Jump to content

barry99705

Dedicated Members
  • Posts

    3,109
  • Joined

  • Last visited

  • Days Won

    104

Everything posted by barry99705

  1. I'd stomp it into oblivion. Yes, I have removed unauthorized network equipment off networks this way before, no I didn't get my ass kicked.
  2. barry99705

    VPN Use

    A split system will tell your machine to pass internal network traffic through the vpn. It's not that hard really, just a little bit of dns look up. Basically if you are connecting to say SchoolFileServer, it's ip would be in the private range, 10.whatever, 192.168.whatever, 172.16.whatever to 172.31.whatever goes through the vpn. Everything else bypasses the vpn.
  3. It's basically the same as ministumbler. Wififofum has gps support, and a radar like display, but it doesn't really position the access points correctly on the screen.
  4. barry99705

    VPN Use

    If the sysadmin is worth a damn that's how it's configured. I would be pissed if I found some dumb ass was passing all his off campus internet traffic through the vpn. Think about it. You're doubling the bandwidth you're using. All your outbound traffic becomes inbound traffic on the vpn, then outbound traffic on the internet connection, it reverses on the way back to you. I bind all traffic on my home vpn, it's a 6Mb adsl connection. Works just fine. I wouldn't game over it, but email and surfing works.
  5. Well the point of the device is to find someone leaching off your companies b/g wifi internet, so using an 802.11a system is kinda pointless. I know what a hacker is, what I want to know is what the hell does using a pineapple have to do with the op's linked hardware.
  6. It's still not working. Send renderman an email. http://renderlab.net/projects/WPA-tables/
  7. barry99705

    FakeAP

    I'm not getting the "set up a sniffer" part. It does what it says it does though. Kismet will show hundreds of access points. They will even have "correct" mac addresses. It has an OUI list and it just randomizes the last six characters of the macs. It's kinda neat, but pretty easy to see which is the real access point. It will be the one that's actually transmitting data.
  8. Yes, it's the only way my wireless clients can see my wired clients. I don't thing even TOR is going to help you hide what you do from your isp, I could be wrong though. You're also not going to be hiding what you're doing from whoever is running the tor exit node. Honestly, I'd trust my isp over tor. Hopefully you're running wpa2 with a good password.
  9. They don't even make IE for my Os anymore....
  10. Yaaay! Noscript saves the day! :D
  11. He's just showing how easy it is to get someone to click on a link in an email. For all you know the linked website could be installing zero day exploits into internet exploder.
  12. That's kind of cool, but you can do the same thing with a laptop, or pda with an external antenna. Why?
  13. I use a dumb modem and let smoothwall do the work. They don't get the chance to fuck up my network. I'm not sure if it's been fixed or not, I don't care. http://blogs.chron.com/techblog/archives/2...ng_exploit.html
  14. If you put the card in monitor mode it won't connect to the network any more. So yes, it will affect your internet connection.
  15. I never said it was. Which is why I don't use those POS dsl modems isp's hand out. Especially 2wire, freaking things have a huge security flaw.
  16. Kinda. Both networks are inside the firewall and natted, but the firewall is keeping them separate as well. Hosts on the lan can make connections to devices on the wifi, but not the other way around.
  17. coWPAtty, well actually genpmk, but it comes with cowpatty.... If you're going to try an obscure ssid, may as well not make the table, no point, as you're probably not going to reuse it. Now if you're doing something like linksys, or netgear, make a table. It's slow the first time, but any time after that it's quicker.
  18. Here's how I have my network set up. I'm running an older P3 machine with 3 nics in it with smoothwall as it's os. This is my firewall/router. One nic is WAN, one is LAN, and the third is WIFI. The WIFI and LAN ports are on separate subnets. The LAN can talk to the WIFI, but not the other way around. This setup can also track internet usage, and run a pretty good basic IDS/IPS. I have a WRT54gs running the wireless in AP mode, it doesn't do any routing or ip assigning.
  19. Last time I checked, it was a couple years ago, there aren't any real good driver support for the wifi chipset. The most that I've ever seen for the psp is a netstumbler like app. I say netstumbler and not kismet because it only shows broadcast ssid's. If they have their ssid "hidden" it won't see it.
  20. The tables for wpa-psk are ssid specific. Their size is dependent on the size of your dictionary file.
  21. No, you're telling it the console ports are in an "insecure" location, and need a password specified. I'm running 10.5.7 and this doesn't work though. Hell, I even changed the commented out parts, still no joy. I like how the beginning of the file says to "enable an open firmware password". I've not tried with the new efi machines, but when they still had open firmware, the password could be reset by pulling one stick of ram and rebooting.
  22. The linksys cameras have a built in web server. The ftp functionality is built in. The only problem I have with the linksys camera is you need to use windows to see the feed, it's active x based. I had a dlink web cam mounted to my tv antenna that streamed normal jpeg images. It sat up there for a couple years until I accidentally plugged in the wrong power injector. I still haven't replaced that setup... Depending on the camera, you should be able to send the files straight to the fon.
  23. Sure, and watch neither of the machines get to the internet....
  24. No, once you connect to your neighbor's wifi you will show up on the host list.
×
×
  • Create New...