Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. I pretty much agree with what Digip said, and on the other hand its sad to see great minds accomplishing nothing, by breaking the law. You know, the least they could is help out those companies with their security issues, rather than trying to steal or expose customer's confidential information.
  2. I can't seem to comprehend why a service provider like them, failed to keep a backup off site. What were they thinking? Now hundreds of customers have lost their data for negligence. If i was one of the clients, I'd already have sued them.
  3. Couple of articles to help you out bro http://www.serverwatch.com/tutorials/article.php/3779171/ssh-xfer-for-Transferring-Files.htm http://matt.ucc.asn.au/ssh-xfer/
  4. Check out Amanda, its open source and most of all very popular http://amanda.zmanda.com/
  5. That's very weird, I tried it on my Windows 7 machine and it worked. When you run the CMD.exe as administrator, does it ask you if you want to allow this program to make changes to your computer? Edit: Another thing you can try is disabling the firewall from the control panel, rather than disabling from DOS.
  6. Don't know if you tried this or not, but right click on the CMD.exe and run it as administrator. Edit: Have you already exploited the box, or are you trying to manually disable the firewall?
  7. if the victim computer you are attacking is running Windows XP, what you need to do first is 1) Escalate your privileges 2) at the console type netsh->firewall->set firewall opmode disable That should disable the firewall. The above command also works in Windows 7
  8. Most definitely, if you VPS supports SSH all you have to do is SSH into your VPS using PUTTY and tunnel all you traffic through. If you are on Linux just go to the terminal and establish a SSH connection.
  9. If you want to do a port scanning and don't want to expose your IP address, you could look into chain proxy. I could be wrong, but I believe Nmap has an option that allows you to input an IP address to make it look like the scanning is coming from another machine other than yours.
  10. This is a great example of how important backups are, for some its only a matter of time until they learn it the hard way. http://www.theregister.co.uk/2011/06/21/hacks_wipe_aus_web_and_data/
  11. Before replacing your router, I would use netstumbler or inssider as suggested by Digip. These tools should give you a clear picture of what wireless devices are operating on what frequencies or channels. I always set my wireless routers to operate on channel 11, since its less crowded and has less chances of interfering with other wireless devices.
  12. 7. You forgot to mention about nicotine and how badly they affect computers. 8. Encrypting your hard drive also reduces the chances of someone stealing your data in case it goes missing or stolen. 9. Antivirus alone will not protect your computer effectively against threats, a firewall and a regular software update should be maintained. 10. Use strong and complex password.
  13. Could you please elaborate your question, I am not sure I understood it correctly.
  14. Very nice how much did it run you?
  15. I owned a similar Linksys wireless router, it worked fine for a few days and then I could only connect to the wired connection, the wireless worked for several minutes before dropping out. In my case, I tried everything but in the end I was forced to get a replacement router to fix the issue. I even contacted Linksys and they walked me through the same troubleshooting steps I did on my own and didn't help. From what I've been reading in other forums, users have reported similar behavior, so I am guessing its a hardware issue.
  16. I instructed my parents to put through any call regarding computer stuff to me. So that way if they try to pull any tricks, they can try on me but it won't work.
  17. No problems, I overlooked his post.
  18. I know there are plenty of articles on the internet about one way or two way SSL. Though it would be nice if you could post a small how to, so that it could help other users in the future.
  19. Well, university degrees may offer a better training, but I do believe that if you want to advance your career you will need more than just a degree. Certifications are the way to move up on the ladder, plus experience of course. Most companies nowadays when hiring new staffs, they will be looking for what other qualifications you may have. I'm aiming to get my security+ certification sometime this year.
  20. Something like this, should look good for a laptop case. http://www.pelican.com/cases_detail.php?Case=1080
  21. I've never been social engineered before and what happened to me today has served as a good experience. Its something that you think will never happen to you, but thanks to all the articles and forums I've been reading I think in a way it helped me. So its very important to be aware and cautions of these kind of issues.
  22. What really put me in a defensive position, was the fact that she asked me if I had access to internet and emails. From that moment onward, I knew something about that call wasn't right. Just like any other computer savvy user I came up with a polite excuse and told her that had some issues with my internet connection. After she hung up, she never called me back.
  23. Hey guys, I would like to share with you all my just recent social engineering attack I experienced. To be honest I don't know if it was or not a social engineering attack but it was a very strange call that I refused to cooperate. Anyway, I was sitting at my computer in my room, when my dad called me to say that, there was a person on the phone calling from some random place that he didn't understand. Well I took the phone off him and immediately answered the call, asking the person on the other end where they were calling from. The person on the other end was a lady at her 30's, with an Indian accent. She then replied by saying, she represented a company by the name of "Virtual PC Doctor" that provides remote support services to end users experiencing problems with their PCs, due to virus or other malware type of infections. She then went on explaining how viruses can get into your computer without your knowledge. I then for a second stood still and listened to what she was saying and all the sudden the obvious questions started to emerge. 1) Do you have a PC? 2) Does it have access to the internet. 3) Also do you have access to email? Frankly, if I had answered yes to Q 2 and 3, it was so obvious she was going to be sending an email containing a link to some website. Furthermore, I replied to her by saying that I do have a computer, but didn't have an internet connection due to some technical problems I was experiencing. She then politely apologized for bothering me and hung up the phone. After the phone call was over, I headed over to Google to do a little bit of research on the company and came across this website, http://www.virtualpcdoctor.com/ so has this ever happened to anyone before?
  24. @Flex, I hope he doesn't use the information you gave him to commit any illegal crimes.
×
×
  • Create New...