Jump to content

GuardMoony

Active Members
  • Posts

    232
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by GuardMoony

  1. 1st of all. yes you could be able to capture it. But its captured RAW. ( you could also just use your own wireless adapter ) 2nd Yes you could potentialy do mitm. if you get 2 HackRF's. But again this data that is captured is raw data. Meaning you would need write your own translater and stuff. While all of this can be done with the pineapple and such. As off MITM. the word itselfs says it. Your in between the 2 so you always need to be connected.
  2. NY Times: http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?hp&pagewanted=all&_r=0 Full announcement: http://www.nist.gov/director/cybersecuritystatement-091013.cfm In short: They think there is a back-door in the RNG for making encryption witch would lead into a easy way for them to decrypt anything that used this RNG List of Company encryption usage: http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgval.html Company's like Apple, Cisco, Juniper, ...
  3. Maybe some of you already read it maybe you didn't. http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
  4. the range depends on how good the wiring is, how much sections are in between, how many fuses and so on. The more crap is in between to lower the range and speed.
  5. I would also recomment leaving yahoo. Esp. if your saying she's using a yahoo account as workd account ?! This realy puts people off. Buying a domain barely cost something these days. And most internet providers give you mailbox where you can link your domain on.
  6. Dont forget that only static paswords are used with truecrypt. Damn it would be nice to have a encrypted disk with OTP :/
  7. Never would go for bluetooth. It has been shown to be insecure. So in theory the people could just hack in to your pc because you got bluetooth running. So your way of securing it makes your pc less secure. RFID seems to be more secure. Wasnt it 0x80 that showed a way to encrypt a disk by using a selected ammount of bytes from a usb-stick for the key ? and a usbkey is pretty simple to break or get lost :p
  8. point 3. And yet you upload it yourself to virustotal. Thats like yelling. "HEY YOU AV GUYS. CHECK THIS FILE. ITS GOT SOMETHING NICE!". Wouldnt be surprised if its detected within a month.
  9. First of all post in the right place. 2nd is it just full/subdns names? or is it like everything with the word "foot" in the dnsname needs to be redirected? case 1 just run a dns server for the lan ? case 2 probaly gone need a proxy to filter this stuff ? ( case 1 can also be done by this, but is more work if its only a few DNS names )
  10. http://opendays2013.web.cern.ch/ I know its a bit late to post. But hey.
  11. Dont forget you can run windows in trail ;) mostly its 30days. On some windows version you can extend it to 120days using legal commands inside windows.
  12. The term you need to search on is pivoting. https://www.google.com/search?q=backtrack+pivoting
  13. Never said you need to write your own SSLVPN software. You could run a firewallserver/vpnserver like pfsense that uses openvpn. Or real hardware firewalls like zywalls and such to do the vpn stuff. or something like: http://sourceforge.net/projects/openvpn-als/ There enough out there. ready to use solutions. About the java. If a persone wants a secure e-mail like that. Then you can be sure they know how to keep java up-to-date. And people that realy want to be secure can just set java only to be allowed on your site.
  14. GuardMoony

    Watch Dogs

    Splinter Cell like game. With hacking of the city detroit :)
  15. Actualy i noticed on a sony vaio laptop that after removing mcafee the MS SE still does not work. It seems that some manufactors doesnt want you to use it. And like the OP said. you cant download the version for win8. Below is a group that does automated AV test ( daily ). It gives some information how good the AV are. https://www.shadowserver.org/wiki/pmwiki.php/AV/Viruses ( ps. they run the AV on the recommended settings by the AV firm. Witch you cant realy do on your own pc to much false positives that way )
  16. Self Singed is not a option. Who would ever trust a "secure mailing service" using self singed https. 2nd like midnitesnake pointed out. https is unsecure for MiTM attacks. Best way to solve it. Use vpn to get a secure way out. That lessens the chance on a MiTM attack. (P.S. Kim Dotcom is also working on 1, there main problem is searching in encrypted e-mail) Now comming to a possible sollution. What about running the mailservice behind a SSL vpn solution? Pros: - Secure connection from anywere with any client ( mac, linux, windows, ... ) - No vpn/server/.... needed by the client - The whole route from client to mailserver is encrypted Cons: - Needs Java on the client side. - Require more powerfull servers and mayby special hardware
  17. I dont think Plunks is having SID problems... I just think the his BSOD in esx are caused by lack of driver support for those XPe. I think your gone need to rebuild the XPe with the right drivers that are used in esx & by the kiosk hardware.
  18. Just make sure you got driver support for your card. For the rest it should be like a normal network card to setup
  19. Ok, If i think you mean. You want to reinstall your laptop with a linux host system. To run virutalbox. And on that you want to run win7 and kali as VM's ? If so. Yes thats possible. But i would got for centos/fedora insted of red hat. ( those are based of red hat, red hat normaly asks money for support ) 2nd make sure you got drivers for it. It sometimes can be a hell to get drivers to work under linux.
  20. Small question. Any chance the buildings also use the same main powerline, and on the same fase? If so you could try powerline adapters http://www.amazon.com/s/ref=nb_sb_noss_2?url=search-alias%3Ddigital-text&field-keywords=powerline+adapter&rh=n%3A133140011%2Ck%3Apowerline+adapter If thats not possible then wireless on the roof or sides are the only way. But this means wireless linkups between building and prob a other AP or cable inside each building. Also depending on the building layouts. I like the EnGenius ones. They got build in directional and some got the option to add external entannes. ( omni or directional ) We got 1 costumer would got 2 of these poiting at eachother to form a network bridge. The building are opposite across a road. And the AP are a about 7feet of the ground. ( trucks and busses still get in the way ) but at max power they dont lose connection and no external antenna needed. ( Was actualy first time using these. And we had to luck to try before buy ;) ) 2nd time i used them. it was only 1 engenius and 1 normal router. It was at a camping ground. And we got 100+ feet distance out of that. With a few branches in the way. It was stable but not on the max speed. ( 2 of the directionals would fix that. But they didnt want to pay that much, only beeing used 2 months a year ) Ofc like previously said. Use 5Ghz to link buildings ( security through obscurity ) . What the kind see what the cant get ;)
  21. Katana is also a nice MUST HAVE http://www.hackfromacave.com/katana.html
  22. Canon isnt much better :p We had the same thing that it required all caps. And looking at the documentation it never states that it needs caps. ( only the examples show there in caps )
  23. You could test if its the bandwidth or the router. If youre under attack. Just run a quick speedtest. ( like speedtest.net ) if that shows low speeds. ( esp upload ) Then its your bandwidth and then there's not much you can do. Otherwise if thats still high enough. then it could be the router. P.S. Run a test before any attacks to have a base comparison. I just put my own server online. And that got a pfsense fw in front. It seems verry decent and easy setup.
  24. Dont think some1 will record these. ( at least not in brucon ) The training days for brucon are 1500€ + VAT.
×
×
  • Create New...