Jump to content

Burning Aces

Active Members
  • Posts

    84
  • Joined

  • Last visited

Posts posted by Burning Aces

  1. im not keen on backtrack they desperately need to include more drivers

    or need some kind of autoupdate routine

    now a full ubuntu backtrack would fookin rock !

    way to make yourself look like a douche

    backtrack has drivers, try searching

  2. As for deauthenticating for other reasons, there's nothing stopping you using any other software but it really depends on what you're doing. The only other reason i can think of that you'd want to deauthenticate someone if you weren't wanting to crack WEP or WPA is so they accidentally authenticate with yourself instead (a la Jasager, Karmetasploit etc).

    aireplay-ng (in this context) and airdrop-ng just do one thing: deauthenticate clients from access points. they dont gather any info or send anything out. what happens next and with what tools is up to the user to decide.

    You might just want to piss some one off..or it could be at an AP you are already on and some one else keeps trying to dowload on it, so second wificard and start de-authing them :D

    aircrack-ng neeeeeeeeds a gui

    1 it has a gui - Gerix Wifi Cracker NG

    2 cli is alot more powerful than gui and you could actually learn something

    3 the windows version already has a gui

    4 your post is useless

  3. Radius authentication server, that's what corporates around the world uses for securing their wireless network. I am pretty sure there are other ways for securing it, but implementing a radius server seems to be the most effective method for securing a wireless network.

    it is the most effective way really

    Exactly, also a good idea to isolate WLAN from LAN so in the event wireless gets compromised their will be no access to our core systems only laptops and a couple of servers (which of course are protected but still :P)

    eg having 2 subnets and having all your main desktops on 1 and yeah what you just said :D

  4. Just a few suggestions:

    5. Review router/firewall for open ports.

    As well as check for firmware updates

    4. Check for a software firewall on PCs. Windows comes with one.

    Comodo Free Personal Firewall, Cnet recommends and its a lot more secure than the windows built in.

    7. If you're paranoid, take out any wireless devices. If not, at the very least, secure it using WPA2 and a strong passphrase.

    Or if you are extremely paranoid, use a radius authentication server.

    That's all I can think off.

    now everyone talks about radius auth servers :|

  5. You can't insult Ubuntu for having a "not very smart" community and then suggest Gentoo or Arch. :lol:

    you should be happy with me, i said fbsd as well

    also arch's wiki and aur/repo's are pretty much best ive seen tbh

  6. Thats how i used to do it :) Avast 5 + Comodo Firewall and Defense + works great

    You did read that right? Lets start at the top shall we:

    Solution status:

    As stated on the website YOU provided 87% are patched already While 7% have workarounds and 7% are unpatched compared to windows that is secure.

    Criticality:

    Out of these only 7% are moderately critical 0% are above moderate (High and extreme) and 47% are Less and the other 47% are not at all.

    Where:

    Only 13% of these "holes" are remotely exploitable 87% are local (meaning any decent security on your network and you are safe (which provided hacking someone comp/network is always easier when you are on their LAN/WLAN)

    Impact:

    This is funny what are you worried about any ways the impact is:

    60% are DoS (denial of service) any decent firewall would block these and if you are really paranoid use Bastille and limit them.

    only 5% are system access

    and 20% are priv escalation (which would need physical access or WLAN remote access

    So i am fairly certain it is safer the windows! lol

    woo you saved my ass..kind of

    ^5

  7. My problem with anti-virus software is it is dependent on comparing software on your system against known "bad" software. Keeping anti-virus definition files up to date will help, but there will always be a percentage of malware in the wild that will be undetectable by anti-virus software.

    An infected system, even after a thorough cleaning, should never be trusted again. I believe preventing the files from getting on your machine in the first place is a better solution than scanning after-the-fact.

    "If you regularly have to clean dog shit off your shoes -- would you prefer to invest money in excellent detergents and shoe cleaner, or would you prefer to watch where you are walking?"

    Right. Linux is way more secure than other operating systems. (yes, sarcasm)

    Using a less-popular (and thus less-targeted) OS does not make you any more or less secure.

    holy shit

    FSCK

    go back to fbsd

    *hides

    also point made, ill shut up

    edit: what im meaning is you're less likely to get drive-by infected on Linux

    edit edit: for av use AVG, is free and good

  8. The whole idea is pointless, just buy a netbook or any laptop, install Ubuntu or any other Linux distro. Swap out the wireless card with a cheap Atheros mini pci/e card. Install Karma or use karmetasploit.

    whats with you people and ubuntu *shudders

    ubuntu is a horrid distro, have you looked at thier community user base? its filled with "not very smart people"

    use something like gentoo, fbsd or arch linux

  9. I partly agree with that, but you still need to protect yourself no matter what. Even though Linux is a lot safer than windows, there are still viruses written for linux, not with the same numbers as there are for windows but its just a matter of time before Linux becomes a targeted system likewise windows.

    You may be safe for now, but soon or later you will have to cope with it.

    lol no good virii, exploits how ever yes :P

    also even on my windows pc i dont have an antivirus as i only use it to play cracked games

    should probably run AVG on it see how much it picks up haha

  10. the "best" is an ironkey...but i dont think it will work as a boot loader...it might though...somehow. lol

    i jsut got a couple of 8 gigs from sams club and they work fine. and are decently fast (verbatim store and go, kingstons in reality)

    beat me to my suggestion when i saw the topic, i thought iron key, but it wouldnt be useful in this case

  11. That isn't the one that is just the equivalent of a brute force list starting at a and ending at zzzzzz is it? A friend came to me with an amazing huge word list around the same size and it turned out to be just that and so was pretty useless in the end.

    err tbh im actually not sure, as the only time i unrar'ed it was on windows and i was unable to open the file through standard notepad, and ive never needed to use it as i have smaller files that i update with any new passwords i find or use

  12. I did not here anywhere in that video an answer to my question:

    Read the BOLD words these are key to my question I already said i stood corrected on the Whole Disk Encryption what i asked after was different.

    just wondering why haven't you posted these question on UBUNTU'S forum and asked on THIER irc chan, since they know about ubuntu not us, i run arch linux which is different to what you run

×
×
  • Create New...