Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. At its current version, PFsense does not support IPV6. They are planning to support it, on the next version. http://doc.pfsense.org/index.php/Is_there_IPv6_support_available
  2. Thanks Digip for the response, but yeah that's the link I've been trying to download the tool from and had no luck. Every time I try to download the tool, I receive error 403 forbidden. I even signed up with them, to see if it was something to do with the access level to the website, but didn't make any difference. Plus they still haven't replied back to message I posted on their forums, and I've tried downloading the tool from alternate links like sourceforge.net but no luck. I have a feeling that, they know what the problem is, but doesn't want to say so. But I could be wrong.
  3. Are you trying to pull a trick on someone or on a network?
  4. Is there any member in the Hak5 community, that is also a member of these forums http://www.cryptohaze.com/forum/index.php
  5. Hi Guys, Does anyone know of an alternate URL to Cuda Multiforcer / Cryptohaze Multiforcer. Reason being, I've been trying to download it directly from the its website but I am getting some forbidden error. Even sent them an email advising, but still haven't heard back or has the issue been rectified. I've tried other places as well, like sourceforge.net but no luck. Anyway, your response will be very much appreciated. Thank you very much
  6. The router i have is really crap, that's why I bought a linksysByCisco WAG320N modem/router.
  7. Hey Rufus777, Take a look at this tutorial, it should be able to assist you with your issue http://hamster.erratasec.com/help/index.html
  8. I never used VeriSign before, plus GPG is pretty good and secure too. "PGP supports message authentication and integrity checking. The latter is used to detect whether a message has been altered since it was completed (the message integrity property), and the former to determine whether it was actually sent by the person/entity claimed to be the sender (a digital signature). In PGP, these are used by default in conjunction with encryption, but can be applied to the plaintext as well. The sender uses PGP to create a digital signature for the message with either the RSA or DSA signature algorithms. To do so, PGP computes a hash (also called a message digest) from the plaintext, and then creates the digital signature from that hash using the sender's private key." http://en.wikipedia.org/wiki/Pretty_Good_Privacy#Digital_signatures
  9. I've never heard of this kind servers, unless they have been infected or hacked then yes, its very possible.
  10. Having your own knowledge base database, its not bad but you got to have experience at hands as well. You can't always rely on this kind of system. In IT it doesn't always work like that, you go to be efficient and experienced.
  11. She isn't that bad, but I know there are better ones out
  12. 1) Frankenstein 2) The Lost World 3) 20,000 Leagues Under the Sea
  13. Having said that, the moment you see your browser displaying an SSL Certificate warning, you should think twice before clicking on the link "Continue on anyway". Check the security certificate and make sure its a legit one, by reading what's one it, if you see anything that does not match to the website you are vising. Leave the site immediately or don't proceed at all.
  14. Yes I am aware of that part and I never really exploited my own machines accidentally. I am very cautions when I am performing pen testing on my network. I make a list of the machines I want to exploit.
  15. Very true, I remember before when I was shopping around for my first motherboard and came across the Asus Extreme Striker. At the time, everyone was complaining that, it was an awful board and was giving them a lot of headaches. Well for me was love at first sight, did not encounter any problems at all. Plugged in all the essentials and there it went, it booted up with no issues at all. And I am still using it to date and it has been running with no issues since then.
  16. Is there a lot of people, having issues with this board besides yourself. I mean I was going to buy one of them, Gigabyte x58a-ud3r for my next build
  17. 1) My network VM adapters are all set to bridged mode, reason being so they can get an IP address directly from my DHCP server. 2) Each VM should have its own virtual drive, so create your first VM install whatever OS you want and then move onto the next one. 3) Or you can copy your first VM virtual drive, rename it and use it for the second VM, so it saves you time 4) And last, correct just boot them off and have fun. Hope this helps.
