Jump to content

pizzaguy

Active Members
  • Posts

    14
  • Joined

  • Last visited

Recent Profile Visitors

1,750 profile views

pizzaguy's Achievements

Newbie

Newbie (1/14)

  1. Thanks for these, they look like they'll be quite helpful! Ahh yes. I had forgotten about 404. And thanks for the irongeek one, I hadn't yet familiarized myself with Process Monitor's controls. I guess I will have to bring the file home, because I had tried using Process Monitor, but I didn't have admin rights, so it wouldn't run. I ended up toying around with Process Explorer just to see if it could help at all.
  2. I hope this isn't breaking any rules... Some of my school's computers were recently infected with a virus. It appears to have been a relatively mild thumb drive virus. The only noticeable effects are that it automatically copies a hidden folder with a single exe file in it to attached (thumb)drives, and it copies a new autorun.inf file in. The inf file shows that it copies that exe file somewhere into the AppData folder of windows (I think, I don't actually remember where specifically). But really, this is all beside the point. I'm really just curious about what the virus is doing. So, can you recommend any applications to safely analyze the virus itself? Today I tried using a simple decrypter to look over it's assembly structure. Although, admittedly, I don't know a thing about Assembly so I was just really looking over text strings and deducing meaning through logic. Can anyone recommend any more elegant methods to examine what it's doing? I'm just really curious. Any suggestions as to a way to make analysis safer as well? Today I was just doing it on the school computer since it was already infected. I figure if I do try to bring it home I'd use a virtualbox to look it over, but does anyone know of any better methods?
  3. I personally like Eraser. Ot supports multipass overwriting of files, folders and whole drives. It's pretty nice.
  4. I believe I found what you are looking for, however, if you are planning on deploying this on a live website, you probably aren't going to have much luck. This is because the code (more than likely the same that was used when you were remembering this, which I assume is more than a couple of years), is fairly old, and actually uses the Office assistants that were included in Microsoft Office, which have since been discontinued. The code can be found at the bottom of this page , but I haven't tested it, all I know is that the URL that is in the code doesn't work. However, maybe if you're lucky, you can navigate through Microsoft's maze of links to download the actual files for those and host them yourself. Although, this may only work on IE, so that would also pose a problem. Oh well. Good luck. :)
  5. Hi everyone. I thought about going to a different more, java-centric forum to ask this, but I trust you all more, so I figured I'd give it at a shot here. I'd consider myself pretty advanced when I comes to java, but I can't figure out how to actually use a third-party library (packaged in a jar file). I can't find anywhere that really talks about how to implement it in a program. Examples that come with the library were in the jar, but I can't figure out how to make my own programs and use the library without placing them (my files) in the library's jar. I saw some things talking about setting a class path, or something, but that sounded like that would only install it on my PC, meaning others would have to download the library themselves in order to use my program, is that correct? Basically, how can I use a third-party jar packaged java library with my program so that I can easily package it all up and distribute it? (this appears to be allowed in the library's license). EDIT: After a bit more of looking, it appears that I do in fact need to use the Class-Path, but is there any way to do it through the manifest file when it's not in the jar file, since I don't want to have to repackage it every time I want to test the application? There's the command line way, but that once again brings me back to it only working on my computer. EDIT 2: Sorry about this everyone. I think I figured it out. My IDE has a way to include libraries, and it looks like when it exports the project to a jar, it includes the library with it. Now if only I could figure out why it says one of the classes is abstract when it clearly isn't...
  6. That defeats the purpose of a memorable password, doesn't it? At that point one would be best using randomly generated passwords and Keypass.
  7. You may also want to take a look at this program: http://www.prnwatch.com/prio.html, It adds a new tab or two to the windows task manager, but more importantly for you, on the processes tab, it adds a mouse over tooltip which includes a full path to any of the processes.
  8. CUPP works fine in windows, I just tried it. Just download it, if you have not already (http://www.remote-exploit.org/wp-content/uploads/2010/01/cupp2.tar.gz) and extract it using a windows tool compatible with tar files (7-zip is good), then just use the command prompt to cd into the extracted directory and then just type "cupp.py -i". Note: obviously you need to have python installed if you don't already.
  9. Just saying, for the wordlist you talked about, assuming my calculations are correct, there are approximately 1.496x10^26 combinations of strings for every character on a normal keyboard (I count 74) with a length of 1 to 14. if one does only the 36 letters and numbers that goes down to 6.316x10^21 That could translate to a file of: 176498198800000002031616 bytes or 172361522265625001984 kilobytes or 168321799087524416 megabytes or 164376756921410.56 gigabytes or 160524176681.065002 terabytes or 156761891.2901025 petabytes or 153087.78446299 exabytes sorry about the useless reply, I couldn't help it
  10. Rickroll yourself? Tweet about lack of security. Attempt to DDoS the federal government. Get suspended. Blog test answers. Y'know, be original.
  11. I don't believe there is any way (at least not an easy way) to encrypt functions into an image. I was talking about hot linking (and logs wouldn't even be necessary).
  12. Actually, unless I'm missing something, it could be fairly simple. All it would take, I believe, is some simple PHP (and optionally an SQL database). The tracking itself could run from a lone PHP file with nothing else, because I don't think a hash would even be necessary. (forgive me if I'm wrong and this triggers spam or filters) but people could simply embed an image "example.com/images.php?id=your_email", could they not?
  13. There is a nice program for Windows mobile phones with wifi, WiFiFoFum, it has a decent display of wifi devices around it. Its free, or else it used to be...
×
×
  • Create New...