driveingnow
-
Posts
42 -
Joined
-
Last visited
Posts posted by driveingnow
-
-
I heard someone mention a program like WSUS (Windows Server Update Service) That you can run under linux. But I can't remember what it's called. Does any one know what I am talking about, or was I just hearing things?
-
They are against the Rules of Engagment. We can't have physical access, and we can't talk to them about it.
Sorry ment to say that before.....
This is all software, the only thing we can know about them is there IP address...
-
Ok quick background, I am in a network security class (really I kind you not) and the teacher has let us set up a two networks, each on has
running on Win 2k3
Exchange, 2003
SQL
ISA firewall
Active directory
Win xp
Redhat
Https website
everything in behind the ISA firewall.
WE WILL NOT BE CONNECTED TO THE INTERNET!!!!! (so now going out side are lab with are hacking)
We will have one computer connected to the outside world to look up and download programs to thumbdrives and Sneckernet them to are hacking computers.
the otherside has kept there passwords hind from us and vice versa.
so what I need is a way in, I am having a hard time figuring out how to do it, he has taught us how to keep people out, we really ahven't coverd how to get in.
Any and all help would be great...
and if I get and A out of the class with your help I will deffintly let you know as well as let the class know just how great you guys and this site really is....
-
wish I could help but I can't program worth a damn, but if you get a beta I will be happy to test it...
Thanks for the help though....
-
Is there any way to set up a thumb drive to preform this hack with out a u3 drive????
if so could some one tell what it is... I have a few old drive the u3 drive is replacing....
Also I was thinking about removing the u3 software, but if I want it back what would I have to do....
I can't find the install on the U3 site....
P.S. I have a sandisk like they used on the show....
Thanks for all help
-
It's not bad but if you did it in red maybe?
I like the red that you guys nomaly have.....
-
This is a strange kind of spam... perhaps it's a drunken post?
NO! in chat some one posted a poem they wrote I reviewed it and askif in kind would they review my'n, however i didn't have a web site to most it on so I put it in here.......
-
With dusk comes the night
And with it no more light
A dreamy mist
Surround us as we kiss
We fall into bed
We could lye but instead
We injoy the pleasures of the flesh
CHORUS:
Cry for her minister
Cry with your sisters
For an angle has gone astray
So use this night to pray
Tonight love is gone
For here it does not belong
Lust fills are vains
And we let are fire raign
Harts beat louder than drums
To the point we're almost numb
CHORUS
Our passion is strong
As the fire fills our lungs
I bite on her ear
The ecstacy is almost here
As I pull her hair
Deeper down I go
And we both explode
CHORUS
Be at peace in the deep
Let it wash over you in your sleep
Dream the day away
And to night we well play
CHORUS
-
I am taking a Unix class in the fall and to get a jump start on it i was looking for a podcast that would teach me how to use it.
and seeing that Linux is so close to Unix if there is a podcast that will teach me things like how to use the command line.
even a Vidcast (lack of a better word) would work, but Ihave a hard time trying to follow written instuctions wile trying to do it.
As all ways Thanks for any and all help
-
Thanks that worked, so keep an eye out for me in chat as driveingnow.
-
OK I know told NUB here but I am using Trillian to logon to the IRC. Did that part fine.
But it says that there are 25 channels? umm how do I find out what they are so I can login to one of them?????
Sorry to bother you all with this dumb Q? but I have never used IRC be for.
Thanks for any and all help.......
-
And of course something like Ethereal is good for analyzing the traffic.
Ethereal is dead, long live Wireshark.
Ben
I just downloaded wireshark and it looks and works just like ethereal.
-
http://www.grc.com/nat/arp.htm
Looks like I was wrong. Reading the above I think it's something like this.
Your LAN uses Ethernet packets which encapsulate IP packets. The Ethernet packets contain a MAC address which is the unique address of your network adapter, and as far as the switch or hub is concerned there is no correllation between IP and MAC address. These devices only know about the Ethernet part, and blindly forward packets to the port on which they know that MAC address lives.
When Target sends out a packet to Destination, it uses its ARP Cache to get the MAC address of the Destination, places the IP packet for it in the Ethernet packet with this MAC address, and sends it on its way. Destination does a similar thing for sending the data back.
When you poison the ARP caches of Target and Destination, you can get them to wrap their IP packets in an Ethernet packet aimed at you. YOUR ARP cache is clean, and contains the correct MAC address for both machines, allowing you to retransmit the packets to their intended recipients, and none would be the wiser.
So what it basically boils down to is that ARP poisoning behind a switch is just as easy as behind a hub. And you shouldn't need any specialist big bucks tool to get it going either. Any tool will do. You only need to know the IP and MAC address of the target, the IP and MAC address of the destination (such as the internet gateway) and take it from there. Finding the correct values for those might be trickier behind a switch though.
Well that is easy all you use is nmap and for a -sS search I have done that.
In wich case I wonder what my teacher was talking about????
Thanks for the in put....
-
I'm thinking he's using a darknet of some kind...
here I am trying to be serious and wanting to help people and your being a smart alick.
Please if your not going to post the answer or help in some way just don't bother posting at all.
(On this post, I don't prosume to set the rules for the board I am just asking)
That was a seriuse answer... it might also have been a honeynet (yes, this is a seriuse answer). Now who looks like a fool?
Ok sorry about that but just the way that was worded I thought you were saying that even though I said I was using it for good I really wanted to use it for bad.
However in reading up on Darknets, you are sort of right the only differance is that know one else is on my network but me. However I have two computers on the network. One for spying on the other and one to login to aim yahoo msn mb ect. Just to see what I get.
My apolagies for before. I just missunderstood you I had not heard of a Darknet before.
However know body has really answered my Q?. So if any one knows of a free Switch Sniffer please let me know...
Thanks
-
I'm thinking he's using a darknet of some kind...
here I am trying to be serious and wanting to help people and your being a smart alick.
Please if your not going to post the answer or help in some way just don't bother posting at all.
(On this post, I don't prosume to set the rules for the board I am just asking)
-
I am takeing a network Security class (Really I am) and my teacher was talking about using swith sniffer to see who was doing what on the network.
The only thing is he uses a corp. program that cost BIG!!! bucks.
I was wondering if there was any free (or open source) program that would let me do the same on my own network at home.
I promis I am not a hacker looking to do wrong I just want to learn how hackers think so I can learn how to stop them.
Thanks for any and all help.....
I am looking for WSUS for linux?
in Questions
Posted
No, I need a progam for updating Windows XP Home & Pro users (Servers W2K & W2K3 would be nice, But not Necessary). But I want to run it off a Linux Server.