Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. Haven't given much thoughts to Konboot, but I guess it does exactly what I want to achieve. Thanks for tip tough.
  2. i would do exactly what Jarmo suggested, set up your own proxy server with Apache, SSL and PHProxy or Glype. And use it to bypass any blocked website you want. Now when you used SSH did you create a dynamic sock or port? If you are not sure, what I mean watch this hak5 segment. http://www.hak5.org/episodes/episode-614
  3. Wardriving is basically a process in which involves you driving around in your car searching for open/closed wireless networks. I would highly recommend you not to do anything illegal, such as trying to break into peoples wireless. This will not only result them getting mad at you, but will also result in you going to jail as well. If you want to learn more about wardriving check out this wikipeadia link, it should give you more information on what it is. http://en.wikipedia.org/wiki/Wardriving
  4. If I were you I would just buy a speaker that has optical input in it, because of the conversion from going optical to composite you are already loosing some audio quality. But if you still want to go down this path, you could buy this optical to rca converter. http://cgi.ebay.com.au/Digital-Optical-Coax-Analog-RCA-Audio-Converter-/130476744791?pt=AU_Electronics_Accessories_Wires_Cables&hash=item1e61052057#ht_3418wt_911 Hope this helps.
  5. This project was never really published, but was part of one of my universities subjects, I did back several years ago. It basically involved building a CMS for a hotel resort website that, at the time it only had static webpages and the hotel management wanted a way to alter the contents and layout of the website from an easy to administer web-based interface. So I basically build the content management system, from scratch using PHP, CSS, HTML and MySQL for storing the website contents. That's pretty much what the whole project was about. I will try to locate the files and have them uploaded to my webserver, so I can then show it off to you guys.
  6. Ophcrarck has limitations and it may not always be effective for cracking passwords, NT offline password is only good for resetting passwords, not creating accounts. Reason being, I am exploring other alternatives, to gain easy access to a machine, without the aid of password reset/recovering tools. What do you think?
  7. I personally don't like over-clocking my machines, I never change any settings unless I have to. Since I don't over-clock, all settings are pretty much left as standard.
  8. Umm, I thought with Linux you could achieve almost anything. But that's not case. But I guess certain things are not practical. Do you guys know any other way to achieve that? I guess I could use Metasploit.
  9. I read through that thread and have to say what a pain. I guess I am not going to bye that board after all, i might stick with Asus never had any issues with theirs.
  10. Hi, Has anyone ever attempted creating a Windows user account, using any Linux Live distribution CD. I'm just doing some experiments in my lab and wanted to know if that's possible at all. I know it may be possible, but I am not certain how to achieve that. Any comments or suggestion will be very much appreciated. Thank you in advance.
  11. I can't tell where the error is, but somewhere along the lines of code, you must've missed something important.
  12. I always try to maintain my resume current. Whenever I do a training or certification, I always put that down on my resume and always keep a copy safe on my HDD just in case I need it.
  13. The only reason Darren makes a great pitch for GoToAssist, is because they sponsor the Hak5 Show. If they didn't, I don't think Darren would care at all.
  14. Could a script be written to prevent the browser from looking up a particular dns record?
  15. Where did you download the script from?
  16. I would recommend this tool to anyone who wants to crack MD5 or NTLM hashes. Great tool, I am getting an average of 258 m/s attempts on my Nvidia GTX 260.
  17. I know of a few consumer based routers, like Dlink, Netgear or Cisco that supports IPv6 out of the box. Can't remember from the top of head which ones but can find out. Furthermode, its only a matter of time until they release new firmwares that support IPV6.
  18. I work for an IT company that, provides on site support for police and all the other GOV agencies. Anyway, I've seen worse they write all their passwords on a stickynote and place them on the monitor itself. Ohh dude they must be really secure, no one will ever know what their password is "Sarcasm"
  19. If you are using cisco routers, you can achieve what digip stated above. http://www.cisco.com/en/US/tech/tk872/technologies_configuration_example09186a00800b49a5.shtml
  20. Hydra is quite good, for http brute forcing. Used it many times for pen-testing my network. Now on a side note, make sure you have a very long dictionary file.
  21. I'd same the same thing, it is fairly safe to use, at home I use WP2 and a very long phrase with special characters. Now if you want to make it more challenging for someone across the street, you could use WP2-Enterprise which uses a Radius system for a second authentication.
  22. I'd still use OpenVPN its great, easy to implement and most of all easy to use. However, if you still want to use IPSEC, there is a linux distro called openSwan http://www.openswan.org/
  23. I checked the other Linux Firewall distros too and unfortunately none of them supports IPV6 as of it. As for now, I am very happy with IPv4 in my network and NAT is doing a great job.
  24. That is great news, thank you guys very much.
  25. I've got all the episodes starting from episode 3 onwards. I'm still in the process of compiling 1 and 2.
×
×
  • Create New...