Jump to content

Infiltrator

Dedicated Members
  • Content Count

    4,287
  • Joined

  • Last visited

  • Days Won

    22

About Infiltrator

  • Rank
    Gray-Hat Specialist

Contact Methods

  • Website URL
    http://infiltrator.webs.com/
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    Over the Atlantic, at a cruising altitude of 70.000 feet.
  • Interests
    Wireless and Network Security
    Server Virtualization
    Computer Network Infrastructure
    Server implementation.
    General Aviation
    RC Airplanes and Helicopters
    Scuba Diving
    Sky Diving
    War driving
    Solar battery Systems.
    Pen-Testing
    Command & Conquer

Recent Profile Visitors

20,548 profile views
  1. Make sure the DHCP service on the Pineapple is actually running.
  2. Look into this one, http://www.gnupg.org/ if you haven't heard of.
  3. Windows 8 is UEFI certified. Fedora isn't. That's why when you disable UEFI, you can boot your Fedora distribution. And when you enable UEFI, only Windows 8 is able to boot. http://docs.fedoraproject.org/en-US/Fedora/18/html-single/UEFI_Secure_Boot_Guide/index.html
  4. I don't trust any service provider, not even my own ISP. Don't forget they could be working along side with any government la w agency. So running your own SSH, or OpenVPN server from your own house, and then tunnelling your traffic through it, makes it very safe. Because you own it and have control over it. Your ISP on the other hand, can only see the IP addresses you access, but not the traffic itself.
  5. Well, I can understand that. It would be pointless for an average home user to have a second WAN connection. Unless, you are offering some kind of cloud service, that needs to have some kind of redundancy in place. In addition, not many users will be able to afford the price of a second WAN connection.
  6. Be aware that SSL-strip will not work against some SSL-based websites. Why? Because they've been implemented to work on SSL only. Remove the "S" from the HTTPs, will cause the Web-server to close the connection.
  7. There is just one more challenge. Your traffic will only remain encrypted from point A (yourself) to point B (VPN server). Once your traffic leaves point B, it will once again become clear-text. So all the effort, you went through to ensure your traffic was heavily encrypted, will once again be travelling in clear-text. If you're going to be transmitting data, just make sure you encrypt it before hand. This will make sure, that your data remains safe. You could then use PGP to self-sign it and even if it gets tempered with, you will know something happened along the way.
  8. What you did is considered Blackhat hacking. You clearly did something without authorization and you're lucky your school didn't press charges against you. If you keep doing this, you will end up in jail. So think twice before doing again. As someone already mentioned, I'd practice with your gear, setup a virtual lab and use it for improving your skills. And then once you are good, do it legally and professionally by working for a company.
  9. This is an interesting thread, the other I ran Nmap against my Asus router and found about 4 different ports opened. This was an internal scan, so all good. I am going to do an external scan, to see what interesting results I might get.
  10. Just want to add, that Reaver can become infective against some routers. And that's due to the fact, that some routers have built in protection against Reaver. You're better off, just capturing the 4 way handshake and cracking it.
  11. Depending on the magnitude of the DDoS attack, your bandwidth can get crippled very quickly. And as you stated in your post "my router gets a little slow", that could be one of the reasons why the player's voices are sounding like robots. Also, one way to minimize the effects of the DDoS attack, is using a Load Balancer hardware. You could build your own with Untangle or Pfsense both support this feature. But it requires an additional Internet connection to load balance the traffic. Just a suggestion.
  12. Long before Prism existed, I always had concerns over using third party service providers, for storing any of my data. If you are really concerned with your data or information, do not post or upload them. Setup your cloud server from home and use it instead.
  13. To succeed in any field, you need to have the passion, dedication and above all, you must enjoy what you do.
  14. Correct, you can't read SSL encrypted traffic. But with the right software and hardware, it's possible to read SSL encrypted traffic. Now, the reason why adding a VPN under HTTP(s) add more security, is because you are adding an additional layer of encryption. You now have two different layers of encryption. Even if an attacker manages to break through the first layer, he still have to break through the second layer, which therefore increases your overall security but reduces your throughput and system performance.
  15. I own both adapters the AWUS36H and AWUS036NHA. The former uses a Realtek chipset and the latter uses an Atheros chipset. Based on my experimentations, I'd recommend the c. It's much more stable than the AWUS36H. The AWUS36H is a long range adapter, the AWUS036NHA isn't but that shouldn't hold you back. You can always upgrade the antenna to a high gain one.
×
×
  • Create New...