Jump to content

Myk3

Active Members
  • Posts

    20
  • Joined

  • Last visited

Posts posted by Myk3

  1. If it is a BIOS password and not a boot password you can just use Hirens to remove the BIOS password..

    BIOS / CMOS Tools

    CMOS 0.93

    CMOS Save / Restore Tool

    BIOS Cracker 5.0

    BIOS password remover (cmospwd)

    BIOS Utility 1.35.0

    BIOS Informations, password, beep codes and more.

    !BIOS 3.20

    a powerfull utility for bios and cmos

    DISKMAN4

    a powerful all in one utility

    UniFlash 1.40

    bios flash utility

    Kill CMOS

    a tiny utility to wipe cmos

    Award DMI Configuration Utility 2.43

    DMI Configuration utility for modifying/viewing the MIDF contents.

    Myk3

  2. all the ILT books are made by axzopress they also make good practice test "certblaster" that comes free with their books.. (although the passwords are easy to decrypt if you know their scheme)

    Network + 2005 pw is c_network+

    Network + 2009 pw is c_net+09

    Security + pw is c_security

    Security + 2008 pw is c_sec+08

    Linux + pw is c_linux+

    they all use the same c_***** scheme

  3. well that failed horribly..

    ok i got it done and tried to use PE2.0 and it states "unable to build stoned directories on drive C:\"

    i then booted into the system and loaded then it ran the infecter and it said "can't write backup MBR to on unpartitioned space"

    i then deleted my D:\ and reran the infecter. it then stated same error. "unable to build stoned directories on drive C:\"

    i then browsed to the "c:\stoned" which did exist I deleted these files and reran the infector. Said everything went well.. I rebooted and it did not load anything.. says i need to use my recovery disk to rebuild the MBR

  4. I would just boot off a linux disk (ubuntu) and just re-install the MBR from it.. it will automatically detect the OSs you have installed and might even see your grub config..

  5. I am not adding to his ego.. I have been in contact with Peter about his "hack" i am about to test this..

    here is what he emailed me.. you dont even need someone to install something.. again just need physical access..

    "Yes. The easiest way would be to use a Windows PE 2.0 and boot from CD (e.g.

    BartPE) and execute the infector file from an usb stick.

    I can provide you also instructions how you can manually install the Master

    Boot Record with Linux, however that would require some more steps to do

    manually."

    I am testing this right now (full disk encryption takes awhile. at 77% right now)

  6. yea that my info is already in the hands of the government.. so im kinda screwed anyway.. but one of the challenges is only for single people.. they advertise it as a game...

    "Netwars is the latest online game: an adventure across the Internet. You can play the game as an analyst, a penetration tester, a defender, or any combination. You earn points by finding keys, moving to higher levels, capturing services such as a website, overcoming obstacles (attack techniques) and protecting resources (defensive techniques). You can see the other players' scores and your own points scored, live, or on an overall scoreboard."

  7. i signed up... lol I wont even get through the first round.. but you can sign up as a group.. which i did..so maybe with all of our minds we can get something done..

  8. The US Cyber Challenge is looking for 10,000 young Americans with the skills to fill the ranks of cyber security practitioners, researchers, and warriors. Some will become the top guns in cyber security. The program will nurture and develop their skills, give them access to advanced education and exercises, and where appropriate, enable them to be recognized by colleges and employers where their skills can be of the greatest value to the nation.

    http://csis.org/uscc

  9. Well that didn't seem to work.. Here is my keys on the test box i am using.. Please let me know if anyone can decrypt the key to get the password.. (If this is even the next step in the process)

