Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. The forum feels weird, will take me sometime to get used to it.
  2. I don't know what you will be using the computer mainly for. But I would go with an i7 cpu and a high end mobo like the ASUS P9X79 Pro or Gigabyte GA-X79-UD. That's what I plan on getting for my new rig.
  3. A proxy is what you need, it will not only provide/block access to the internet, but will also report any URL a specific user has accessed. This is the most effective way to control and keep an eye on what users access on the internet.
  4. Just adding a few more: 1) Keep your main OS and third party software up to date / patched. 2) If not using a network firewall appliance, use Comodo's Firewall 3) Do not open, attachments from unknown/insure sources 4) When setting a password, ensure it's long than 8 characters and it contains all the specials characters (1nN!!!@#$%%T^) 5) Use Virtual machines, to open attachments and programs from insecure sources. 6) Use Firefox and install NoScript, for added protection against malicious Javascript. 7) Use TrueCrypt to protect yourself against data theft.
  5. There are several things that could be affecting your ping response. 1) BitTorrent downloading 2) Router (eg: Firmware/hardware) 3) Too many processes running in your computer 4) Windows/Third Party apps downloading updates. 5) Slow internet speeds will generally increase your ping response. You will find that most of the time, your own internet speed is what is causing the high pings. Go to speedtest.net and do a test to determine your actual internet speed. Upgrading your internet plan could offer you a better ping result.
  6. use aida32 or everest and it will show exactly what type of ram you have.
  7. If the upload form doesn't let you upload your files, I would use the FTP instead. I know its a pain but since you can't use the upload folder due to the strict permissions, its the only way. The other way would be to setup your own webserver at home, and security will have to be tight or else you will get all sort of attacks and people trying to get in.
  8. I see where you are going with this, a bit like a proxy chain, where your traffic bounces between different routers in different geographical locations. This could work, also if you used a VPN, it would make the tracing very challenging and difficult, since you are always on the go.
  9. You can download the FileZilla server, from this link http://filezilla-project.org/ Follow this wiki, on how to set it up http://wiki.filezilla-project.org/Documentation
  10. Might want to check, if SET is not saving the files into another directory.
  11. I agree with Digip, whether W3C has good standards or not, it's quite a resourceful website for beginners to learn stuff from. It may not be the best website on the internet, but it certainly has helped me a lot, when I was learning PHP and it still helps when I forget how to do certain things.
  12. If you put a bit of effort, nothing it's hard. Hydra for Linux: http://www.securitytube.net/video/953 Hydra for Windows:
  13. Try doing an update on SET, to see if that fixes the problem.
  14. Apart from generating the MD5 collision attack, they also had to predict completely the certificate content that would've been signed by the CA. Which had to be identical, in order for the certificate to be valid. http://blogs.technet.com/b/srd/archive/2012/06/06/more-information-about-the-digital-certificates-used-to-sign-the-flame-malware.aspx
  15. Rather than trying to lean all at once, I would suggest to start from one end of the string then slowly progress to the other. First start with HTML, get to know the language, how it works, how you can use it to manipulate the way a page looks on your browser. Once you've decided you know enough about HTML, move onto Javascript. Javascript can be a very confusing language to learn at first, so take your time to learn it and practice as you go along. As opposed to PHP or ASP, Javascript runs on the client's side or when the page is loaded by the browser, since it runs on the client's browser, it does NOT rely on a web server to run the code for you. The good thing about HTML and Javascript, is that they don't require any server side configuration, its more like plug and play, you drop the code into your webpage and the browser executes it for you. As for PHP and ASP you will need a webserver such as IIS or Apache configured to serve .asp or .php pages. If you want to learn how to develop dynamic webpages, I'd recommend PHP instead of ASP. From experience, its a lot easier to learn, also there are plenty of Tutorials and guides on the internet, which will make the learning experience for you, a good one.
  16. There is a really good binder, in fact it's a lot more than just a binder, but one of the best for the moment. If you head over the Hackforums.net, you will see what I mean.
  17. Flame is certainly one of the most sophisticated worms ever created to date. The thing that fascinates me about this worm is not the complexity of it, is the actual size of the worm 20MB. No other worm has ever been this big in size. The Flame authors must be really proud of themselves for creating a such highly advanced worm.
  18. If your external IP address is dynamic, than I'd use No-IP "hostname", if it's static I'd just use the IP. Correct, when the target machine connects back to your attacker's machine, it will be looking for a port to connect to. The default port is 443 but it can be changed to any port you want. It won't be possible to run both applications on the same ports, what you could do is have both apps running at the same time but on different ports.
  19. There are only speculations, but the evidence isn't that solid. They still don't know who's really behind all these events. I've also read that the US President Barack Obama is behind all these Cyber-attacks. One thing for sure, is that these authors are certainly sponsored by the government. First was Stuxnet, then Duqu now Flame what next. I think there is more to come.
  20. Yes it can be a mess, but its quite good from experience. It will also need a decent password list, to be successful in cracking the router's password.
  21. Due to the Hak5 forum rules I can't say it out loud, but the http://www.hackforums.net will have what you are looking for.
  22. If you want to reset the password, I'd recommend NT Offline password, burn the ISO image to a CD and boot the computer off it.
  23. If you want a good wireless solution, you should check this one out Router http://usa.asus.com/Networks/Wireless_Routers/RTN66U/ Wireless Adapter http://usa.asus.com/Networks/Wireless_Adapters/EAN66/#overview
  24. Correct, when you enter the clear-text password in your router, it takes it and then uses a hash algorithm such as an MD5 for example, to generate a hash of your clear-text password and uses it to match against the hash already saved in the database. If they are a match, you are authenticated, if they don't then you will get an authentication error.
×
×
  • Create New...