If you make creative use of the file IO functions, or even use PHP's binary safe file functions, then you can put together your own bit twiddling code quite easily, once you've got a prototype for encrypting it, you could then use MASM32 (http://www.masm32.com/) and build a small loader that you tag onto the front of said encrypted data, that would then take care of decrypting, loading into memory then passing control to. Your other alternative is to try using self modifying code, again this is something I've done in the past, but alas not so much on the X86 platform, i did used to do this kind of trick all the time on the ARM VLSI Platform cause the instruction set was perfect for it. Unfortunately there is one big drawback with both methods. Anti virus software. Most AV's these days will pick up what your trying to do through heuristic analysis and may prevent your code from running. As an example, i have bad problems with apps packed using "Themedia" as AVG goes balistic whenever i try to run one, and usually detects it as "Win32/Themedia" virus. The reason? Simple, a lot of malware authors pack thier files using Themedia and so the AV is erring on the side of caution. Anything thats going to modify it's own structure in memory is likley to trigger some sort of reaction from an AV, which leads me to my final point. Most AV's expect some kind of manipulation of resources, so what i generally do these days is i write my program as normal, but for my protected code, i use them a little like overlays of the bygone dos days. Create your protected routines as DLL's, then zip/gzip/mash whatever them and attach them to your main program as resource files, and simply unpack and late bind to them on the fly, remembering to unbind and delete them when your program exits.
  6. 3 top books for ANY .NET professional: MS-Press: programming ASP.NET 3.5 Manning: Linq in action by Jim Wooley Apress: Accelerated Silverlight 2 Those 3 books NEVER leave my desk :-D
  7. When ever i have spare time (which realy doesn't happen much) i usually go hunting on sourceforge to see what projects i can get involved in.
  8. It's still possible with visio. However i would say that any half decent design/cad package will allow you. In visio it was just it has custom templates.
  9. Heh... always the simplest of things ain't it :-) If your messing with arrays and such, you might want to try using the new generic list types in .NET 3.5 EG: List<String> myStrings = new List<String>(){ "Jim", "Blue", "Jack", "Black" } It's makes things much easier beacuse you can use them like a stack, also there great for custom data: public class myClass { string name = ""; string color = ""; } List<myClass> people = new List<myClass>(){ new myClass(){ name = "Jim", color = "Blue" }, new myClass(){ name = "Jack",color = "Black"} } Because it's a class, it can have methods too, so each element in the list can still access it's methods... EG: string color = people[1].getColor(); // Assuming you'd defined it.
  10. Something.... Cthobs is bang on the money with eval, there is an eval function built into VB and it works near enough the same was as the javascript one. However, that's not why my post ;) If you use the ASP>NET ajax toolkit, there's 2 components in there that will A) Allow you to do your real time in page update and B) Have a Calulator connected to your text box. You'll find everything you need to know in both VB and C# here. http://www.asp.net/ajax/
  11. I just finished mine, long story short, i extended my BT socket up into my loft space where i have a rack. Iv'e run standard CAT 5e up the inside of the dry-wall, keeping it away from the mains electric cables, my router (Cisco 800 series) is plugged directly into a Cisco Catalyst 2900 switch. Each of the lines coming up the inside of the walls all terminate at a patch bay that's attached to one of the rafters, and these are then strung across to the catalyst. I picked the router and switch up of E-bay for £50 , and they are proper ex-IT industry heavy metal, there's only 10/100 on each port but they do me fine for what i use them for.
  12. Micah C, It is possible, You can load anything you like into the text property of a control at runtime, as it's just a normal string object. The problem your going to have is: A) If this is to be rendered on a web page, then forget it, as you'll either loose the formatting, or royally confuse the ASP.NET engine. B ) If it's going in a winforms app, and your expecting the formatting to show up nicely, again forget it. The winform variants of these controls will just display the tags, as is without trying to interpret them. There are components that can use HTML for formatting, and some of them are free, i would suggest starting your search at http://visualstudiogallery.com/ , however an easier way if you need to use HTML for formatting and embed items from other controls in, is probably to create a hidden form in your application. Populate said form with your controls, and add some logic in to access them. Then in your main form use a web browser control stretched across the whole form with it's background color set to your forms background color. You can then load your HTML strings in from your resources in the app, and use simple string replaces to swap tokens for control values, before squirting the HTML code into the web browser control. Iv'e used similar methods myself on other projects and while not perfect they are reasonably effective, and you can do some pretty eye catching stuff. You could also try ditching winforms and using windows presentation foundation and/or silverlight. Cheers Shawty
  13. Excellent stuff :-D Iv'e not seen anything like this since those heady days compiling and developing under MS-Dos using Turbo C & BC++. oh and who can for get Zortech?? I still have a set of 20 5.25 Installation disks hiding in a corner somewhere :P Seriously though, good on you for having fun while learning, thats what it's all about, and it's something a lot of students don't do these days, i remember the voyage of discovery i had back in the 80's, and i still enjoy and have passion for what i do today. If you want to expand on the speaker beep thing, something you may want to try is to use the Classic Win32 Multimedia API, and open the default midi device directly, you can then send note on/note off commands one at a time with the appropriate values to play music. I keep meaning to resurrect a project i chucked together eons ago, to play back music files created by the music tracker suite i wrote for the BBC Model B micro, and in order to do that i was going to adopt a similar approach, I just never got round to it :-D Cheers Shawty
  14. No offence, suparice but if your client wants a security audit without using industry standard tools such as nessus, then there not serious about the results. If i get a client, and they ask me that (and there are some) i explain that nessus and co are the standard, basic tools that should be used first, if they disagree then i simply cant' do a through job. We have these tools, through years of development, and they are deved for just such a reason. Cheers Shawty
  15. You could if you where sure the path & share exsisted. Remember however, most savy sysadmins will disable the default C$ and other x$ shares for security reasons. That said, anything you can run from a command line on your own box, can in theory be run on the remote PC using psexec, providing A) the user account your specifying has permission on the remote to do this B ) The app/CLI program exists on the remote PC C) the share exists Cheers Shawty
  • Create New...