Jump to content

joker

Active Members
  • Posts

    14
  • Joined

  • Last visited

Recent Profile Visitors

2,212 profile views

joker's Achievements

Newbie

Newbie (1/14)

  1. joker

    MAKStripe USB

    I seen that repo before many years ago. The hardware and software is advertised to read and write, so I would not need anything custom. I have seen some security experts use it, so I know it worked for them and not me. A few weeks ago I got a quick response on sending payment details, now they are mia. It seems like a scam to me. I took a look at the chips inside the enclosure and they were etched out
  2. joker

    MAKStripe USB

    Hello, I recently purchased a MAKStripe USB magnetic stripe card writer/encoder. I need a little help getting the device to erase and write cards.The forum section from official website is not working. Also their phone number is invalid too. I have emailed them multiple times. Does anyone have this hardware because I tried it on Windows and Mac and it only reads cards and does not write.
  3. Thanks I do like the regular method, but when your dealing in a restrictive environment its a must
  4. How can you launch the create shortcut without using the context menu?
  5. all network printers that have port 9100 will support PJL to change display the command is: @PJL RDYMSG DISPLAY = "message" [<CR>]<LF> if that does not work then try @PJL JOB DISPLAY = "message" [<CR>]<LF> this command will change display and make the printer go offline @PJL OPMSG DISPLAY = "message" [<CR>]<LF> to use just telnet to the port
  6. google search: site:pastebin.com reward= looks like dumps from some sniffer that runs on network interfaces passwords are encoded
  7. i found a dell manual which shows a few pjl commands: http://search.dell.com/results.aspx?s=gen&c=us&l=en&cs=&k=pjl+commands&cat=sup&x=0&y=0 PJL manual: http://h20000.www2.hp.com/bc/docs/support/SupportManual/bpl13208/bpl13208.pdf
  8. I read about the HP network printer hacks, but I have come across many Dell network printers and I want to test out how vulnerable they are. To start things off, I performed a port scan: Not shown: 971 closed ports PORT STATE SERVICE 21/tcp open ftp 79/tcp open finger 80/tcp open http 161/tcp filtered snmp 179/tcp filtered bgp 515/tcp open printer 631/tcp open ipp 1022/tcp filtered unknown 1035/tcp filtered multidropper 1057/tcp filtered unknown 1126/tcp filtered unknown 1213/tcp filtered unknown 1233/tcp filtered unknown 1862/tcp filtered unknown 3878/tcp filtered unknown 5000/tcp open upnp 5001/tcp open commplex-link 5004/tcp filtered unknown 5566/tcp filtered unknown 8000/tcp open http-alt 8099/tcp filtered unknown 9000/tcp open cslistener 9100/tcp open jetdirect 9200/tcp open wap-wsp 9500/tcp open unknown 9595/tcp filtered pds 10000/tcp open snet-sensor-mgmt 27356/tcp filtered unknown 49161/tcp filtered unknown I have to figure out how to change the lcd display. I wonder if there are PJL commands Any Ideas?
  9. in grub2 map was replaced with drivemap I tried: menuentry "Windows 7 Recovery Disc 32bit" { loopback loop /boot/iso/w7repairdisc-32bit.iso set root=(loop) chainloader (loop) }
  10. I have just recently tested out hostapd-0.7.3 with the karma patch, and it seems to be working fine. But what about an encrypted network? Could karma connect with a known network request with WPA or WEP encryption enabled?
  11. [*] WARNING! The following modules could not be loaded! /pentest/exploits/framework3/modules/auxiliary/digininja/dhcp_exhaustion /exhaust.rb: /pentest/exploits/framework3/modules/auxiliary/digininja/dhcp_exhau stion/exhaust.rb: MissingSourceFile /usr/lib/ruby/1.8/rubygems/custom_require.rb :27:in `gem_original_require': no such file to load -- lib/dhcp o 8 o o 8 8 8 ooYoYo. .oPYo. o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8 o8P 8' 8 8 8oooo8 8 .oooo8 Yb.. 8 8 8 8 8 8 8 8 8 8 8. 8 8 8 'Yb. 8 8 8 8 8 8 8 8 8 8 `Yooo' 8 `YooP8 `YooP' 8YooP' 8 `YooP' 8 8 ..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..: ::::::::::::::::::::::::::::::::::8::::::::::::::::::::::: :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: =[ metasploit v3.4.0-dev [core:3.4 api:1.0] + -- --=[ 550 exploits - 263 auxiliary + -- --=[ 208 payloads - 23 encoders - 8 nops =[ svn r9286 updated today (2010.05.11)
  12. no its all there i checked, in ruby 1.9.1 it just gave error when running (run) but now in 1.9.2 it cant even load what can i do to make it more verbose
  13. [*] WARNING! The following modules could not be loaded! /opt/metasploit3/msf3/modules/auxiliary/digininja/dhcp_exhaustion/exhaust.rb: /opt/metasploit3/msf3/modules/auxiliary/digininja/dhcp_exhaustion/exhaust.rb: MissingSourceFile no such file to load -- lib/dhcp _ _ _ _ | | | | (_) | _ __ ___ ___| |_ __ _ ___ _ __ | | ___ _| |_ | '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __| | | | | | | __/ || (_| \__ \ |_) | | (_) | | |_ |_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__| | | |_| =[ metasploit v3.4.0-dev [core:3.4 api:1.0] + -- --=[ 546 exploits - 260 auxiliary + -- --=[ 208 payloads - 23 encoders - 8 nops =[ svn r9185 updated today (2010.05.01) msf > u said DHCP attack won't work under Ruby 1.9 but i am running ruby 1.9.2dev (2010-05-01 trunk 27570) so thats above 1.9
×
×
  • Create New...