Jump to content

Wetwork

Active Members
  • Posts

    163
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Wetwork

  1. It appears that we have some spammers and phishers on our beloved hack5 forums who are sending out PM's got this little peice of creativity this morning from maceylove12 if this was a social engineer attack its one of the worst that i have ever seen. Has anyone else gotten on from this "member" and is it possible for the mods to ban this individual?
  2. Wetwork

    RDP server

    why dont you get a VPN router that way you have access to your entire network and then if you are running a windowz box just enable RDP
  3. Symantec Corporate Antivirus 10x has been good to me and my networks for a few years now. The central monitoring is a godsend
  4. i absolutely will take one, have a fon that has been bricked for quite some time and have been to crazy to make my own
  5. if you are running an ESXi or VMWare server, VMWare has a free tool that you can turn any phyiscal system into a vm with a few clicks. Matt did an episode on it last season i think that it was from this episode http://www.hak5.org/episodes/episode-512 check it out
  6. I vote for dogs but the one i got (BlackLab v7) is more of a demanding goddess and when her humble minion doesn't give her enough worship she has a tenancy to be a vengeful goddess and pulls the power cable out till worship time is over I also have kids 1.0.15 but has mutated into an independent AI who seems to have power spikes and eradicates notebooks and netbooks on a constant basis. Considering downgrading the ram on that product
  7. After continuing discussions with my client on the topics that were discussed in this thread he has informed me that the search will be limited to keywords aimed at proprietary data that the company produces. I have had multiple discussions with him regarding the safety of said data and that no system is 100% secure (being a CEH pentester i can attest to this fact) but recent losses of clients to "other" providers of "similar" products have enraged him and wants to in his own words "plug the leaks" within his company. Other suggestions outside of key loggers such as exchange monitoring (and is in place as i find out and is not where the leak is coming from) were put forth by my company but he likes the idea of a keylogger. In discussions of the ramifications if the logs were discovered he has stated and i will investigate this on my own by looking at the non-compete and the non-disclosure contracts that every employee had to sign. he states its within his rights as owner of the company and of the products and data that the company produces. If i do find a solution and implement it there will be a Hold-Harmless contract that i will have him sign so i don't get dragged down into the mud if something goes wrong. First and foremost i am going to cover my ass and if he is going to burn its on him but a job is a job @ Firebrand Thanks.....this is a good suggestion and will investigate it, Hardware keyloggers isn't a direction that i had considered going with but it might be a possibility for this job thanks all for your input
  8. a search parameter in the log can solve that problem of finding the proverbial needle in the haystack. The file will be stored in an encrypted folder on an offside SSH protected drive and like i said there will be security by obfuscation. Closing off instant messengers wont work with outside e-mail programs such as yahoo, gmail or meebo that work over port 80 and is necessary for web access. I guess that i will close the topic and look around some more to meet my clients needs since the answer isnt going to be found here. Thank you for all that replied to this thread
  9. your ability as a social engineer is one of the best tools in a hackers toolkit. Find out who a member of the opposing team is and bribe him with sex, chocolates and pantyhose to do whatever you need to do to win!
  10. That goes without saying but the original question still stands for recommendations of either written or precomplied software key loggers I am not one to implement a job without trying to explain the ramifications of a particular hardware or software choice to a client. I have been in this game for far too long (over 10 years) to base my reputation on "just getting the job done" because when the music stops i am the one that will get the heat. When a client asks me to investigate a possibility i must by my own ethical code do my best to explore that direction. the security of this situation is more by obfuscation in the fact that the only two people that will know if its exisitance is the owner of the company and myself. SSL implementation of the transfered logs was a consideration that was going to go into effect before posting my query to the forums. If i was more of a coder i would just write the damn thing myself and be done with it but being that my coding sucks i must look to my peers to see if they have a suggestion
  11. my suggestion is to cheat! the eaisest way would be get phyiscal access to the box and use the usb hacksaw that will dump the SAM files to a remote access terminal and that way you can get all the user names and hashes for passwords from there its cake to get the password files and thereby win the comp hackers circumvent the rules for whatever works to attain the goals
  12. what he explained to me was that most of the commercial packages come wrapped up with other forms of network monitoring such as screenshots, web monitoring and other monitoring packages. the other issues that he has is that for most of the pre-packaged commercial products its cost prohibitive when it comes to a network of over 50 systems if i can find a client based key logging program that just does key logging i thin that he will be happy and continue to use my company for the extended future and that = good revenue for me :)
  13. that was one of my suggestions and he wants to go for the full keylogger package and i got to do what i can to make the client happy
  14. the client wants to get logs of conversations so when it comes time for termination there is no question of complicity and specifically asked for a keylogger
  15. I have a client who wants to implement a keylogger on his network but after researching the web about this for a bit he is unhappy with the choices that are out there for so-called commercial use He is running a windows based network and wants it to be invisible to his staff who he feels more than one of them might be violating there non compete clause in there contracts but wants proof of such actions can anyone suggest some either created keylogger or a commercial product that can be implemented on either a server based or workstation based system with auto dump to e-mail or secured file to a remote terminal via SSH? Note: he has assured me in writing that this software will NOT be used to scam CC #'s or passwords your input is appreciated
  16. sorry for all the questions but its the best way to advise you for where to start if you have physical access to the systems check out the hacksaw USB hacks here in the fourms all you would need is a USB drive and a little creativity
  17. do you have physical access to the systems or is it over a network? is there any type of IDS or firewalls that would prevent access?
  18. as the hacker what is the goal here? This will dictate what direction we can advise you to research. Every hacker/penetration tester has a goal in mind for what they want to achieve Is it just to break into the opposing teams system to download file x from server y? Is it to get a list of IP addresses or names of systems? is it to deface or change content on an existing web page? is it to get a list of user names and passwords for the defenders systems? an outline of overall goals would be helpful
  19. what exactly are you looking for?
  20. Ya this is baddasz if you want you can add me as a friend as Wetwork
  21. you can also social engineer a staff member of company x by either dropping a USB key with a payload preinstalled and hope that employee of company x will use said USB key and then depending on the payload on the USB key you can get access that way OR you can attempt to find an internal phone directory in some way to company x and use social engineering skills to determine the IP address of a box inside the network by posing as a rep from a company that services the servers such as VmWare or the like
  22. in most BIOS there is a 3 strike and your out policy when it comes to the bios password requiring a restart including laptops and desktops that have TPM such as the laptops in question
  23. Wetwork

    OpenVPN

    whip out the old wireshark and do an analysis of all traffic on that particular NIC. That should let you know what is gobbling up your bandwidth
  24. Ya the presentation did suck and the video was even worse but you have to admit that even down to your hairstyle the resemblance is uncanny :) Glad that we have you instead of him
  25. They do have kits that you can make your own RFID read/writer for not alot of money but the down side is that it wont work with every type of RFID chip so do your homework Check http://www.sparkfun.com/commerce/advanced_...ection=products They have some products as well as robot supply stores. Might also want to check Ebay as well
×
×
  • Create New...