Jump to content

Mr-Protocol

Root Admin
  • Posts

    4,227
  • Joined

  • Days Won

    91

Everything posted by Mr-Protocol

  1. Mr-Protocol

    2 Questions

    I do not see anyone being disrespectful, unless I scrolled over it. People are responding to the OP Questions 1 and 2.
  2. There really is no point to tracing back further. 1) It's a well known scam so the government knows about it 2) They used a proxy and the proxy service wont be tellin' who it was. Best off just reporting it to them as scam/spam based off of the full header info they can track it down on their end. 3) What would you do if you found out whom sent it? Now say if someone sent you an email from their house without a router hooked up then yeah you could "respond" using their IP from the header.
  3. I have static IP's set. Search around for my posts i have posted my config a few times and my overall install procedure. Also there are links around that people have made as well that describes setup
  4. tftpd and dhcp do 2 completely different things.
  5. My setup is with BackTrack on my laptop. My Fon/Jasager gives out the IP's to clients. Then all traffic is forwarded through my laptop's LAN (wired) card to whatever wireless my laptop is connected to. I never tried to do it with windows as the middle-man for a few reasons. 1) I have an old laptop with WinXP on it. 2) There are really no fun tools with Windows OS 3) Linux (More specifically BackTrack 4), has all the fun tools and no limits.
  6. If your drivers are supported by Backtrack4 then use the wicd network manager. Dragon icon, Internet, WICD Network Manager. You may want to check any buttons on your laptop to turn on wifi. Personally I have this button to turn on/off wifi. When i turned it off on Windows and dual booted to BT4 it wouldnt work. I had to have the wifi on in Windows, Reboot to BT4 and then it worked. Not sure what that button kills but Linux Wireless wouldnt work unless it was on because it didnt have the drivers to turn it on in BT4. Button support was a windows thing. Check to see if BT4 recognizes your card or any wireless device. command: iwconfig then find your wireless device that is supported and do: ifconfig (*DEVICE NAME*) up example: ifconfig wlan0 up
  7. You will need to install the drivers for your card on BackTrack USB drive. They may not support injection.
  8. Please Google: Karmetasploit Also airdrop-ng As for routers, They need the right chipset. Anything that can install openwrt i'm sure you can install karmetasploit and maybe airdrop-ng to. But the size of them may be the limitation.
  9. BT4 is based off of Ubuntu and KDE. It's not really ment for a "fancy looking" OS. It's to serve a purpose. Kind of like command line programs, Yeah you don't have a pretty GUI but it still does what it needs to do. Coding up GUI is just extra programming. Blame it on laziness, lack of GUI creativity, or leetsauce :P lol.
  10. Try using Wicd network manager. Are you using Live DVD or HDD install or USB? Are you sure the drivers for your card are in BackTrack4 Final.iso? If you are using a Hard disk drive (HDD) or USB install, have you updated it?
  11. Take some linux courses at a college if they offer any. Or start google and learning about linux if you wish to go that route. Pretty much to be a real ethical hacker as a profession you need to go to school for it. Keep in mind. http://www.hak5.org/backstage/hackers-versus-cyber-criminals Hacking is just an extra knowledge of knowing exactly how things work and how to make them do what you want. I think "Ethical Hacker" and Pen-Tester are closely related.
  12. This is for definite a memory issue. I had this happen on a PC I was doing work on and as soon as I put the ram that was all different frequencies in the right order, the mobo was happy. Always check the QVL (Qualified Vendor List) of memory that has been tested on the motherboard. Most people think "oh i need OCZ ram to be l33t", but for example my motherboard has known issues with OCZ ram. Checked my QVL and bought a good brand and model of ram that was known good for my motherboard.
  13. There are scripts out there to make it easier than that link shows. But that is the web interface way to do it. I prefer the command line interface. But that is just preference. That site shows examples of exploiting OS Vulnerabilities. You can also exploit browser vulnerabilities as well to get a VNC injection. Since you are MITM you can re-route an add on a page or the whole page to your malicious server to infect the machine. Browser Vulnerabilities :D
  14. Do you have a storyline, game mechanics theory on how hits or HP and all that works? Those are the first steps I would think before programming it. Not sure on how long it would take. Depends on 1) how much you code in a sitting. 2) how good you are at troubleshooting. 3) Understanding optimized code to save time and processing power. I can probably safely say it will take 5 months of dedicated programming to make a fully functional game like pokemon for gameboy?
  15. I used to follow and try to contribute to BSoD (Bastard Sons of Dialup) but last I checked they have stopped doing the show. But old episodes are up still. They did a lot with antennas and parabolic dishes for wifi and all sorts of fun stuff. http://www.bsodtv.org/
  16. Look into Hamster/Ferret combo. http://www.erratasec.com/research.html I don't think there is a way to see their screen as keys are being pressed, that is a lil bit much to believe unless stated before they VNC inject them. pcap files alone give you enough info. That and they said only stuff sent on un-encrypted channels would be seen. Well as we know not so with SSL Strip. Karma is just a MITM (Man-in-the-middle) tool. Like the Jasager/Pineapple.
  17. I agree, I like my NoScript I use both but Chrome seems to corrupt PDF files when i try to open them. FireFox has no issues with the same PDF.
  18. off topic but if you need the dev kit i can get it. I get all MS software free from MS through work. As to the OP, great work and good use for older console technology.
  19. Varies more with the response time of the computer. Think of it as OLD SCHOOL programming when there were no "sleep" statements. it was just code your program to work in the speed limits of the computer.
  20. I got me a PS2 debugging console :D no mod needed. Got an XBOX Debugging console too, and an XBOX that is modded. Also a hard drive from Midway Games with Maya 2008 on it and license key. I got all sorts of Midway Games old property. I might have to look into using that internal memory card though. Apparently the PS2 hard drive is only used for a sort of swap file for some games. boooo
  21. This is very possible. All depends on your coding skills to have it generate passwords on the fly. There are other alternatives to getting passwords though if you have physical access.
  22. Think in the means of a corp. pen test. You could plug this into an internet jack anywhere in a building and have it gateway to your static IP and monitor traffic from across the building. Or if you get custom enough you could have it replicate traffic via VPN to your house (like interceptor concept).
  23. If you are running wireshark on Windows vista/7 you need to right click run as administrative privs to have it show adapters. You can also check box the .exe in properties to always run as admin privs. As to why you cannot connect to 5ghz, I would delete all wireless profiles and let windows find it and then ask you for the key.
  24. All you really need is a good free AV. DO NOT use Internet Explorer. Have good internet habits. Some people are just plain paranoid with the talk of hardware root-kits and exotic infections. BlackHat DC 07 paper on Implementing and Detecting Hardware PCI rootkits. https://www.blackhat.com/presentations/bh-d...-Heasman-WP.pdf And as for getting administrative privs, you have to click "Yes I allow this" in Vista/7.
×
×
  • Create New...