  18. Dude I wish my next girlfriend is like her.
  19. Dude that is awesome, why use .net when java offers you a lot more. And that is so true.
  20. Amazing article, now who is to blame the SSD Firmware or the manufactures.
  21. Forensic analysis of drives by investigators now uncertain By John E Dunn | Techworld Published: 10:48 GMT, 01 March 11 A technology built into many new solid state drives (SSDs) to improve their storage efficiency could inadvertently be making forensic analysis at a later date by police forces and intelligence agencies almost impossible to carry out to legally safe standards, researchers have discovered. The detailed findings contained in Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Discovery? by Graeme B. Bell and Richard Boddington of Murdoch University in Perth, Australia, will make unsettling reading for professionals in the digital forensics field and beyond. After conducting a series of experiments comparing a sample Corsair 64GB SSD with a conventional Hitachi 80GB magnetic hard drive (HDD), the team found a layer cake of data recovery problems caused by the ‘garbage collection’ or purging algorithms used in SSDs to keep them at peak performance. After examining an SSD for traces of data after it had been quick formatted, the team expected the purging routines to kick in around 30-60 minutes later, a process that must happen on SSDs before new data can be written to those blocks. To their surprise, this happened in only three minutes, after which only 1,064 out of 316,666 evidence files were recoverable from the drive. Going a stage further, they removed the drive from the PC and connected a ‘write blocker’, a piece of hardware designed to isolate the drive and stop any purging of its contents. Incredibly, after leaving this attached for only 20 minutes, almost 19 percent of its files had been wiped for good, a process the researchers put down the ability of SSDs to initiate certain routines independent of a computer. For comparison, on the equivalent hard drive all data was recoverable, regardless of the time elapsed, as a forensic examiner would expect. “Even in the absence of computer instructions, a modern solid-state storage device can permanently destroy evidence to a quite remarkable degree, during a short space of time, in a manner that a magnetic hard drive would not,” the team concludes. The results are concerning on a number of levels, forensic, legal and technical. Current digital forensic practice rests on assumptions about the ability of experts to isolate and snapshot drives accurately in order to back up possible criminal investigations. This is now looking to be far more difficult for SSDs than it has been for HDDs using current technologies. Even more startling is that basic drive isolation ‘write blockers’ are not guaranteed to perform to high standards against SSDs, the first time this technology has ever been experimentally undermined. The firmware built into many and possibly all of these drives allows them to destroy data simply by being powered on, even when not connected to a PC or under the apparent control of an operating system. “If the drive is purging data far faster than the analyst can extract it, and the process of purging can begin and continue while the analyst is extracting the data, how can the analyst hope to capture a complete, frozen image of the disk that is representative of the disk state at capture time?,” the researchers write. “A few people in the forensics community had some awareness that something funny was going on with some SSDs, but almost everyone we've shown this to has been shocked at the extent of the findings,” said co-author Graeme Bell by email to Techworld. As far as SSDs are concerned, the state of the drive cannot be taken to indicate that its owner did or did not interact with it in ways that allow prosecutors to infer guilt or innocence. "The fact that data has been purged does not mean that a human knowingly tried to destroy evidence (e.g. 'accidentally appearing guilty'). [but] SSD data purging can destroy the evidence needed to demonstrate guilt (e.g. accidentally seeming innocent)," says Bell. The team warns that as USB sticks grow in capacity, manufacturers could start integrating similar purging technologies into them, duplicating the same problem for a second set of storage media. Bell and Boddington also believe that ‘garbage collection’ routines will become more aggressive over time as manufacturers start using more powerful firmware, chipsets and larger-capacity drives. In an 18-point summary of their findings, the pair offer no simple fixes to the problem they are the first to experimentally demonstrate, noting that “there is no simple answer to this problem.” How many SSDs might use 'garbage collection' firmware? According to Bell, probably very few older drives but an increasing number of newer ones. Previously only published in The Journal of Digital Forensics, Security and Law in December 2010, the full report can now be downloaded from the publication’s website. Paradoxically, only last week researchers in California uncovered a separate but related problem with SSDs, namely that it could be hard to securely wipe data from them in a guaranteed, controlled way. Although at first it sounds as if this finding contradicts the Australian research (i.e that data is constantly being wiped by SSDs in order to maintain performance), it is more concerned with the difficulty of guaranteeing that data has really been erased from the portion of the drive it is located on from the point of view of software erase programs. Source: http://news.techworld.com/security/3263093/ssd-fimware-destroys-digital-evidence-researchers-find/
  22. My current PC is running with a 860 watt power supply and an EVGA GTX 260 graphics card. The interesting part is that when it was first released, a lot of hardware reviewers found this type of series to run very hot and consume a lot of electricity, compared to former generations. While I find that true, I never ran into any issues with the power supply not being able to handle it. Point being, try upgrading your powers supply to high wattage capacity one. That should fix the problem if not than your motherboard has issues.
  23. That only issue I found was that, the software only seem compatible with SpeedTouch routers. I have a netcomm NB6 ADSL2+ Modem/router.
  24. ^^^ Was going to ask that, the size of the power supply, as well as make sure all the cables are connected firmly. 1) Since you are using 6gigs of ram, I would suggest to try out 1 or 2 gigs of ram first. To see if that has any affect at all. 2) Disconnected all the cables and only connect the important ones. Motherboard, hard drive and Graphics card and then try again 3) Make sure the CPU fan is sitting atop the CPU properly. Give the above a try, and see if that makes any difference.
  25. Here is a direct link to Irongeeks, how to hack printers http://www.irongeek.com/i.php?page=security/networkprinterhacking
×
×
  • Create New...