Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. You can purchase any Nvidia graphics card, as long as they are in this range (8000 series, 9000 series, GTX200 series, GTX400/500 series). My cracker will be optimized for the GTX580 cards.
  2. GPUs are much more faster than CPUs, that's why I'm asking him to write it with CUDA support. And the more Nvidia Cuda cards you have, the less time you have to wait, to get the WPA key cracked. With CPUs alone it would take a lot of machines than you would expect.
  3. The only thing I don't like about, winrtgen is that its single threaded. Even if you had a multi-core CPU it would be useless generating WPA rainbow tables, it would take a very long time to generate them. You can try downloading or purchasing WPA rainbow tables, but it has to be specific for your SSID or else it won't work. I college of mine is writing a custom Cuda WPA cracker for me, it also supports multi-host which will be very useful for cracking WPA if you have multiple computers with Nvidia cards in it.
  4. This is what I plan to get myself, http://www.asus.com.au/Notebooks/Versatile_Performance/A53SJ/ Once I get it, I will be upgrading, the RAM to 8GB and the HDD to an SSD. Will be loading Backtrack with no dual booting.
  5. By the way, you should watch season 10 episode 12. Darren talks about how to default your local connections, if you were using a VPN or SSH connection.
  6. From what I've been reading, the application in this case "Firefox", when enabled to use network.proxy.socks_remote_dns is forced not to do any local dns lookups and instructed to use the remote dns instead. Here is an article, I found. https://calomel.org/firefox_ssh_proxy.html
  7. Yes, it will still be performing local DNS lookups, I know with Firefox you can set it to do DNS lookups remotely rather than locally.
  8. You could use Dynamic socks, for tunneling your traffic through SSH. Here is a tutorial, http://dimitar.me/dynamic-port-forwarding-with-socks-over-ssh/
  9. I've seen that before a malware with a .scr extension. Even though, It didn't cause any damage, it dramatically slowed the system down. The whole CPU usage was at 100%. Getting rid of it, was just a matter of locating it and deleting it.
  10. Its funny how all the major av companies are not picking up this sucker. It must be implemented with some kind of sophisticated Rootkit to make it FUD.
  11. Try OpenVPN, since it uses OpenSSL, the firewall should let the connection right through since its operating on port 443. Once you have the connection, established all you have to do with is point your SSH client to the local IP address of your SSH server, and bingo you have SSH access.
  12. 1) Try out these tools Malwarebyte, Spyware-Search and Destroy and Avast. 2) Go to your start menu, type Msconfig in the search field, go to the startup tab and under the start up item take notice of any item that has a reference to OTL.exe and disable it. 3) Go to your start up folder and make sure the OTL.exe file is not there, C:\Users\<userID>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 4) Check the following key in your registry, and make sure it's not there. [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] 5) If none of the above methods work, try Hijackthis
  13. By the way, Digip was referring to Karma, read this URL to understand it better, http://hakshop.myshopify.com/collections/frontpage/products/wifi-pineapple
  14. Its all up to you, if you feel like you want to learn more, or take pen-testing to a different level, than you should write your own exploits.
  15. These guides should be straight forward, give them a try http://www.pinglio.com/2010/11/how-to-install-and-use-firesheep/ http://www.wonderhowto.com/how-to-sniff-for-cookies-when-public-wi-fi-network-with-firefox-firesheep-407650/
  16. May I suggest you this how-to. https://help.ubuntu.com/10.04/serverguide/C/ftp-server.html
  17. The key idea to learn how to pen-test a network/system is to practice on your own, as well as watching videos and researching. There are plenty of videos on the web, these are good places to start learning from, securitytube.net, irongeek.com and hak5.org. I would recommend get yourself a copy of backtrack and install it on VM or a laptop if you have one. Use your own home network to practice and find loopholes and learn how to patch them. Now all I can say is read, research and practice, you will learn a lot doing this way. Good luck.
  18. I know there are few tools out there, for Windows that can do what you are asking. The only problem with Windows, is drivers compatibility.
  19. What you need is ArpON, its an utility that alerts you and block ARP attacks. You should check it out. Edit: Also I forgot to mention, you should use a VPN or SSH service, if you really want protection.
  20. So let me guess, you are trying to crack a wireless? What algorithm are you trying to crack WEP or WPA?
  21. Sorry, but you are not making much sense!
  22. Even if your network and servers are fast, installing an OS over the network could slow things down. I would recommend doing it after hours, or when the network is not in use. Or simply burn the image to a CD/DVD which is a much faster process.
  23. For some apparent reason, I never had luck with setting up wireless on printers, they can be a real pain to set up sometimes. I always preferred to use wired connection, not because of the simplicity of the setup, but interference can always occur on wireless.
  24. You need a server like Windows 2003/2008 server, then you will need to install and configure a service called RIS (remote installation service). Once the service is up and running, your target machines will need to have a network card, that is PXI-boot enabled. I would recommend reading through this articles: http://support.microsoft.com/kb/298750 http://www.alanphipps.com/WindowsAdmin-Server-RIS.html
×
×
  • Create New...