joker
Active Members-
Posts
14 -
Joined
-
Last visited
Everything posted by joker
-
I seen that repo before many years ago. The hardware and software is advertised to read and write, so I would not need anything custom. I have seen some security experts use it, so I know it worked for them and not me. A few weeks ago I got a quick response on sending payment details, now they are mia. It seems like a scam to me. I took a look at the chips inside the enclosure and they were etched out
-
Hello, I recently purchased a MAKStripe USB magnetic stripe card writer/encoder. I need a little help getting the device to erase and write cards.The forum section from official website is not working. Also their phone number is invalid too. I have emailed them multiple times. Does anyone have this hardware because I tried it on Windows and Mac and it only reads cards and does not write.
-
Thanks I do like the regular method, but when your dealing in a restrictive environment its a must
-
How can you launch the create shortcut without using the context menu?
-
all network printers that have port 9100 will support PJL to change display the command is: @PJL RDYMSG DISPLAY = "message" [<CR>]<LF> if that does not work then try @PJL JOB DISPLAY = "message" [<CR>]<LF> this command will change display and make the printer go offline @PJL OPMSG DISPLAY = "message" [<CR>]<LF> to use just telnet to the port
-
google search: site:pastebin.com reward= looks like dumps from some sniffer that runs on network interfaces passwords are encoded
-
i found a dell manual which shows a few pjl commands: http://search.dell.com/results.aspx?s=gen&c=us&l=en&cs=&k=pjl+commands&cat=sup&x=0&y=0 PJL manual: http://h20000.www2.hp.com/bc/docs/support/SupportManual/bpl13208/bpl13208.pdf
-
I read about the HP network printer hacks, but I have come across many Dell network printers and I want to test out how vulnerable they are. To start things off, I performed a port scan: Not shown: 971 closed ports PORT STATE SERVICE 21/tcp open ftp 79/tcp open finger 80/tcp open http 161/tcp filtered snmp 179/tcp filtered bgp 515/tcp open printer 631/tcp open ipp 1022/tcp filtered unknown 1035/tcp filtered multidropper 1057/tcp filtered unknown 1126/tcp filtered unknown 1213/tcp filtered unknown 1233/tcp filtered unknown 1862/tcp filtered unknown 3878/tcp filtered unknown 5000/tcp open upnp 5001/tcp open commplex-link 5004/tcp filtered unknown 5566/tcp filtered unknown 8000/tcp open http-alt 8099/tcp filtered unknown 9000/tcp open cslistener 9100/tcp open jetdirect 9200/tcp open wap-wsp 9500/tcp open unknown 9595/tcp filtered pds 10000/tcp open snet-sensor-mgmt 27356/tcp filtered unknown 49161/tcp filtered unknown I have to figure out how to change the lcd display. I wonder if there are PJL commands Any Ideas?
-
How to add XP / Vista / Windows install iso to GRUB2 multiboot?
joker replied to deafsquad's topic in USB Multipass
in grub2 map was replaced with drivemap I tried: menuentry "Windows 7 Recovery Disc 32bit" { loopback loop /boot/iso/w7repairdisc-32bit.iso set root=(loop) chainloader (loop) } -
I have just recently tested out hostapd-0.7.3 with the karma patch, and it seems to be working fine. But what about an encrypted network? Could karma connect with a known network request with WPA or WEP encryption enabled?
-
[*] WARNING! The following modules could not be loaded! /pentest/exploits/framework3/modules/auxiliary/digininja/dhcp_exhaustion /exhaust.rb: /pentest/exploits/framework3/modules/auxiliary/digininja/dhcp_exhau stion/exhaust.rb: MissingSourceFile /usr/lib/ruby/1.8/rubygems/custom_require.rb :27:in `gem_original_require': no such file to load -- lib/dhcp o 8 o o 8 8 8 ooYoYo. .oPYo. o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8 o8P 8' 8 8 8oooo8 8 .oooo8 Yb.. 8 8 8 8 8 8 8 8 8 8 8. 8 8 8 'Yb. 8 8 8 8 8 8 8 8 8 8 `Yooo' 8 `YooP8 `YooP' 8YooP' 8 `YooP' 8 8 ..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..: ::::::::::::::::::::::::::::::::::8::::::::::::::::::::::: :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: =[ metasploit v3.4.0-dev [core:3.4 api:1.0] + -- --=[ 550 exploits - 263 auxiliary + -- --=[ 208 payloads - 23 encoders - 8 nops =[ svn r9286 updated today (2010.05.11)
-
no its all there i checked, in ruby 1.9.1 it just gave error when running (run) but now in 1.9.2 it cant even load what can i do to make it more verbose
-
[*] WARNING! The following modules could not be loaded! /opt/metasploit3/msf3/modules/auxiliary/digininja/dhcp_exhaustion/exhaust.rb: /opt/metasploit3/msf3/modules/auxiliary/digininja/dhcp_exhaustion/exhaust.rb: MissingSourceFile no such file to load -- lib/dhcp _ _ _ _ | | | | (_) | _ __ ___ ___| |_ __ _ ___ _ __ | | ___ _| |_ | '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __| | | | | | | __/ || (_| \__ \ |_) | | (_) | | |_ |_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__| | | |_| =[ metasploit v3.4.0-dev [core:3.4 api:1.0] + -- --=[ 546 exploits - 260 auxiliary + -- --=[ 208 payloads - 23 encoders - 8 nops =[ svn r9185 updated today (2010.05.01) msf > u said DHCP attack won't work under Ruby 1.9 but i am running ruby 1.9.2dev (2010-05-01 trunk 27570) so thats above 1.9