Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. And if you want to find out more information after deauthing them, could use Wireshark to get more insight into the packets.
  2. If you know people or colleges who works for the company, you could ask them for such information.
  3. Yeah I would wait till you finish High School, and then I'd do the CCNA and look for a job.
  4. How long do you have until College finishes?
  5. What happens when you try to restore the settings on another server? Does it give a warning or error message?
  6. I'd say so, usually internet cafes would have their own portal. But not sure if it would be a "Point Of Sale credit-card system" or one where you have to pay first and then they would supply you with a userID and password.
  7. I'd say get a CCNA certification... Plus some server certifications if you want to get into network administration.
  8. I think there is something wrong with your VPN configuration, can I suggest you to follow this tutorial. http://www.windowsecurity.com/articles/configuring-windows-server-2008-remote-access-ssl-vpn-server-part1.html http://www.windowsecurity.com/articles/configuring-windows-server-2008-remote-access-ssl-vpn-server-part2.html Or http://www.thomasmaurer.ch/2010/10/how-to-install-vpn-on-windows-server-2008-r2/
  9. Infiltrator

    Vpn Security

    I was just making a point about websites that use SSL, but I do know what you are referring to. You are referring to securing a point to point connection using SSL VPN. By the way, you should check out OpenVPN, if you haven't done so and its what I use at home.
  10. Infiltrator

    Vpn Security

    SSL is secure and you shouldn't be too worried with replay attacks. One thing to be aware of tough is, when using websites with SSL make sure they have the SSL Padlock and https instead of http, and it has been verified by VeriSign or some certificate issuing company. Furthermore, don't go accepting fake certificates or certificates that haven't been approved. If your browser, detects that something is not right with the certificate leave the website immediately. On the other hand, if you have to access sensitive information on hostile networks, you might want to use SSH instead of SSL. Not saying that SSL is NOT secure but it could fall victim for SSLStrip.
  11. Infiltrator

    Vpn Security

    SSL replay attacks can occur but very rarely. You can safely use SSL VPN with no concerns that an attacker will attack you. In addition, for a SSL replay attack to occur the server has to be compromised by the attacker. "If the server uses the same nonce (called "server_random" in the SSL/TLS specification) and the same session ID than for a previous handshake, then an attacker can send the exact same packets than what the client sent during that previous session, and the server will accept the whole thing. At least if the server uses a RSA key exchange cipher suite (which is the most common case). This can easily be seen by following how the various cryptographic elements are computed. The ClientKeyExchange message contains the pre-master-secret, encrypted with the server public key; that packet can be replayed and is still a properly encrypted version of the same pre-master-secret. The encryption and MAC keys are then derived from the pre-master-secret, the client_random and the server_random, through the SSL/TLS "PRF" which is deterministic. Thus, if the randoms are unchanged (i.e. if the server uses the same server_random than previously, and the attacker sends the same ClientHello message than during the previous session) and the pre-master-secret is also unchanged, then the server will infer the same symmetric keys and will thus accept the captured encrypted packets as being genuine. The attacker doing the replay would not gain any extra insight as to what the application data could look like; the attack is not a decrypting attack. But from the server point of view, this would look like a second genuine, voluntary connection. For a SSL connection used for a HTTPS POST request for a credit card payment, this would mean a double payment." Source: http://security.stackexchange.com/questions/3664/ssl-replay-attack-when-client-server-random-is-missing
  12. It would be very difficult for someone to compromise your virtual machines. They will have to be completely exposed to the Internet. Furthermore, I hardly keep my virtual machines updated and the only protection they have is Avast (antivirus). Never had problems with virus infection, and to be frank I open all sorts of files on my VMs. Avast is certainly doing a good job. Moreover, it all depends on how/what you use your VMs for. For instance my VMs are only used for downloading torrents and nothing else. Now if you are using your VM for hosting servers then I can see the need for keeping them updated. However, there is a way to maintain your server and VMs isolated but updated. What you could do is, have it connect to the Internet for updating only and to isolate them have the server connected to a router that isn't hooked up to the modem.
  13. A couple of things I found: 1) Make sure the pins on the CPU aren't bent and they are properly inserted on the socket. 2) Check for BIOS updates 3) I read this on another forum, but different CPU voltages can also lead to "CPU mismatch". Might want to check this out too.
  14. That's what makes this program so dangerous, they may not be harmful at all but once running it could download spyware or other type of malware into your computer and getting rid of it can be difficult sometimes.
  15. Sounds good, any issues let me know.
  16. Personally I would buy a Qnap NAS, it has plenty of features and has a good reputation too. However if budget is an issue, you should be just fine with Freenas. Here is a list of compatible hardware. http://www.freebsd.org/releases/8.2R/hardware.html
  17. Did some research on that "couponprinter-exe" file but couldn't find much information on whether its a malware or not. Virustotal, has reported no infection whatsoever. http://www.virustotal.com/file-scan/report.html?id=a8a7f0e587402a8d2f84e02e6080f8d9c40ddcf69a87ae2679feebd12a2e10dc-1303233401 If you are not sure, and need to open that file in a safe way, use VMware workstation to create a virtual machine.
  18. Have you tried powering it up with one CPU only, to see if that works? Also is there any dual CPU booting settings in the bios?
  19. Look at the error log files it should give you more clues as to why the server is getting internal error.
  20. It doesn't look like spam to me, as a matter of fact I've also posted a thread on Anonymous on a different matter, so it should be OK.
  21. They are definitely young people, aged at their 20's I'd say. Even the person representing "The Anonymous group" in the interview video above, sounded like he was around his 20's. Furthermore, hacking from home its something that everyone should refrain from doing, its really a terrible idea and I've seen a lot of wanna be script kiddies getting arrested from their homes by the feds.
  22. I would definitely recommend Eclipse, that's what I used at my Java programming class when I went to UNI before.
  23. I'd say they are probably trying to cause some deviation, by slowing down the authorities so they won't get caught too soon.
  24. Did you try exploiting it from within your network or outside?
×
×
  • Create New...