Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. If you want to become great at hacking. I'd start off with some networking course such as CCNA or Network+, it's imperative to have a sound knowledge of how a network really works. Then learn a programming language such as C, Python and PHP. They would be ideal languages to have knowledge of. Once you've become proficient at a language, you may want to learn assembly language too and a bit of reverse engineering. As a hacker you need to know how to reserve engineer a piece of software. A big must for becoming great at hacking, is knowing how an OS works from inside out. And last but not least, learn another OS preferably a Linux distro.
  2. @ApacheTectConsultency, that was so freaking hilarious.
  3. You need to provide us with a bit more information. What exactly is this tool for? How is it run? Via CLI (command line) or GUI (Graphical user interface).
  4. Just a quick observation, if you are going to be setting up two individual webservers, make sure your change the default port on one of the webservers to port 8080. For a very simple reason, you only have one WAP IP address and you can't have x2 port 80 running on the same IP address. For example, webserver1 would be on port 80 and webserver2 would be on port 8080.
  5. Whatever rows your boat brother. Glad you found a better video, that's how the community grows, by helping each other out.
  6. Every country has it's own regulations and protocols regarding how much power an adapter can legally transmit. You may be able to change that, by choosing a different county other than your own country. Also make sure, your adapter is disabled and not operational. and
  7. It's a bit hard to stop DDOS on a Wireless infrastructure, however there are a few things you could do to mitigate it. 1) May not be possible on some consumer routers due to it's firmware, but if upgraded to a custom firmware such as Tomato or DD-WRT, you can change the Router MAC address. 2) Definitely change the SSID, this will confuse the attacker. However the 1) option must be attempted first, because if only the SSID is changed and not the MAC address you are back to square on, because the attacker already knows what your wireless router MAC address is. This method may not stop the attacker altogether, but it's a mitigation strategy.
  8. You need to download and install the Compat Wireless drivers, it should work for your Ubuntu.
  9. I don't know if you have seen these guides, but they seem pretty straight forward. https://blogs.oracle.com/oswald/entry/easy_http_load_balancing_with http://www.slideshare.net/bradley.holt/load-balancing-with-apache#btnNext
  10. It took me many tries and lessons to understand how subnetting works. It wasn't easy, but my lecturer had a great deal of patience and understanding of it, which helped a lot. But with repetitive practice, it becomes natural and everything falls in place. http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a00800a67f5.shtml http://www.subnetting-secrets.com/easy_way_to_subnet.html And here's a link to a video, to help you out further
  11. The tool is called MDk3, and I don't know if you read the thread or not, but it's used for Dosing the router until it reboots. http://adaywithtape.blogspot.com.au/2009/10/mdk3-network-traffic-disruption.html
  12. Read this thread, http://forums.hak5.org/index.php?/topic/27282-deauthing-using-mdk3/
  13. If there are no IP addresses available, no computer will be able to connect to the network. So essentially it will be a Denial of Service.
  14. I don't know what your budget is, but I am getting this one. I will be formatting the disk and installing CentOS. ASUS G75VW-T1443H
  15. If your company has a Webserver with PHP extensions, you can use this PHP web-based application, to keep track of incidents and problems logged by the clients. http://osticket.com/
  16. Which not many, script kiddies will have the programming ability to alter it. But it's a good very good and valid point.
  17. For some it could be considered illegal, for others who understand it's true potential, it will just be another ordinary tool designed to detect weakness in a system. Even though you are doing a favor, by poiting out a flaw or weakness I don't believe you are being irresponsible or careless. On the contrary, you are simply making people aware of the dangers and giving them the opportunity to find solution for it. Of course, there will always be someone, who will use this tool for their own personal gains and malicious purposes. Just like Digip said, guns don't kill people, people kill people with guns.
  18. As Airman_dopey pointed out they could use Triangulation or simply Kismet and a GPS receiver to pin point your physical location. But as long as you have a clear line of sigh and no obstructions, you should receive good signals with a directional antenna.
  19. I've used dyndns.org quite a lot in past, never had any issues with them. When signing up with a DNS service provider, make sure you read their terms and agreements and understand them. Also find out, what their SLAs (service level agreement) are. If a service goes down, how long will it take for it to be restored?
  20. I've never relied or trusted on any cloud based storage. Some may provide protection for your data, but it's entirely up to the end user, how they want to manage their data. If uploading to the cloud, always encrypted it first, use Truecrypt and make sure you make a backup of it. Because if something goes wrong and lose your data, A) it's encrypted and secure and B ) you have a backup of it.
  21. I never had that problem before, furthermore, there are two ways to force each and every machine to go through a proxy, without having to go to each machine and setting up the proxy address individually. 1) You can setup a transparent proxy 2) Or use a Domain Group Police, to change the LAN settings on each individual machine. Setting up a DNS server is not very hard, you can achieve that with a Windows Server OS, or any Linux Distro by using BIND.
  22. Thanks for your reply Telot, the position that I am applying for is for an ICT Position within the Police. I should've been able to answer that question, but for some reason I was unable to. Thanks again mate, it's been much appreciated.
  23. I have found this link, that explains how it's possible to run a scan and map the network through an UPNP enabled router. https://media.defcon.org/dc-19/presentations/Garcia/DEFCON-19-Garcia-UPnP-Mapping.pdf
×
×
  • Create New...