Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. I never disclosed confidential information about my employer to anyone, and the other day I read an article on the Computerworld website, stating that by law any employee caught disclosing company's secret or confidential information will arrested and prosecuted under the computer hacking act.
  2. "ACPI: I/O resource 0000:00:1f.3 [0x4000-0x41f] conflicts with ACPI region SMRG [0x400-0x41f]" Sounds like something is not configured properly at the raid level.
  3. If you are entering the correct domain settings than it should work. Couple of things, for troubleshooting: 1) Make sure the domain administrator account has a password set and when entering it its correct. 2) Are you able to join a virtual machine to your domain without any issues. 3) Can you ping you NAS box at all? 4) Can you access shared drives in your NAS Box from a computer on the network?
  4. Yeap, that's what my university I went to had set up, Cisco APs configured in a mesh mode, with WPA2 Enterprise and Radius Authentication.
  5. Its just a matter of deciding where to place them, on the wall side, on the ceiling, on top of the roof (this is set up the school I went to had) a plastic box where the AP was housed and a long metal pole with an antenna attached to it. The only issue was the antenna was not that strong enough, it could only broadcast its signal to 300 or 400 meters. The AP was a linksys WR54G with a flushed tomato firmware.
  6. 1) Why don't use virtualbox or vmware to set a virtual VM where you can install backtrack on it. 2) Make sure to set the interface on your VM to bridge mode, so it can get an IP address from your DHCP server, as well as be able to see other computers on the network. 3) Rather then exploiting your real machines on the network, create some virtual machines and then target them with Backtrack. That's how I set up my pen-testing lab...
  7. I did a search in the DD-WRT router database and could not find any compatible firmware for Aruba wireless APs. http://www.dd-wrt.com/site/support/router-database
  8. This is the Alfa I am getting, Alfa Network AWUS036H 1000mW 5dBi USB Adapter. It only does, B and G network I'm also getting a second one that does N network. I will be using both one for packet monitoring and the other for packet injection. Anyway, Darren uses this adapter for his wireless pen-testings.
  9. This is just a suggestion, but its up to you to you to implement or not. In order to provide a constant and reliable source of energy for the router, and not to mess around with different battery voltages. I would get x2 SLA 12 volts batteries, each can hold between 7.4 to 20 amps an hour, depending on the battery brand and would approximately weight 3 to 4 kilograms each, easy and convenient to lift and move around and offers plenty of power. Then I would connect both in series to achieve a voltage of 24v but since the router only supports 18v, I'd use a 24v to 18v converter for more information check out this website, http://www.powerstream.com/dcdc.htm. This set up should work without any glitches.
  10. Where SSH or VPN tunneling is not allowed, I would try changing the default ports, to something like port 80 or 443, if you haven't tried. Since these ports would normally be unblocked.
  11. I would the say the same, make sure the library exists in the directory where your Javascript lives and that the path to the Library in the script is correct.
  12. Reinstall Winpac and the Wireless Adapter driver if you can too.
  13. I just did a search for my name on the internet, but didn't find much info about myself. Except, which university I went to and what the score at my tennis tournament was.
  14. By Joan Goodchild May 3, 2011 11:28 AM ET CSO - In a world where we share more information online than ever before, it might seem impossible to disappear completely. But Frank Ahearn can help. A professional skip tracer for many years, he tracked down 'missing' persons for clients who were searching for them for legal or financial reasons. His arsenal included use of public records, credit reports, utility bills, criminal background checks, tax information and other revealing documents. Continue Reading......
  15. Definitely not, I will never use/trust a free proxy server for accessing sensitive information online. You never know what the owners intentions are.
  16. If you don't mind me asking, what American sites are you trying to access?
  17. Yeap, there's a video in the Securitytube website that demonstrates just that. That's something to be aware of and cautious about. If you see a wireless network with the same SSID as yours, that's a good indication that someone is trying to attack you. DO NOT connect to the wireless, report if you can and leave.
  18. What happens when you try to use an IP address from a proxy server located in the USA? If you haven't tried, Google for "Free proxy servers", that should give you a list of free proxy servers, just look for the ones that say USA. Also to make sure the ip address belongs to a server in the USA, use this website http://www.geoiptool.com/ to determine its geographical location.
  19. No, it wasn't connected to the internet. It was only redirecting the users to a fake facebook and twitter logon page and harvesting their credentials. Plus your script should work, as its trying to ping Google.com and since there is no internet connectivity, the end user should receive the warning message. "The request failed. Are you sure there aren't any pineapples lurking around"
  20. Not sure if that's gonna work, but what if the pineapple is only passively monitoring the traffic.
  21. That's one of the nice things, I really appreciate about Vivik, he really takes the time to explain what is really going on at the packet level. His tutorials have really driven me towards being more interested and focused on wireless security like never before.
  22. The default is 5 RDP sessions per users, if you want more RDP sessions, you will need to purchase more terminal server licenses.
  23. Since WEP is flawed, the attacker can capture crucial information, whether he has knowledge of the key or not. With WAP its a little bit different, but can still be done.
  24. Infiltrator

    How T

    If you are really serious about becoming a pen-tester, take up some of these Offensive Security Trainings, they will get you certified but will also give you practical experience. http://www.offensive-security.com/ And most importantly never stop practicing, without practice you will never gain the experience, and without experience you won't be able to get a job as a pen-tester, if that's what you want. You should also check out some of the videos they have on IronGeek, Hak5 and SecurityTube. They are very informative and will also give you the opportunity to research and learn more.
  25. You are absolutely correct, not required unless you want your DC to be the DHCP server. Or you plan on having your router, distributing the ip addresses via its DHCP server.
×
×
  • Create New...