Jump to content

The Sorrow

Active Members
  • Posts

    289
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by The Sorrow

  1. log on to a network (one that has little or no security) and leave little txt files titled "SECURE YOUR NETWORK" with a brief description of what they need to do and the risks of not doing so. Generally, it works.
  2. Windows 7 x64 Firefox and its web browsing deliciousness Symantec Corporate Edition Spybot Not much else needed.
  3. Id say infiltrators take is right, ssh uses port 22
  4. I never got the stock card working, it doesnt matter to me now i cot an Alfa. Life goes on i guess. If anyone CAN figure it out then by all means go for it and good luck.
  5. Wifi hacking, if its a honeypot scenario, redirect them to a locally hosted web page saying they got owned and they need to watch out. If its a wifi access point...ill just put a notepad doc on their desktop. "hey, i got in...fix your security with these 3 easy steps..."
  6. 1337 W3RD 0F 7H3 D4Y: PHISHING
  7. heh wow ok nvm. apparently when you change to gnome it loses the menus to all the tools on BT4
  8. so jsut find a quick install guide and were g2g. like a gnome for example.
  9. I was chillin on the wire today and doin my usual traffic analysis and....well...BT4 is just boring looking. i was wondering if i could add one of those fancy themes that are out there online for the BT4 KDE. Is it possible?
  10. LOL trust me if you sounded like a jerk i would spitefully and subtlety tell you so ;) I have fired it up and am tinkering. I was just looking for the input of fellow IT junkies
  11. I have opinions and others do too. I was just wanting to know for general reference as to what others think of this OS.
  12. Anyone have any opinions on this OS? I've read the reviews but its kinda inconsequential as to how good it is. Comments and suggestions appreciated.
  13. Remote Exploit has released a road-map that plans on the development and release of Backtrack 5, the next in line of the famous pentesting OS by February 2011. Here's a link
  14. Okay Ive heard some pretty interesting things about SLI and i was wanting to know (in lamens terms) how it actually works and what benefits it gives. Ive heard things from the obvious such as doubling the GRAM to something that im not sure about like doubling bus speed and clock times. Any an all help is appreciated.
  15. well i already knew the ARP spoof to knock the machine off the network, i needed to know what to do after i deauthed the host
  16. Okay, I'm on the wireless of someone's and i see they're using most of the latency (i assume torrents) so i was wondering if there was a way to exhaust the IP pool on a VM since my Dell Inspiron 1525 doesn't have a compatible wifi chip-set. Any suggestions?
  17. already did, just wondering if there was any other tools
  18. I was looking for a decent disk cloning utility for ubuntu 9.10 and have come up rather empty. any assistance avalable guys?
  19. Ok i found an old Dell 400 Workstation abd its a beige box....so that pretty much explains that i need some drivers that may or may not exist anymore. Can someone point me in the right direction thanks.
  20. is that better than squashfs?
  21. well, you cant be "invisible" but you can do your deeds, modify the logs and leave. nothing left but some packet logs saying there was a spike in syn ack and so on
×
×
  • Create New...