Jump to content

3w`Sparky

Active Members
  • Posts

    142
  • Joined

  • Last visited

Posts posted by 3w`Sparky

  1. I have had some Exposure to IDS with the Cisco Product, where I work we have a network of 5000+ Desktops + all the other crap that is on there. and we tried to use the Cisco IDS but to be honest is was crap maybe the setup wasn't perfection but unless you were going to sit there allday watching it whats the point.

    We Tried another Product and then it was Bought out by Cisco (MARS) but it's CPU is up at 100% all the time it's capturing data.

    we gave up with all that so the network then became un-monitored !

    recently we paid a 3rd party to do the monitoring 2K a month and they tell us what "happen`ED" last month, also not ideal but atleast we have a log of it now. (think - think they use snort)

    anybody had better luck / What do you use / are you lightly to be caught hacking with the current Products ?

  2. my friends daughter got a computer for xmas ages ago , it had on the packaging and laptop (internet ready)

    i wasn't till about 3 days later when they saw her surfing the web that they asked her what she was doing , she explained it said internet ready and it was on the internet that was for sure, via the neighbours accesspoint !

    hows that for legal ?

  3. am i missing something here !

    I have gone through the guide to turn my fon into a jasager

    i can see my laptop connecting to the fon which it thinks is its local router fine.

    the fone nor the dhcp server on the lan is issuing addresses to that device though !

    also there seems to be an option missing from dd-wrt dhcp helper option that i'm sure use to be there , and no ip dhcp scheme if i wanted to set it on the fon ?

  4. course you may ask ,

    the main reason is because it contains a certificate and vpn credentials that should be kept safe, it will also contain documents and software that i would rather people didnt get hold of should it fall out of my pocket or be left in a desktop PC.

    I think a bootable encrypted cd is a good idea.

  5. Right I have been tackling this in the background and found something that seems to fit the bill(so far).

    encrypted CD's

    i have extracted the whole squashfs to a local drive installed encfs and created an encrypted folder

    moved everything from the squashfs into the encrypted folder , unmounted encfs leaving the folder with just encrypted files & folders

    run mksquash on the encrypted folder - i can then mount the suqashfs and mount the encrypted files inside that by running encfs /mountpoint-of-squash /test

    everything can be seen as in the orginal squashfs

    but now i'm stuck - is it going to be possible to get the cd to boot and point it to the squashfs

    A) decrypt it via password prompt and

    B) mount it in /somewhere then allow it to pull the required from that /somewhere?

    clearly the cd mounts the squashfs and pulls files from it but where would i find this part of the process ?

  6. I Heard of a case in the UK where the Owner of the access point got into trouble after someone used it to carry out naughty crimes. not because it came from there ip but more so because they never took any measures to secure there access point , as the owner you have to take reasonable measures towards securing your network, wep64 is enough tho. - yeah right !

  7. I am wondering if there is a way to make the live disto encrypted but still bootable ?

    I have a Custom ubuntu 8.10 live cd that contains all sorts of nice additions but i'm thinking it would kick arse if it required a password to be able to boot from it. . . .

    Possible ?

    anyone already done this ?

  8. the VMSERVER comes in varying ways, there is the windows or linux install that runs ontop of the whole O/S giving you the ability to run a few extra Virtual O/S's on it or theres ESX i think (poss renamed) it is a linux based os but is only 30Mb insize which means it's not using the resources available to the VM's the 30MB O/S is even run from a memorystick which keeps the internal disk's free purly for VM's - I'm Pretty sure this is the Version Shown on Hak5 not the one ontop of a full blown O/S

  9. We Are Virtualized for a high % of our servers and desktops - Yep Desktops too, step towards thin clients & Remote Access it Requires a VDI Server for the desktops and gives FAST deployment of O/S and combine that with an Ubuntu Live CD with Certificate and IPSEC Client on it and bang you have your Business PC right on your home laptop - home workers are Very Impressed.

    Guess I just wanted to say vm is not only server based. . . .

  10. I was thinking about the la fon hack with jasager, what if you tweek the fon to do the hard work, get the config to do the tunneling of dns through the hotspot providing net access via jasager.

    should be very possible, and would get people using your wifi for sure, pay £9 for 20 mins or use free wifi - errr let me think !

    would require post mirror from eth to allow capture from the users i guess.

    just an idea i'm toying with

    anyone got advice on this being a good / bad / already done it idea?

    P.S this is my first post , Hak5 sure has my attention - this is the only place to get your fix for technolust

    good work people

×
×
  • Create New...