joker
-
Posts
14 -
Joined
-
Last visited
Posts posted by joker
-
-
Hello,
I recently purchased a MAKStripe USB magnetic stripe card writer/encoder. I need a little help getting the device to erase and write cards.The forum section from official website is not working. Also their phone number is invalid too. I have emailed them multiple times. Does anyone have this hardware because I tried it on Windows and Mac and it only reads cards and does not write.
-
Thanks
I do like the regular method, but when your dealing in a restrictive environment its a must
-
How can you launch the create shortcut without using the context menu?
-
all network printers that have port 9100 will support PJL
to change display the command is:
@PJL RDYMSG DISPLAY = "message" [<CR>]<LF>
if that does not work then try
@PJL JOB DISPLAY = "message" [<CR>]<LF>
this command will change display and make the printer go offline
@PJL OPMSG DISPLAY = "message" [<CR>]<LF>
to use just telnet to the port
-
google search:
site:pastebin.com reward=
looks like dumps from some sniffer that runs on network interfaces
passwords are encoded
-
According to this text, this Dell printer supports post script drivers, which supports PJL
http://en.community.dell.com/support-forums/peripherals/f/3528/t/16934383.aspx
i found a dell manual which shows a few pjl commands:
http://search.dell.com/results.aspx?s=gen&c=us&l=en&cs=&k=pjl+commands&cat=sup&x=0&y=0
PJL manual:
http://h20000.www2.hp.com/bc/docs/support/SupportManual/bpl13208/bpl13208.pdf
-
I read about the HP network printer hacks, but I have come across many Dell network printers and I want to test out how vulnerable they are.
To start things off, I performed a port scan:
Not shown: 971 closed ports
PORT STATE SERVICE
21/tcp open ftp
79/tcp open finger
80/tcp open http
161/tcp filtered snmp
179/tcp filtered bgp
515/tcp open printer
631/tcp open ipp
1022/tcp filtered unknown
1035/tcp filtered multidropper
1057/tcp filtered unknown
1126/tcp filtered unknown
1213/tcp filtered unknown
1233/tcp filtered unknown
1862/tcp filtered unknown
3878/tcp filtered unknown
5000/tcp open upnp
5001/tcp open commplex-link
5004/tcp filtered unknown
5566/tcp filtered unknown
8000/tcp open http-alt
8099/tcp filtered unknown
9000/tcp open cslistener
9100/tcp open jetdirect
9200/tcp open wap-wsp
9500/tcp open unknown
9595/tcp filtered pds
10000/tcp open snet-sensor-mgmt
27356/tcp filtered unknown
49161/tcp filtered unknown
I have to figure out how to change the lcd display.
I wonder if there are PJL commands
Any Ideas?
-
i'd like to add windows install isos to grub2 multiboot, i found an entry how to do it with grub-legacy and windows 7
<a href="http://hak5.org/forums/index.php?showtopic=13922" target="_blank">http://hak5.org/forums/index.php?showtopic=13922</a>
<div class='codetop'>CODE</div><div class='codemain' style='height:200px;white-space:pre;overflow:auto'>title Windows 7
map (hd0,0)/win7.iso (hd32)
map --hook
chainloader (hd32)</div>
How to add an extracted winpe is described in this Project, but i want to boot the installation isos directly if possible?
in grub2 map was replaced with drivemap
I tried:
menuentry "Windows 7 Recovery Disc 32bit" {
loopback loop /boot/iso/w7repairdisc-32bit.iso
set root=(loop)
chainloader (loop)
}
-
I have just recently tested out hostapd-0.7.3 with the karma patch, and it seems to be working fine.
But what about an encrypted network?
Could karma connect with a known network request with WPA or WEP encryption enabled?
-
[*] WARNING! The following modules could not be loaded!
/pentest/exploits/framework3/modules/auxiliary/digininja/dhcp_exhaustion
/exhaust.rb: /pentest/exploits/framework3/modules/auxiliary/digininja/dhcp_exhau
stion/exhaust.rb: MissingSourceFile /usr/lib/ruby/1.8/rubygems/custom_require.rb
:27:in `gem_original_require': no such file to load -- lib/dhcp
o 8 o o
8 8 8
ooYoYo. .oPYo. o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8 o8P
8' 8 8 8oooo8 8 .oooo8 Yb.. 8 8 8 8 8 8 8
8 8 8 8. 8 8 8 'Yb. 8 8 8 8 8 8 8
8 8 8 `Yooo' 8 `YooP8 `YooP' 8YooP' 8 `YooP' 8 8
..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..:
::::::::::::::::::::::::::::::::::8:::::::::::::::::::::::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
=[ metasploit v3.4.0-dev [core:3.4 api:1.0]
+ -- --=[ 550 exploits - 263 auxiliary
+ -- --=[ 208 payloads - 23 encoders - 8 nops
=[ svn r9286 updated today (2010.05.11)
-
The error message looks like you didn't unpack the tarball correctly so the module can't find the library it needs.
Running under 1.9 means running with or in not greater/less than
no its all there i checked, in ruby 1.9.1 it just gave error when running (run) but now in 1.9.2 it cant even load
what can i do to make it more verbose
-
[*] WARNING! The following modules could not be loaded!
/opt/metasploit3/msf3/modules/auxiliary/digininja/dhcp_exhaustion/exhaust.rb: /opt/metasploit3/msf3/modules/auxiliary/digininja/dhcp_exhaustion/exhaust.rb: MissingSourceFile no such file to load -- lib/dhcp
_ _ _ _
| | | | (_) |
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ _| |_
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __|
| | | | | | __/ || (_| \__ \ |_) | | (_) | | |_
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__|
| |
|_|
=[ metasploit v3.4.0-dev [core:3.4 api:1.0]
+ -- --=[ 546 exploits - 260 auxiliary
+ -- --=[ 208 payloads - 23 encoders - 8 nops
=[ svn r9185 updated today (2010.05.01)
msf >
u said DHCP attack won't work under Ruby 1.9
but i am running ruby 1.9.2dev (2010-05-01 trunk 27570)
so thats above 1.9
MAKStripe USB
in Security
Posted · Edited by joker
I seen that repo before many years ago. The hardware and software is advertised to read and write, so I would not need anything custom. I have seen some security experts use it, so I know it worked for them and not me. A few weeks ago I got a quick response on sending payment details, now they are mia. It seems like a scam to me. I took a look at the chips inside the enclosure and they were etched out