Jump to content

GuardMoony

Active Members
  • Posts

    232
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by GuardMoony

  1. Ok, Most of you people probably came a cross this before. Trying to configure a new linux and getting nowhere just because SELinux is enabled.

    So i taught lets ask some questions to the hak5 community and see what they think of SELinux. ( Not going in to the topic if its more secure :p )

    • What is the standpoint of you guys on SELinux ( Good, Bad, Only made to annoy people, ... )?
    • Do you make use of it?
    • Did you ever wrote rules for this?
    • Do you use it in combination of self compiled software?
    • In witch scenario do you use it?

    If you got some questions yourself, Feel free to add em.

  2. 1st of all. yes you could be able to capture it. But its captured RAW. ( you could also just use your own wireless adapter )

    2nd Yes you could potentialy do mitm. if you get 2 HackRF's. But again this data that is captured is raw data. Meaning you would need write your own translater and stuff. While all of this can be done with the pineapple and such.

    As off MITM. the word itselfs says it. Your in between the 2 so you always need to be connected.

  3. NY Times:

    http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?hp&pagewanted=all&_r=0

    Full announcement:

    http://www.nist.gov/director/cybersecuritystatement-091013.cfm

    In short:

    They think there is a back-door in the RNG for making encryption witch would lead into a easy way for them to decrypt anything that used this RNG

    List of Company encryption usage:

    http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgval.html

    Company's like Apple, Cisco, Juniper, ...

  4. I would also recomment leaving yahoo. Esp. if your saying she's using a yahoo account as workd account ?! This realy puts people off. Buying a domain barely cost something these days. And most internet providers give you mailbox where you can link your domain on.

  5. Never would go for bluetooth. It has been shown to be insecure. So in theory the people could just hack in to your pc because you got bluetooth running. So your way of securing it makes your pc less secure.

    RFID seems to be more secure.

    Wasnt it 0x80 that showed a way to encrypt a disk by using a selected ammount of bytes from a usb-stick for the key ? and a usbkey is pretty simple to break or get lost :p

  6. Requirement:

    1. Must be friendly

    2. Promise this is for educational purposes only

    3. Promise not to give this file to the antivirus people, I dont want this keylogger to be detectable

    4. If you do use this and get in trouble in any way/shape/or form, it is not my problem

    point 3. And yet you upload it yourself to virustotal. Thats like yelling. "HEY YOU AV GUYS. CHECK THIS FILE. ITS GOT SOMETHING NICE!".

    Wouldnt be surprised if its detected within a month.

  7. First of all post in the right place.

    2nd is it just full/subdns names? or is it like everything with the word "foot" in the dnsname needs to be redirected?

    case 1 just run a dns server for the lan ?

    case 2 probaly gone need a proxy to filter this stuff ? ( case 1 can also be done by this, but is more work if its only a few DNS names )

  8. It is exactly the same process as setting up virtual machines on Windows and if you are looking for an XP iso you can pirate it BUT make sure you have an authentic license to register the software with otherwise its illegal. But because Windows XP will no longer be supported come the end of this month I don't think Microsoft would care to much BUT IT IS STILL ILLEGAL AND I DO NOT CONDONE IT! :D

    And if you still want help setting up a virtual machine google: "create a virtual machine with vritualbox"

    Dont forget you can run windows in trail ;) mostly its 30days. On some windows version you can extend it to 120days using legal commands inside windows.

  9. Never said you need to write your own SSLVPN software. You could run a firewallserver/vpnserver like pfsense that uses openvpn. Or real hardware firewalls like zywalls and such to do the vpn stuff.

    or something like: http://sourceforge.net/projects/openvpn-als/

    There enough out there. ready to use solutions.

    About the java. If a persone wants a secure e-mail like that. Then you can be sure they know how to keep java up-to-date. And people that realy want to be secure can just set java only to be allowed on your site.

  10. Actualy i noticed on a sony vaio laptop that after removing mcafee the MS SE still does not work. It seems that some manufactors doesnt want you to use it. And like the OP said. you cant download the version for win8.

    Below is a group that does automated AV test ( daily ). It gives some information how good the AV are.

    https://www.shadowserver.org/wiki/pmwiki.php/AV/Viruses

    ( ps. they run the AV on the recommended settings by the AV firm. Witch you cant realy do on your own pc to much false positives that way )

  11. Self Singed is not a option. Who would ever trust a "secure mailing service" using self singed https.

    2nd like midnitesnake pointed out. https is unsecure for MiTM attacks. Best way to solve it. Use vpn to get a secure way out. That lessens the chance on a MiTM attack.

    (P.S. Kim Dotcom is also working on 1, there main problem is searching in encrypted e-mail)

    Now comming to a possible sollution. What about running the mailservice behind a SSL vpn solution?

    Pros:

    - Secure connection from anywere with any client ( mac, linux, windows, ... )

    - No vpn/server/.... needed by the client

    - The whole route from client to mailserver is encrypted

    Cons:

    - Needs Java on the client side.

    - Require more powerfull servers and mayby special hardware

  12. Ok, If i think you mean. You want to reinstall your laptop with a linux host system. To run virutalbox. And on that you want to run win7 and kali as VM's ?

    If so. Yes thats possible. But i would got for centos/fedora insted of red hat. ( those are based of red hat, red hat normaly asks money for support )

    2nd make sure you got drivers for it. It sometimes can be a hell to get drivers to work under linux.

  13. Small question. Any chance the buildings also use the same main powerline, and on the same fase? If so you could try powerline adapters

    http://www.amazon.com/s/ref=nb_sb_noss_2?url=search-alias%3Ddigital-text&field-keywords=powerline+adapter&rh=n%3A133140011%2Ck%3Apowerline+adapter

    If thats not possible then wireless on the roof or sides are the only way. But this means wireless linkups between building and prob a other AP or cable inside each building.

    Also depending on the building layouts. I like the EnGenius ones. They got build in directional and some got the option to add external entannes. ( omni or directional )

    We got 1 costumer would got 2 of these poiting at eachother to form a network bridge. The building are opposite across a road. And the AP are a about 7feet of the ground. ( trucks and busses still get in the way ) but at max power they dont lose connection and no external antenna needed. ( Was actualy first time using these. And we had to luck to try before buy ;) )

    2nd time i used them. it was only 1 engenius and 1 normal router. It was at a camping ground. And we got 100+ feet distance out of that. With a few branches in the way. It was stable but not on the max speed. ( 2 of the directionals would fix that. But they didnt want to pay that much, only beeing used 2 months a year )

    Ofc like previously said. Use 5Ghz to link buildings ( security through obscurity ) . What the kind see what the cant get ;)

  14. Hmm, I feel the title is easy: it reads: -i (the i is in binary to ascii, the - is html special chars). Now, take the -i and look at the page content.. Lights turning on? (:

    isnt it –i

    – U+2013 – en dash used e.g. to indicate a range of values

×
×
  • Create New...