Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Posts posted by Infiltrator

  1. Hi Guys,

    I am applying for another IT job and as part of their recruitment process, they have provided me with a selection criteria that I must address, unfortunately there is one criteria that I don't quite know how to address it. I would appreciate if someone could give me some hints or suggestions.

    Understanding of contemporary information and communications technologies and related ICT architecture and standards issues.


    You comments and suggestions will be very much appreciated.

    Thank you in advance.

    Regards,

    Infiltrator

  2. If you've no intention of making a real effort to get the job, sorry if my assumption is wrong, then you may as well go dressed like Hunter Thompson, Hawaiian shirt, tan shorts, baseball cap, and maybe a snorkel and some diving flippers.

    Lol Digip that's the most hilarious thing I've ever heard.

    To the OP, there is no need to be dared, if you want to make an impression on them, just be yourself and do your best and good luck.

  3. Same here, Infil... jobs are scarce... unless ya like McJobs...

    Lol, that's funny, I would never work at those the places. Doing shift work, it's not something for me.

    I used to wake up at 05:00am to get to work by 06:00am and sometimes I would finish my shift late at night.

    I did this for 2 years, at a supermarket job near where I live. The conditions weren't that great, not to mention the pay.

    But i had no choice, I had to make money somehow.

  4. And thats a good reason in your case to leave the union if it doesn't fight for its workers. In his case, its a matter of "Have job with union > No job without union || find new job"

    Yeah, I'm still looking for another job, until then I'm gonna have to sit tight. Because where I live can be quite difficult to find one.

  5. I've been employed for this company for more than 5 years, during these 5 years I never received a decent salary. Mind you, I have a degree in IT and a few certifications and at least 5 year experience. Other co-workers who have been employed for less years in the company, does the same job as I do and get paid more than I do. They don't have half of the qualifications or experience that I have.

    Now this have frustrated me a lot, and I have many times tried to negotiate for a better salary with my boss, even tried to convince him but didn't work out too well. I have spoken to a few other colleges who advised to join the UNION.

    So I then decided to join the UNION to fight for my rights, they have provided me with information and recommendations but none have worked so far. I have opened a case with them, but it has been ongoing for quite sometime now, I haven't heard back from them, and neither my pay has changed.

    So to answer your question, it will depend on the UNION in question. I think some unions are just there, to take the money from the people. I am thinking on calling my union and cancelling my membership, I've been paying now $50.00 dollars a month for nothing.

  6. If you plan to run an exit node from anywhere it's best to contact your ISP and see what their policy says about it. You might find they block certain ports (e.g. 9001) which Tor uses by default or they may disconnect you for ToS violation. Assuming they are unconcerned you can then set up and hope the cops don't show up. Here in the UK there was some interest by law enforcement but no raids that I know of. Australia, Austria and Germany have seen raids on exit node operators.

    I have run a Tor relay (non-exit node) for a couple of years and my ISP hasn't cared (as far as I know). If you have a server then running an exit node is a great thing to do if you don't mind the possibility of a bit of hassle and if you want to avoid any kind of hassle then I would urge you to run a relay (or many). Given that all traffic is encrypted and you can run it over port 443 it is a little hard to identify as Tor and I'm sure most ISPs couldn't care less.

    Warning note: the default Tor config is set up to work as an relay AND exit node. Just change the Exit Policy to REJECT *.* in torrc file to only relay traffic.

    You could use a bridge if your ISP is blocking those ports. Bridges uses port 443, which by default shouldn't be blocked

  7. in VMware worstation 9
    1. Before you connect your USB adapter, make sure your virtual machine is running
    2. Now connect your USB adapter, and select the connect option in your virtual machine settings.
    3. Open a terminal and type lsusb, it should list your adapter brand (Alfa, Netgear), if it doesn't repeat the steps above
    4. If you can see the adapter listed, the you are ready to use it.
    5. You can now use airmon-ng to create a monitor mode interface.

    Let us know, if you are still experiencing issues.

  8. I would say don't waste your time with freeware if this is a enterprise network. You need a content filter... example Cisco's Ironport. You have the WSA for web sites and ESA for email. Ya I know it is a little expensive but you have to look at it as an investment because really it is (employees goofing off = $$$ lost) If you really wanted to see what employees are doing real time then a packet shaper is the way to go. I believe the company is BlueCoat *Changed names a couple of times* has an excellent packet shaper and every user can be seen along with what site, IP, type of traffic, ext. This also gives you the power to throttle them up and or down to how ever you feel necessary. Example would be you set www.facebook.com to have 5kps all together. Thus making it unusable and thus you employees will not be goofing off on your computer. That doesn't mean they just won't whip out their cell-phones and tether.

    Regards

    -Stealthkit

    Why pay when OpenSource software can sometimes perform better than propriety software?

  9. I checked distrowatch.com. There's no utility like Hiren's bootdisk for Linux. any recommendations?

    One way you can go about backing up the stuff, is using a live CD to boot off your computer, and then once booted, you will need to mount your Linux Partitions and copy all data from the mounted partition into an USB hard drive. And then reinstall the OS again.

