Jump to content

majk

Active Members
  • Posts

    159
  • Joined

  • Last visited

Everything posted by majk

  1. The actual tools like pwdump can be detected by anti-virus programs as "hacking tools" or something like that. To get around that you have to encrypt the files with special tools, there are tools that trojan/RAT makers use, like packers/scramblers/crypters that basically encrypt the files and leave a stub of code to decrypt and run it.
  2. That should be enough. And if not there are many other very small Linux/BSD distributions.
  3. i should im not quite sure i am runnin on a 2wire 1701HG there are 2 computers on this router and i am the second one Well the physical layout of the network shouldn't really matter. Can you access ELEMENTSADMIN$ when you're logged in on the computer?
  4. Well do you have the correct permissions to access ELEMENTSADMIN$? Even though you're an admin on the computer that doesn't mean you necessarily have enough rights on the network.
  5. What benefits does using that bat file give you?
  6. Not that but once I accidentally removed my hard drive and burned it.
  7. majk

    web site

    Flash and regular popups? I got some yellow warning triangle popup, it looks very unprofessional.
  8. A binder is just for binding two files together, it won't help against anti-virus programs since the files get unpacked when you execute the file with the bound files. You need a crypter/scrambler/packer or whatever you want to call it that actually changes the file.
  9. Well do you have admin rights? Is it a thin client or something similar? Give more information about the system.
  10. Well just because you don't want children right now it doesn't mean you'll torture them if you get any.
  11. Maybe try something else like fgdump: http://www.foofus.net/fizzgig/fgdump/
  12. And also as far as I know the best techniques can only find arbitrary collisions. It can't find collisions for a specific hash.
  13. I do remember friends saying that they did it since the police wouldn't be able to understand them. But this was in the good old days of BBSes and hacking the local video store's computer system to give you free rentals. I thought it was as stupid then as it is now since it was so obvious. Well either way it's not like it's used like that nowadays.
  14. So "leet speak" was created to communicate covertly? Yeah right... C4n s0m30n3 cr4ck th1s code???
  15. Well he didn't exactly claim that it's a panacea. Sometimes just the things you learn from doing something like this can make it worth it and why not then share it with others who might also find it useful.
  16. Have you tried the instructions on this page?http://www.hak5.org/wiki/Universal_U3_LaunchPad_Hacker
  17. This one? http://www.hak5.org/wiki/Universal_U3_LaunchPad_Hacker This link works for me: http://www.hak5.org/packages/files/Universal_Customizer.zip
  18. That's true. It might be a good investment for the future. And then that whole less-than-14-characters issue isn't relevant.
  19. Can we get some charts and graphs before we decide. Personally my login password is 21 characters long including both case alpha, numeric, and $pecials Then again, I'm paranoid. AFAIK NTLM is much harder to do than LM. If you're able to do lowercase 1-6 a-z you should be happy.One problem is that most NTLM password are longer than 14 characters. If your password is shorter it's stored as an LM-hash (if you haven't specifically disabled that). So most likely if you see no LM-hash the password is longer than 14 characters. Which pretty much makes rainbow tables useless... Just look at sites like plain-text.info, their NTLM crack-ratio is very very low.
  20. Alas! Not possible on school computers as they have them locked down very well, and find the flaws after they are used about three or four times Sure it's possible. If you can't use SSH or something like that you can at the very least set up a proxy like ninjaproxy.com on your home computer or use one of the of hundreds pages like ninjaproxy.com.
  21. Well if they password isn't saved anywhere you can't really get to it. However you could of course use a keylogger for example to eventually get the password.
  22. Wow, you must be a great guy. Except for that whole arrogance and I'm better than you attitude...
  23. I definitely thinks it looks nicer now.
  24. Perhaps the user hasn't activated automatic login/password saving.
  25. I think you'd have to encrypt the files or perhaps buy one from some individual or company. Because the vast majority of malware gets detected by the anti-virus programs after a pretty short time.
×
×
  • Create New...