Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. Yep couldn't agree more, I use windows for general purposes and BT for hardcore hacking, love it.
  2. Sounds interesting, that's why I have a boring life I don't drink. I should start doing so.
  3. Yes Sparda, you are spot on. And the list goes.
  4. I guess you use windows yourself too, right!
  5. Sorry don't mean to offend anybody, but don't smoke and don't drink its a waste of money and of life as well. I have better plans for my money.
  6. Can you post the receipt for the pie? Thanks.
  7. Radius authentication server, that's what corporates around the world uses for securing their wireless network. I am pretty sure there are other ways for securing it, but implementing a radius server seems to be the most effective method for securing a wireless network.
  8. Hmm! Are you trying to build a botnet of armies or something? Give me a scenario where this could work.
  9. Sorry here are the missing links OpenVPN SSL download: http://sourceforge.net/projects/openvpn-als/ OpenVPN SSL Darren segment: http://www.hak5.org/episodes/episode-607
  10. "Tthe question is open ssl vpn , is it 100% secure and undetectable? is there a footprint? can the direction that has initiated the comm be determined? can someone after auditing say, yes it is clear that you made a vpn to outside and then connected to the inside?" Open SSL VPN, just like any banking web site uses https to encrypt the traffic, between the client and the server side. it can use either 128 or 256 bits of encryption to secure the connection, but using the https alone does not make it 100% secure. Furthermore to HTTPs Darren did a segment on how to strip the "S" from the https protocol using SSLStrip. I would recommend watching that Video. http://www.hak5.org/episodes/episode-610 Depending how the system administrator at your corporate configured the system/network, yes it is possible to determine if there has been an inbound or outbound connection made by you or any other user. Hope this helps
  11. Just a few suggestions: 5. Review router/firewall for open ports. As well as check for firmware updates 4. Check for a software firewall on PCs. Windows comes with one. Comodo Free Personal Firewall, Cnet recommends and its a lot more secure than the windows built in. 7. If you're paranoid, take out any wireless devices. If not, at the very least, secure it using WPA2 and a strong passphrase. Or if you are extremely paranoid, use a radius authentication server. That's all I can think off.
  12. Hi Samer, Two things you can try, download the openSSL vpn. Darren did a segment on that, you might want to watch it. Second if you corporate are blocking ports, you might want to choose between these two ports 80 or 443. Third but not least, be careful what you do because your actions may haunt you later.
  13. No offense but I think if you continue with what you are trying to do, you may not end up with a job. As what you are doing is potential a SECURITY BREACH. Trust me I know that from experience.
  14. I am thinking in spending a little over $20,000 for the network gear, plus computers and servers. I will be running gigabit switches with fiber optic modules, x2 vdsl modems configured on a load balancing set up. a few wireless access points with radius authentication. A domain controller with DNS, AD and DHCP running. x1 4TB NAS, with web-based managment console and FTP access enabled as well. x8 suveinllance cameras, that can be controlled or viewed from over the internet. This is a rought idea of how I am planning in building my network. If you have any ideas or suggestions please feel free to comment.
  15. Do you have any server clusters at all?
  16. Just out of curiousity what kind of uploading speeds do you get out of your two wan connections?
  17. Just wondering are you using software or hardware based vpn? if not using at all!
  18. He seems to be a good guest, apart from not knowing how to explain things properly. I am pretty sure he knows his shit well, that is just my observation.
  19. The nice thing about Avast, is that it does not require any user interaction to update itself, and you can feel rest assured that if it detects anything, it will advise you what to do so. It also comes with other monitoring features, like webshield, IRC scanning and 2p2. I several times, clicked on a unsafe link and Avast simply aborted the connection and averting my system from getting infected. If are not sure, whether your system is infected or not, might wanna consider installing Avast on your computer, it also comes with a pre boot scanning feature, that will allow you to scan your system before windows loads up. That is my advice to you. Cheers.
  20. Nice set up, I am getting myself a Kodak Zi8 Pocket Video Camera. So I can record some of my RC flying stunts and post it in youtube. Apart from that, great stuff dude and thanks for posting that up.
×
×
  • Create New...