Jump to content

majk

Active Members
  • Posts

    159
  • Joined

  • Last visited

Posts posted by majk

  1. Thanks for your replys guys. I have been working on this for the past week now. No joy. Now i know you can encrypt the files to get them past Norton. Just having difficulty finding out how. Same with writing a script to disable norton. Hard enough to shut down normally. Lol.

    Working on a script at the moment to pop up a window to say whether the user logged on has admin rights and if not, to give them.

    Any help on the Norton issue would be greatly appreciated though guys. Thanks

    If you want to, check out some trojan/RAT sites, they probably have some packers/crypters/scramblers etc. to encrypt files and hide them from anti-virus programs.
  2. I might be being a bit noobish, but doesnt flash based storage genrally more reliable and last longer due to there solid statienussss ( <-- made up work lol)
    Well flash based storage doesn't do well if you write it many many times.
  3. I've read the thread about starting the Hacksaw from a CD-ROM, and that got me wondering if anybody has been busy getting the Hacksaw to be executed on the target computer in another way than from the USB drive?

    If you would execute it by exploiting software on the target computer (with, say, IE), this all starts to look like an ordinary trojan, doesn't it? I wonder how long it takes before someone unleashes a trojan/worm/virus-like version of the Hacksaw. I wonder what your thoughs on this are.

    Well the Hacksaw is just a collection of programs so starting it from a Trojan or shell from a remote exploit could be done.
  4. "Open documents folder", "Select all", "Delete", "Yes", "empty recycle bin" yep, very hard :P

    There is of course also: "open Word", "font size 100", "You are a total fucking loser for using myspace", "file, print", "100 copies", "print", "lock computer" :lol:

    Well that's not exactly taking control of it, and it would probably be hard to get all those commands to execute properly. And the user would have plenty of time to close the site.
  5. The corrupt Dutch government allows the Taliban to sell drugs in your country. That blows away anything "Haliburton" has ever done. Since you don't have to clean up the mess, who cares, right?
    I'd guess the market for marijuana is much bigger in USA than in the Netherlands. And if it's a controlled market you can check the source of the product more easily. Also since the US defeated the taliban in Afghanistan they've started growing drugs again. Isn't this "drugs funding terrorism" mostly a scare tactic?
    can u post a link of the episode streaming, like from youtube, i dont really want to have to dl entire episode...thx
    Why not? Even if you stream it you still have to download the data. And who knows if it's even available streaming somewhere.

    Because if i stream i can watch it while it is dl'ng saves a lot of hastle.

    Ok but had you started downloading the episode when it was posted you'd watched it by now. I'd download it if I were you because I don't think it's available in streaming form anywhere.
  6. Well it sure looks "cool" and flashy but is it really useable? Typing on a completely flat surface like that can't be any better for you than on a proper keyboard. What's so wrong with a mouse and keyboard? If you could use a mouse to move your furniture when moving wouldn't you instead of using your hands?

  7. it was 18 - 24 months ago.

    cant remember exactly.

    he TOLD me it was an MP3 player but it just looked like a USB stick to me . but many MP3 players do,

    it might well have been a U3 stick,

    i wasnt paying any attention you see,

    it was only afterwards i had the suspicion he hacked me,

    so would it have been TECHNICALLY possible to perform this switchblade hack 18 - 24 months ago ?

    i dont even see this guy hanging around anymore,

    im just curious,

    Well from your description it certainly is a possibilty.
  8. Because this was years ago and with an actual MP3 player (I don't know of any MP3 players now that have U3 capability, much less years ago) I think it's unlikely that you got hacked.

  9. hi im still confused

    there was no sw on my computer

    i just plugged his usb mp3 player into my usb port

    so the question is:

    could a program be run automatically in the mp3/usb player to copy data from my hard drive without any intervention on my behalf (such as installing sw etc ) ?

    Maybe, if the MP3 player has some kind of U3 capability.
  10. Well it does run the vbs scripts it just does not seem to autorun the vbe on the iso portion of the drive. So I was wondering where I could get access to the vbe source so that I could see why it won't run. Anyone know where I can get it?
    Someone posted a converter in one of the threads in this section.
  11. Yeah, I guess you'd need it to "reverse connect". Which you can do quite easily with netcat and a command-shell. Perhaps you can do something similar with VNC, or first get a shell going and then connecting back with VNC manually.

  12. edit: or..does anyone know if this is possible? i cant find it ANYWHERE on google or here..and from the lack of response..im geussing maybe no one knows...
    Well neither the switchblad nor the hacksaw show the black box when running its commands. So it obviously can be done. Also there were just a couple of hours since you posted.

    If you had searched the forums or actually read some of the threads in this section you'd gotten the answer to your original question and that one faster than anyone here can serve them to you.

  13. Is this very hard to code? I have an encrypter but I geuss it would be hard to do this myself?
    It's not really hard. There are programs already made for this purpose and they're generally pretty easy to use. But finding one that really is undetectable by anti-virus programs is the challenge, but that shouldn't be very difficult either.
×
×
  • Create New...