majk
-
Posts
159 -
Joined
-
Last visited
Posts posted by majk
-
-
Using Goole Earth I calculated that my house is 6258 km / 4056 miles from that restaurant. But hopefully everything will be up on video at the homepage like last year.
-
Well flash based storage doesn't do well if you write it many many times.I might be being a bit noobish, but doesnt flash based storage genrally more reliable and last longer due to there solid statienussss ( <-- made up work lol) -
Either try some other program like fgdump or encrypt the file. When dealing with trojans for example there are programs to scramble/encrypt files so anti-virus programs don't detect them.
-
If it does you haven't configured Tor/privoxy/your browser/etc. correctly.Is there a way to verify that TOR is working? How come when I go to a site like: http://www.ip-adress.com/ they still know my IP. I'll say it before someone else does Noob! -
They even say themselves that they don't use padding:Thanks. I got this email just a bit ago:LETTERI'm really not sure what errors he is pointing out, since I think what I said in the video was correct, if over simplified. Maybe there was a better way to say it? Is there anything you all think I should correct?
http://wiki.noreply.org/noreply/TheOnionRo...1a7b0ab87c2aeb3
-
Well the Hacksaw is just a collection of programs so starting it from a Trojan or shell from a remote exploit could be done.I've read the thread about starting the Hacksaw from a CD-ROM, and that got me wondering if anybody has been busy getting the Hacksaw to be executed on the target computer in another way than from the USB drive?If you would execute it by exploiting software on the target computer (with, say, IE), this all starts to look like an ordinary trojan, doesn't it? I wonder how long it takes before someone unleashes a trojan/worm/virus-like version of the Hacksaw. I wonder what your thoughs on this are.
-
AFAIK you can't format C: like that if you're in Windows and Windows is installed on C:.True, that would take too long, so....Hows this? Something like "Command Prompt" "Format C:"
:D
-
Well that's not exactly taking control of it, and it would probably be hard to get all those commands to execute properly. And the user would have plenty of time to close the site."Open documents folder", "Select all", "Delete", "Yes", "empty recycle bin" yep, very hard :PThere is of course also: "open Word", "font size 100", "You are a total fucking loser for using myspace", "file, print", "100 copies", "print", "lock computer"
-
I'm sure you could use it to annoy the user. But to make the computer do some advanced task to take control of it will probably be hard.
-
I'd guess the market for marijuana is much bigger in USA than in the Netherlands. And if it's a controlled market you can check the source of the product more easily. Also since the US defeated the taliban in Afghanistan they've started growing drugs again. Isn't this "drugs funding terrorism" mostly a scare tactic?The corrupt Dutch government allows the Taliban to sell drugs in your country. That blows away anything "Haliburton" has ever done. Since you don't have to clean up the mess, who cares, right?
Ok but had you started downloading the episode when it was posted you'd watched it by now. I'd download it if I were you because I don't think it's available in streaming form anywhere.
Why not? Even if you stream it you still have to download the data. And who knows if it's even available streaming somewhere.can u post a link of the episode streaming, like from youtube, i dont really want to have to dl entire episode...thxBecause if i stream i can watch it while it is dl'ng saves a lot of hastle.
-
Why not? Even if you stream it you still have to download the data. And who knows if it's even available streaming somewhere.can u post a link of the episode streaming, like from youtube, i dont really want to have to dl entire episode...thx -
And AFAIK pwdump is open source so you could amend it yourself.
-
Well it sure looks "cool" and flashy but is it really useable? Typing on a completely flat surface like that can't be any better for you than on a proper keyboard. What's so wrong with a mouse and keyboard? If you could use a mouse to move your furniture when moving wouldn't you instead of using your hands?
-
Well as Sparda said, it's basically impossible to spoof a TCP connection. But in some situations the remote IP is read from HTTP_FORWARDED_FOR or similar headers if they're set, and they can be spoofed.
-
Well from your description it certainly is a possibilty.it was 18 - 24 months ago.cant remember exactly.
he TOLD me it was an MP3 player but it just looked like a USB stick to me . but many MP3 players do,
it might well have been a U3 stick,
i wasnt paying any attention you see,
it was only afterwards i had the suspicion he hacked me,
so would it have been TECHNICALLY possible to perform this switchblade hack 18 - 24 months ago ?
i dont even see this guy hanging around anymore,
im just curious,
-
Because this was years ago and with an actual MP3 player (I don't know of any MP3 players now that have U3 capability, much less years ago) I think it's unlikely that you got hacked.
-
Maybe, if the MP3 player has some kind of U3 capability.hi im still confusedthere was no sw on my computer
i just plugged his usb mp3 player into my usb port
so the question is:
could a program be run automatically in the mp3/usb player to copy data from my hard drive without any intervention on my behalf (such as installing sw etc ) ?
-
Someone posted a converter in one of the threads in this section.Well it does run the vbs scripts it just does not seem to autorun the vbe on the iso portion of the drive. So I was wondering where I could get access to the vbe source so that I could see why it won't run. Anyone know where I can get it? -
You could use netcat to reverse connect and forward a shell to you. Then you just set up the VNC-session from there.
What about this:
-
Yeah, I guess you'd need it to "reverse connect". Which you can do quite easily with netcat and a command-shell. Perhaps you can do something similar with VNC, or first get a shell going and then connecting back with VNC manually.
-
Well neither the switchblad nor the hacksaw show the black box when running its commands. So it obviously can be done. Also there were just a couple of hours since you posted.edit: or..does anyone know if this is possible? i cant find it ANYWHERE on google or here..and from the lack of response..im geussing maybe no one knows...If you had searched the forums or actually read some of the threads in this section you'd gotten the answer to your original question and that one faster than anyone here can serve them to you.
-
-
It's not really hard. There are programs already made for this purpose and they're generally pretty easy to use. But finding one that really is undetectable by anti-virus programs is the challenge, but that shouldn't be very difficult either.Is this very hard to code? I have an encrypter but I geuss it would be hard to do this myself? -
Who said anything about drinking?Oh yeah, sorry, I forgot to give the "don't be drinking anything when you click the link" disclaimer.
Password Retrieval Detected
in USB Hacks
Posted