-
Posts
142 -
Joined
-
Last visited
Content Type
Profiles
Forums
Gallery
Events
Posts posted by 3w`Sparky
-
-
do you have more details on the switch, cisco 12.x is pretty open in terms of versions and they implement protection againest arp poisoning, so i would elimitate this as a point of failure, maybe just arping to other local devices on your local subnet rather than an (assumed) on another subnet proxy.
-
Hi All, ages since i posted,
I have an idea running through my head and can only assume that because i'm not cutting edge someone has been here before me.
I have been burgled (well attempted) and have since installed an IR sensor and alarm to my property but thought about something alittle extra.
Bluetooth logging, most people have smart phones these days, criminals included, well if fingerprinting and foot prints are enough to send crimbo's to the slammer then bluetooth mac addresses have to be closley followed right ?
I mean most bluetooth devices have the owners name on them like bob or jim (no offence to law abiding bob's & jims )
but this gives you a name of who was snooping nearby and the unique ID of there phone.
I know i could get something like thepineapple to capture wifi and maybe assiocate to an accesspoint but think bluetooth is of a lesser range and as a result wouldn't give so many false positives.
ideally based on low power consumption as it will be 12 volts powered.
-
I have always thought about water cooling, never actually done it but I thought about using an old fridge rad (the meshed pipework on the rear) that i always thought would be super .....
-
Hiya I'm actually working on a project just the same, I will post the info I have when I'm back home
-
Episode 8x22
in Hak5
I have downloaded and installed the GUI for metasploit, but on starting the .bat file it complains about a -y command on the rubyw line of the script, any ideas ?
-
Episode 8x13
in Hak5
mywi on my iphone = result
with a little googling it seems there is a free option for it ;)
-
Private Sub Command1_click()
Dim S As String
S = RndCrypt(Text1.Text, "pass")
Text2.Text = S
End Sub
Public Function RndCrypt(ByVal Str As String, ByVal Password As String) As String
Dim SK As Long, K As Long
Rnd -1
Randomize Len(Password)
For K = 1 To Len(Password)
SK = SK + (((K Mod 256) Xor Asc(Mid$(Password, K, 1))) Xor Fix(256 * Rnd))
Next K
Rnd -1
Randomize SK
For K = 1 To Len(Str)
Mid$(Str, K, 1) = Chr(Fix(256 * Rnd) Xor Asc(Mid$(Str, K, 1)))
Next K
RndCrypt = Str
End Function
-
-
while snoozing this morning i heard something on the TV about a hacking challenge to find the best security persons out there , they are setting up a website that is to be hacked and information gained in order to get to the next step, anyone heard about this, like i say i was snoozing so can't remember much about what i heard but i think this is right ?
-
is there a way of preventing the app from being shudown, disabling the X in the top right or alike ?
-
assuming you have an internal disk and a usb caddy setup, just run through mounting it via the web page the create a cron job todo it nightly or alike then just cp -R from dir A to dir B
a being the data source and B the caddy
if that isnt quick enough the its doing it through usb 1 or the server isnt upto spec for what u want
course rsync is best no cp as that willcopy all not just newer files
-
gtkdialog
its pretty stright forward once you play with a few samples for a bit
-
vlan'ing also gives the option of deploying applications and alike by subnet / eg sites and services
a good switch will do routing of vlans
learn to subnet . com i think its called has a nice powerpoint run through with speech guide
-
i have an old "well not that old" interflex usb receiver, i found that swiping my id card across input a sting of asci into notepad, it is at risk of a replay attack for sure, and the best bit is the id's between my card and others are just 3 numbers , this means that with pot luck you will be able to use anybody elses id.
i will find the model as i have two and could post one in , with a blank card
-
-
which leads to the next question, what's best ?
I have to conform to CESG Governance ideally but wondered what might be best but also fast , although the two work against each other !
-
if your wifi is secure then what will it matter !
well unless your managing across the internet of course
-
OK So the PGP Disk encryption is not breakable "currently" , but when you "REBUILD" you system then install pgp desktop which you can then turn your hdd into encrypted, what about all the leftover space that hasn't been written to yet
eg 80 gig hdd
4 gig xp install
1 gig office install
3 - 4 gig of other apps
what about the remaining space, does pgp write across the whole disk ?
eg can a disk that has been used already be securely erased if you just run a bare install then install pgp ontop of it ?
-
Episode 7x15
in Hak5
I have been using HFS for ages it's a great easy way to get files onto a linux box with wget
darren 7 min's 50 seconds "ish" did you trump ?
jen i'm going to have a lookie at them ace cards as i have been meaning to buy a card for ages this was the push i needed.
take care one and all
-
Episode 7x06
in Hak5
In the episode Darren said that he uses cloud backups, but he didn't say what service that he uses. I do local backups now but I want to move to more of a cloud backup setup due to my travels. I have been concerned on the security of the files not only from someone cracking the backup site but also security that the backup site operator can't access my files. Anyone have any input on what sites you use and how well their security is.if it's in the internet you should assume that someone will view them at some point, i think you need to make the security as strong as you need it, if it's useful to others then your want to encrypt before backing up, it's that simple really.
-
Episode 7x05
in Hak5
Well Darren, How is it you can walk around and airport with objects and cables all connected yet hanging off of other devices all looking like trigger devices without getting stopped by security,
If i went to our airport "Gatwick" then i'm sure to be stopped and asked to explain exactly what i was doing, that would most lightly be while looking at the pointy end of a large gun !!!!!!!
great idea but it would have to all be hiding inside a bag at our airport, gatwick also would capture at least 4 times that in an hour tho its always very busy.
take care one and all
-
Episode 7x04
in Hak5
nice ep, I would like more info on IDS and IPS setups and if possible some walk through's - the good /bad /ugly
Darren, your game fly audio is a bit pants have you sold all your mic's already !
and shannon, what are those things in the background foreign looking things with V H and S written on them
that oldskool !
love the show guys
-
nice ep, I would like more info on IDS and IPS setups and if possible some walk through's - the good /bad /ugly
Darren, your game fly audio is a bit pants have you sold all your mic's already !
and shannon, what are those things in the background foreign looking things with V H and S written on them
that oldskool !
love the show guys
-
Episode 7x03
in Hak5
Nice to see you brought a memento back from the cold cold UK "a nice cold"
and haha simple things and all that amber lights hahahahaha
really liked your sandbox example that was a very good analogy
Secure Erase Alternitive
in Security
Posted
maybe abit crude but they say a single pass is enough
fsutil file createnew <filename> <bytes>