Jump to content

barry99705

Dedicated Members
  • Posts

    3,109
  • Joined

  • Last visited

  • Days Won

    104

Posts posted by barry99705

  1. I Heard of a case in the UK where the Owner of the access point got into trouble after someone used it to carry out naughty crimes. not because it came from there ip but more so because they never took any measures to secure there access point , as the owner you have to take reasonable measures towards securing your network, wep64 is enough tho. - yeah right !

    Actually it is. You're right it's not enough to keep people out of your network, but it is enough in the eyes of the law that you "took steps to prevent unauthorized access".

    Pretty much anywhere in the US, unless you have express permission from the network owner it's illegal to connect.

  2. I'm looking at virtualizing my home network and getting down to 2 physical servers from a total of 5 right now.

    I tore my whole network down, with the exception of the basic DSL router, 1 pc, and my laptop, while I configure all of this.

    What I'd like to know is if I can move my smoothwall from a physical box, which is currently an AMD 500mhz processor and 128mb RAM, with 2 100m nics, to one of my servers. The 2 I'm going to run full-time are multi-processor, 3gb RAM each, and are Gigabit compliant. Not that the Gig is a big deal since the Smoothwall is basically the internet pipe only, but it would be nice to eliminate one more physical machine.

    Has anyone tried this?

    It will run. I worry about running a firewall as an application though, cause really that's what it becomes when running in a vm. In my opinion it would be better to just pick up an older low power laptop, or mini-itx machine to run the firewall as a dedicated box.

  3. I don't speak for everyone but my Ubuntu requires the root password to log into single user mode.

    That doesn't stop someone from booting with a cd though. It's still the same thing really, if you have physical access to the machine, passwords don't matter.

  4. I know that WPA2 is a bit more secure of a standard but the question is can CoWPAtty actually crack WPA2? Also upon reviewing the capture I am getting with wireshark for the 4 way handshake it is almost identical to the standard WPA handshake so I am confused on what the problem is besides there being a code issue with CoWPAtty. Can anyone confirm this?

    -Z

    This is off the cowpatty page.

    NOTE: coWPAtty 4.0 and above also include WPA2 attack capabilities (usage remains the same).

    http://wirelessdefence.org/Contents/coWPAttyMain.htm

    I've not tried it yet, I'll give it a shot when I get home tonight.

  5. So heres a question. I am currently using backtrack 3, have downloaded and verified that I am able to crack WPA/TKIP+AES with no problems but I cant seem to crack WPA2/TKIP+AES. I have updated my version of cowpatty to 4.3 and have searched for about 2 hours and seen people with similar problems but no solutions. Anyone else having success cracking WPA2 or is that still in the works as a feature?

    WPA2 is a bit more secure.

  6. I've never been brave enough to go for full disk encryption on a machine, I just have visions of getting on a train, opening the laptop and finding it won't decrypt for some reason. I go for either file based encryption or keeping sensitive stuff on a server and accessing it through ssh/vpn.

    Last train journey I took I upgrade wireshark before I left home, that upgraded a library that mplayer relied on so bang went watching videos for the trip.

    I know a guy that screwed up his truecrypt encrypted laptop, in the middle of shmoocon. We gave him all kinds of shit for that one. :lol:

  7. DMCRYPT/LUKS works pretty well. That's what Ubuntu uses for whole disk encryption. The only part that isn't encrypted is /boot. There's a how-to on the ubuntu forums somewhere that shows how to use it with key files. I had a machine using a key file stored on a thumb drive. With the drive inserted the machine would boot, without it would ask for the key. Just make sure you back up that file!

  8. Draftsman paper would work nicely (its basically thick, matt tracing paper with a very consistent lack of grain/whirls). I did a few projects back in university using this type of paper attached to glass during my fine art days. Very good effect if you use off-center projection and keystoning. Depending on how bright the projectors lamp is you should try 2-3 sheffs of the stuff stretched taught.

    Vellum. http://www.artsupply.com/alvin/clearprint.htm

  9. Seems like none of the links are working on church of wifis site... Anyone else have a link to the bigger rainbow table files? I didnt really want to go with smaller files as I was going to start the download and leave town for a couple of days.

    -Z

    The shmoo group is hosting them, looks like their tracker is down at the moment. $50 plus shipping will get you them from Render's site.

×
×
  • Create New...