    FOUND POSSIBLE 256-BIT KEY AT BYTE 9ddf008

    KEY: 0e61e959f347efe61ae5b73a0404c1b6d31ce931b1fbd3d1909d4dbfe620c430

    FOUND POSSIBLE 256-BIT KEY AT BYTE 9de04d4

    KEY: 3417607ffacabb10a8b5a9c0e1ec840a6a3f45f59061fe619059f8291802b435

    FOUND POSSIBLE 256-BIT KEY AT BYTE 9df9008

    KEY: 67ebae624fdc76ba2161fe2ef57c78ee7d8581216afa460a26fb53bb3f2dfe4

    FOUND POSSIBLE 256-BIT KEY AT BYTE 9dfa4d4

    KEY: e81f2e801365439f55d4345551b9013b6d6a0e5faa613c2c95953e1459fee70b

    FOUND POSSIBLE 256-BIT KEY AT BYTE 17ce4da4

    KEY: 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f

    FOUND POSSIBLE 256-BIT KEY AT BYTE 223ca008

    KEY: 67ebae624fdc76ba2161fe2ef57c78ee7d8581216afa460a26fb53bb3f2dfe4c

    FOUND POSSIBLE 256-BIT KEY AT BYTE 22470008

    KEY: 0e61e959f347efe61ae5b73a0404c1b6d31ce931b1fbd3d1909d4dbfe620c430

    FOUND POSSIBLE 256-BIT KEY AT BYTE 225714d4

    KEY: 3417607ffacabb10a8b5a9c0e1ec840a6a3f45f59061fe619059f8291802b435

    FOUND POSSIBLE 256-BIT KEY AT BYTE 2258b4d4

    KEY: e81f2e801365439f55d4345551b9013b6d6a0e5faa613c2c95953e1459fee70b

    FOUND POSSIBLE 256-BIT KEY AT BYTE 30da8da4

    KEY: 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f

    FOUND POSSIBLE 256-BIT KEY AT BYTE 3b646008

    KEY: 67ebae624fdc76ba2161fe2ef57c78ee7d8581216afa460a26fb53bb3f2dfe4c

    FOUND POSSIBLE 256-BIT KEY AT BYTE 3b6ec008

    KEY: 0e61e959f347efe61ae5b73a0404c1b6d31ce931b1fbd3d1909d4dbfe620c430

    FOUND POSSIBLE 256-BIT KEY AT BYTE 3b7874d4

    KEY: e81f2e801365439f55d4345551b9013b6d6a0e5faa613c2c95953e1459fee70b

    FOUND POSSIBLE 256-BIT KEY AT BYTE 3b82d4d4

    KEY: 3417607ffacabb10a8b5a9c0e1ec840a6a3f45f59061fe619059f8291802b435

    FOUND POSSIBLE 256-BIT KEY AT BYTE 4a138da4

    KEY: 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f

    FOUND POSSIBLE 256-BIT KEY AT BYTE 54b30008

    KEY: 67ebae624fdc76ba2161fe2ef57c78ee7d8581216afa460a26fb53bb3f2dfe4c

    FOUND POSSIBLE 256-BIT KEY AT BYTE 54d314d4

    KEY: e81f2e801365439f55d4345551b9013b6d6a0e5faa613c2c95953e1459fee70b

    FOUND POSSIBLE 256-BIT KEY AT BYTE 54d56008

    KEY: 0e61e959f347efe61ae5b73a0404c1b6d31ce931b1fbd3d1909d4dbfe620c430

    FOUND POSSIBLE 256-BIT KEY AT BYTE 54e574d4

    KEY: 3417607ffacabb10a8b5a9c0e1ec840a6a3f45f59061fe619059f8291802b435

    FOUND POSSIBLE 256-BIT KEY AT BYTE 636b0da4

    KEY: 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f

    FOUND POSSIBLE 256-BIT KEY AT BYTE 6e284008

    KEY: 67ebae624fdc76ba2161fe2ef57c78ee7d8581216afa460a26fb53bb3f2dfe4c

    FOUND POSSIBLE 256-BIT KEY AT BYTE 6e3054d4

    KEY: e81f2e801365439f55d4345551b9013b6d6a0e5faa613c2c95953e1459fee70b

    FOUND POSSIBLE 256-BIT KEY AT BYTE 6e4ea008

    KEY: 0e61e959f347efe61ae5b73a0404c1b6d31ce931b1fbd3d1909d4dbfe620c430

    FOUND POSSIBLE 256-BIT KEY AT BYTE 6e5eb4d4

    KEY: 3417607ffacabb10a8b5a9c0e1ec840a6a3f45f59061fe619059f8291802b435

    FOUND POSSIBLE 256-BIT KEY AT BYTE 7ce96da4

    KEY: 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f

  10. What about for AES keys? After the cold boot attack episode i can get the keys but now what to do with them???

    Just a thought since AES is based on rijndael would that decrypter work?

  11. I am currently SEC + certified.. I can say just studying for the exam was nice.. It brought to light a lot of different vulnerabilities that most people are unaware of. (even if they are out dated) My company paid for the training and the test.. They also are sending me to CEH (well there is talks of it) and then down the road to end goal of Licensed Penetration Tester (LPT)

×
×
  • Create New...