  10. Yes, thread is back now, but it WAS gone yesterday. Someone put it back, then locked it, but it was literally gone. both while logged on, logged off, from my IP and from my VPN. I wouldn't have made a ruckus if it weren't.

    I wasn't online yesterday, so I can't really comment on it. But it's good to see the thread is backup again.

    Nevertheless, the Hak5 forums have had technical problems in the past, so I don't think you are making any ruckus here, you are very much spot on.

  11. Blow mold die programming. I add the amount of air, material, etc. on the machine; which then, in turn, creates the part. It is not too bad... but yes; my girlfriend picking me up is hilarious :D . RIght now, unfortunately, she is in bed and I am getting our daughter ready for school (on 4 hours of sleep :) )

    That's nice, anyway I wish you all the best in your new job and good luck.

  12. Well, second night and talked to a Union Stewardess and she is interested in "picking" me up.

    That explains why your girlfriend is going crazy, someone else is picking you up.

    Anyway, what sort of job did you get?

  13. Here are my updated nmap scans:

    PORT STATE SERVICE VERSION

    21/tcp open ftp?

    |_ftp-bounce: no banner

    23/tcp open telnet?

    80/tcp open http Allegro RomPager 4.07 UPnP/1.0 (ZyXEL ZyWALL 2)

    | http-methods: GET HEAD POST PUT

    | Potentially risky methods: PUT

    |_See http://nmap.org/nsedoc/scripts/http-methods.html

    |_http-generator: GoLive CyberStudio 3

    |_http-title: .:: ::.

    7547/tcp open http Allegro RomPager 4.07 UPnP/1.0 (ZyXEL ZyWALL 2)

    |_http-title: Object Not Found

    | http-methods: GET HEAD POST PUT

    | Potentially risky methods: PUT

    |_See http://nmap.org/nsedoc/scripts/http-methods.html

    53/udp open domain ISC BIND (Fake version: Nominum Vantio 5.2.0.1)

    |_dns-recursion: Recursion appears to be enabled

    | dns-nsid:

    |_ bind.version: Nominum Vantio 5.2.0.1

    161/udp open|filtered snmp

    |_snmp-win32-shares: TIMEOUT

    7547/udp open|filtered unknown

    Too many fingerprints match this host to give specific OS details

    As I understand it, if users (hackers) scan dymanic IP addresses with nmap then they are likely to find some home routers.

    They can then connect via telnet and try default passwords, brute force with hydra, etc.

    But what can they do even if they find the password (or if none is set). In other words: what is the point of remotely gaining access to someone's home router?

    As a security practice, it's highly recommended to have all these remote management features turned off, or only allowed on local intranets instead of over the internet.

    My router security is pretty tight, I only allow a certain computer to manage it remotely and management over wireless is disallowed too

    Any other services such as Telnet or HTTP, which transmits information in clear-text is also disabled, I use either SSH or HTTP(s)

    Port forwarding rules are disabled, unless it's required or otherwise.

    • Upvote 1
  14. Might work that way in newer versions. On Windows 7 Pro, 64bit, I had setup hard coded logins and registered with their site to remote into my machines, but if I locked my WIndows 7 workstation and tried to remote into it, it wouldn't let me while the screen was locked. Once it was unlocked, all worked as should. I have not tried it with the later, newer versions or latest version though, so maybe they put a tweak in for that, or UAC bypass or something I'm not aware of, like running as a service. I always used the portable versions though, not the full install ones, since I like just being able to throw it on my thumb drive and take it with me.

    I am still yet to try with Windows 7 though, but with XP it worked without any problems.

  15. Took a look at this article... Once quantum computing occurs, if it hasn't already in some deep corner of government, what do you think will happen to encryption and cracking? So you think it's just going to get exponentially larger to cope with the faster power? Or a new form of encryption all together?

    I am certain that once quantum computing has becomes a reality, the current encryption standard will become too weak to be relied upon, that a new form of encryption will need to be engineered.

  16. I like OpenVPN, but I've also used TeamViewer. TeamViewer is kind of like window remote assistance though, in that you usually need someone at the other end unless you register with them to control specific machines remotely. Other wise, the password changes after every use. Also, With TeamViewer, you can't log onto a windows machine, if the windows screen is locked (WindowsKey + L) so if you lock your workstation, but left it online, TeamViewer can't login since its a desktop app. OpenVPN is also nice, but there is a built in VPN to Windows itself most people forget about. There are also alternatives like PcAnywhere as well as Cisco or Citrix GoTo Assist has one that sponsors the show, but I don't think its free.

    Actually, if you install Teamviewer on the remote machine you will still be able to log into that machine, even if it's completely locked out, you will still need to know the local administrator account username/password to be able to log in.

    I've done this before at my work, I needed to remote into a machine which was part of another domain altogether. For this to work, the remote machine and TeamViewer must be running, a username/password will need to be either generated or created by the user manually.

    Upon establishing the remote connection, you will be prompted for the teamviwer login details, once authenticated you will be presented with the login screen of the remote system. Furthermore, there is an option in the TV advanced settings, that will need to be enabled, for this to work.

    Having this option enabled, can be very convenient as you don't have to rely on the end user to accept your connection, or even better, have to leave your computer screen unlocked.

×
×
  • Create New...