Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. You are very correct about it, I was like what the hell? But when I re-named the folder to Con2 it worked. Now thats a fact.
  2. Hi Xhacks, Follow this tutorial on Ubuntu forums, should be straight forward. http://ubuntuforums.org/showthread.php?t=236093 By the way you are on right track.
  3. Just out of curiosity why do you want us to mess with your computer. What are you trying to achieve?
  4. I definitely like the concept, of a VPN software that is PSK based.
  5. I wouldn't say the worm is contained yet, but its certainly mutating or changing its signatures to evade further detection. This is what I love about worms, polymorphism.
  6. I'd say reading and watching videos are good stuff for learning new things, but in reality practice is what counts the most. Whenever you see or you learn something new, put that to the practice. http://www.securitytube.com/ http://www.irongeek.com/ http://hakin9.org/ http://pauldotcom.com/ There are good places to start learning from and then practicing.
  7. I wouldn't install BackTrack as the main operating system though, I don' think that would work out well at all. However you could set up your system as a dual boot, having windows and BT installed on different partitions, the only hassle with that is you can only boot one OS at the time. Another option, would be to buy a cheap netbook and install backtrack on it. Now if you still want to have WinXP and BT running parallel to each other than, there is the VMware version of backtrack, you could try downloading that, if you haven't so. http://www.backtrack-linux.org/downloads/
  8. For me I found it very interesting though, I've never used Green HDDs in the past, all my past and current builds all had black HDDS. Its good to have someone who's done the research and who is willing to share that info with us. I always thought greens hdds would be a lot slower than black hdds, but it didn't turn out to be that way, based on your experience. Thanks Bro.
  9. A WORM attacking computers in Iran and threatening to shut down the country's first nuclear facility just weeks before it is due to open may have been developed in Israel. The Stuxnet worm sparked awe and alarm in the world of digital security when it was first identified in June, with analysts claiming it was so powerful, the wealth of resources needed to develop it made a nation-state the most likely culprit. According to security software experts and analysts, Stuxnet may have been designed to target the Iranian facility at Bushehr and suspicions have fallen on the US as well as Israel. Iran said this week that Stuxnet is mutating and wreaking havoc on computerised industrial equipment there but denied the Bushehr plant was among the facilities penetrated. No one has claimed credit for Stuxnet and a top US cybersecurity official said last week that the United States does not know who is behind it or its purpose. Now the New York Times reports that a piece of code dug out of the worm includes a reference to the Book of Esther, the Old Testament story in which the Jews pre-empt a Persian plot to destroy them, and is a possible clue of Israeli involvement. A file inside the Stuxnet code is named "Myrtus", an allusion to the Hebrew word for Esther, and is a possible Israeli calling card, the Times said. The other possibility is the reference was placed there as a "red herring" designed to throw investigators off the track or stir political tensions between the two countries. The Times said the US has also "rapidly ramped up a broad covert program, inherited from the Bush administration, to undermine Iran’s nuclear program". It noted that there was no consensus among security experts about who may be behind Stuxnet but said "there are many reasons to suspect Israel's involvement". Israel has poured huge resources into Unit 8200, its secretive cyberwar operation, and Stuxnet may be a "clear warning in a mounting technological and psychological battle" with Iran over its nuclear program, the newspaper said. The Times said Ralph Langner, a German computer security consultant, was the first to note that "Myrtus" is an allusion to the Hebrew word for Esther. Shai Blitzblau, head of the computer warfare laboratory at Maglan, an Israeli company specialising in information security, told the Times he was "convinced that Israel had nothing to do with Stuxnet". "We did a complete simulation of it and we sliced the code to its deepest level," he said. "We have studied its protocols and functionality. Our two main suspects for this are high-level industrial espionage against Siemens and a kind of academic experiment." Stuxnet specifically attacks Siemens supervisory control and data acquisition, or SCADA, systems commonly used to manage water supplies, oil rigs, power plants and other industrial facilities. The self-replicating malware has also been found lurking on Siemens systems in India, Indonesia and Pakistan, but the heaviest infiltration appears to be in Iran, according to researchers. Once resident inside a system, Stuxnet simply waits, checking every five seconds to see if its target parameters are met. Once they are, it triggers a sequence - the code DEADF007 - that forces the network's industrial process to self-destruct. "After the original code (for the entity's regular process) is no longer executed, we can expect that something will blow up soon," Mr Langner told The Christian Science Monitor earlier this week. "Something big." Source code: http://www.news.com.au/technology/who-is-m...0-1225932665892
  10. That's why in situations like this we just ignore it, it makes hard to tell if the system really belongs to the person or someone else.
  11. Have you tried Ebay? I just did quick search and found some IP NightVision Cams within your price range.
  12. Infiltrator

    Stuxnet

    Could be possible, but you never know. The media is always fucking with the peoples mind. Making you believe shit, that may not even be true. I hate the media, they sicken me.
  13. Its not a bad idea, but I rather have it hosted somewhere and looked after by someone I know or who I trust.
  14. So hilarious, someone did remix of that, check out this youtube video
  15. Trojans my favorite IT toys. But too bad for the bad guys.
  16. I think Adito would be a good option, for a VPN set up. Since you can allocate local resources and access them over the internet, without having to open too many port forwarding on the firewall, a good practice from a security standpoint. But on the other hand SSH would be a bit more secure than the SSL VPN itself. Just my option, by the way.
  17. I know it was sarcasm Bro, was just trying to play around a bit.
  18. I personally don't trust proxies, they may offer me the convenience to remain anonymous on the internet. But I would never trust it entirely for browsing my banking website. Depending on the proxy server, you are tunneling through it may record what you do. So I would probably go with a Paid Virtual Private Server, that way I will give me some peace of mind. Plus most banking websites use HTTPS to encrypt the traffic and most of time https is very secure, unless you receive a certificate warning, that it may indicate someone is trying to intercept your connection, or the certificate may have expired. In this circumstance, I would be a little bit concerned about. If you don't want to pay for a VPS service, you can always build your own proxy server, or have it hosted somewhere in the world.
  19. This links might interest you. http://www.securitycameraworld.com/ http://www.dhgate.com/wpa-waterproof-wifi-...1525231b84.html
  20. Ahhh, I am sorry but we do need trees. No trees, no oxygen, no life. And if you take the green away, you are killing the planet.
  21. I'd say so, everything is possible in the IT world.
  22. Your question is confusing my precious mind.
  23. Performance and speed its what I always like on my systems, so right now my desktop computer has a Quad Core CPU, with 8 gigs of ram and a WD 10.000RPM Raptor HDD. Edit: On the other hand, I could always upgrade my HDD to a SSD.
  24. Yeah, I would like that too, I might buy a flux capacitor as well and build a time machine with that.
  25. I think what he is asking for is, CAN SOMEONE PLEASE HACK MY COMPUTER? Are you a security guru? Are you trying to put your security defense to the test? Plus I don't think this is a good approach you are taking, there are certainly tools out there, that can help you identify security holes in your system. Why don't you try that, if you need help with the tools we may be able to assist you, but asking us to hack into your system is a direct violation of the Hack5 Forums rules.
×
×
  • Create New...