Jump to content

driveingnow

Active Members
  • Posts

    42
  • Joined

  • Last visited

Posts posted by driveingnow

  1. Ok quick background, I am in a network security class (really I kind you not) and the teacher has let us set up a two networks, each on has

    running on Win 2k3

    Exchange, 2003

    SQL

    ISA firewall

    Active directory

    Win xp

    Redhat

    Https website

    everything in behind the ISA firewall.

    WE WILL NOT BE CONNECTED TO THE INTERNET!!!!! (so now going out side are lab with are hacking)

    We will have one computer connected to the outside world to look up and download programs to thumbdrives and Sneckernet them to are hacking computers.

    the otherside has kept there passwords hind from us and vice versa.

    so what I need is a way in, I am having a hard time figuring out how to do it, he has taught us how to keep people out, we really ahven't coverd how to get in.

    Any and all help would be great...

    and if I get and A out of the class with your help I will deffintly let you know as well as let the class know just how great you guys and this site really is....

  2. Is there any way to set up a thumb drive to preform this hack with out a u3 drive????

    if so could some one tell what it is... I have a few old drive the u3 drive is replacing....

    Also I was thinking about removing the u3 software, but if I want it back what would I have to do....

    I can't find the install on the U3 site....

    P.S. I have a sandisk like they used on the show....

    Thanks for all help

  3. With dusk comes the night

    And with it no more light

    A dreamy mist

    Surround us as we kiss

    We fall into bed

    We could lye but instead

    We injoy the pleasures of the flesh

    CHORUS:

    Cry for her minister

    Cry with your sisters

    For an angle has gone astray

    So use this night to pray

    Tonight love is gone

    For here it does not belong

    Lust fills are vains

    And we let are fire raign

    Harts beat louder than drums

    To the point we're almost numb

    CHORUS

    Our passion is strong

    As the fire fills our lungs

    I bite on her ear

    The ecstacy is almost here

    As I pull her hair

    Deeper down I go

    And we both explode

    CHORUS

    Be at peace in the deep

    Let it wash over you in your sleep

    Dream the day away

    And to night we well play

    CHORUS

  4. I am taking a Unix class in the fall and to get a jump start on it i was looking for a podcast that would teach me how to use it.

    and seeing that Linux is so close to Unix if there is a podcast that will teach me things like how to use the command line.

    even a Vidcast (lack of a better word) would work, but Ihave a hard time trying to follow written instuctions wile trying to do it.

    As all ways Thanks for any and all help

  5. OK I know told NUB here but I am using Trillian to logon to the IRC. Did that part fine.

    But it says that there are 25 channels? umm how do I find out what they are so I can login to one of them?????

    Sorry to bother you all with this dumb Q? but I have never used IRC be for.

    Thanks for any and all help.......

  6. http://www.grc.com/nat/arp.htm

    Looks like I was wrong. Reading the above I think it's something like this.

    Your LAN uses Ethernet packets which encapsulate IP packets. The Ethernet packets contain a MAC address which is the unique address of your network adapter, and as far as the switch or hub is concerned there is no correllation between IP and MAC address. These devices only know about the Ethernet part, and blindly forward packets to the port on which they know that MAC address lives.

    When Target sends out a packet to Destination, it uses its ARP Cache to get the MAC address of the Destination, places the IP packet for it in the Ethernet packet with this MAC address, and sends it on its way. Destination does a similar thing for sending the data back.

    When you poison the ARP caches of Target and Destination, you can get them to wrap their IP packets in an Ethernet packet aimed at you. YOUR ARP cache is clean, and contains the correct MAC address for both machines, allowing you to retransmit the packets to their intended recipients, and none would be the wiser.

    So what it basically boils down to is that ARP poisoning behind a switch is just as easy as behind a hub. And you shouldn't need any specialist big bucks tool to get it going either. Any tool will do. You only need to know the IP and MAC address of the target, the IP and MAC address of the destination (such as the internet gateway) and take it from there. Finding the correct values for those might be trickier behind a switch though.

    Well that is easy all you use is nmap and for a -sS search I have done that.

    In wich case I wonder what my teacher was talking about????

    Thanks for the in put....

  7. I'm thinking he's using a darknet of some kind...

    here I am trying to be serious and wanting to help people and your being a smart alick.

    Please if your not going to post the answer or help in some way just don't bother posting at all.

    (On this post, I don't prosume to set the rules for the board I am just asking)

    That was a seriuse answer... it might also have been a honeynet (yes, this is a seriuse answer). Now who looks like a fool?

    Ok sorry about that but just the way that was worded I thought you were saying that even though I said I was using it for good I really wanted to use it for bad.

    However in reading up on Darknets, you are sort of right the only differance is that know one else is on my network but me. However I have two computers on the network. One for spying on the other and one to login to aim yahoo msn mb ect. Just to see what I get.

    My apolagies for before. I just missunderstood you I had not heard of a Darknet before.

    However know body has really answered my Q?. So if any one knows of a free Switch Sniffer please let me know...

    Thanks

  8. I'm thinking he's using a darknet of some kind...

    here I am trying to be serious and wanting to help people and your being a smart alick.

    Please if your not going to post the answer or help in some way just don't bother posting at all.

    (On this post, I don't prosume to set the rules for the board I am just asking)

  9. I am takeing a network Security class (Really I am) and my teacher was talking about using swith sniffer to see who was doing what on the network.

    The only thing is he uses a corp. program that cost BIG!!! bucks.

    I was wondering if there was any free (or open source) program that would let me do the same on my own network at home.

    I promis I am not a hacker looking to do wrong I just want to learn how hackers think so I can learn how to stop them.

    Thanks for any and all help.....

×
×
  • Create New...