Jump to content

Sparda

Dedicated Members
  • Posts

    7,832
  • Joined

  • Last visited

  • Days Won

    9

Everything posted by Sparda

  1. Couldn't you edit the hosts file of the server so that it's own IP address points to another IP address some where else (asuming packets don't say they are from 127.0.0.1), so that when the ping requests comin, the server insted of trying to send a replie to it's self it sends it some where else, prefrably to a specific computer on the LAN so that 1. It doesn't hog any more internet band width 2. the server doesn't waste time trying to send the packets to an address that does not exsist, but I see no way for you to stop packets to be claiming to be from another IP address that is not it's own.
  2. This is almost off topic... Who here dosn't have NoScript installed? Firefox + NoScript = about as secure a web browser can get. I say this becasue that exploit makes use of JavaScript.
  3. probalby the easist way to get access to the file is to use some kind of hardware keylogger, at least thats what i would have done, braking in to a system isn't just related to software stuff, if the hardware is comprimised, you may as well have no software security at all.
  4. Depends on whats happening, I would not kill (out of choice) for greed or to get some thing I wanted. I may consider, how ever, killing to save my life or lives of others depending on the saveraty of the situation.
  5. If you guess at a number coded door (electronic of course) does that mean you can be arrested on the spot?
  6. Egnoring the legal, EULA and any other non technical issuess with this. If you cannot access the drive becasue of the restriction explorer imposses (rather then the NTFS permissons), just use any thing that isn't explorer to access them. I surgest firefox, becasue it's not suspisos (if you use Portable firefox on like USB flash memory that is) and it supports tabs, so you can quickly Ctrl + w if you see some one coming ;)
  7. So errrrmm... now they are raiding LAN parties, are they going to start raiding garden parties for serving food with out a health license?
  8. Wasn't there a whole thing befor the forums died about reusing dead laptop screes, and the over all result was that it would cost money to buy a controler for the screen?
  9. Is that an advertisement?
  10. You mean you want to boot Clusterknoppix on to a CD-ROM less computer that has no monitor? Easy, install clusterknoppix to USB flash memory (this can be done by booting a computer in to clusterknoppix from cd and running knx-hdinstall) then jut plug the memory stick in (since it's running server 2003 i'll asume it's a fiairly modern motherboard and can boot from USB flash memory), and tell it to boot from USB flash memory.
  11. How can you stop people setting up DHCP server and booting all the computers with what ever OS they want? I suppose you could stop it from booting from network by deafult, but thats time consuming and means you have to go to every computer.
  12. I like that 3D rendering idea. I would take it further and actualy try it... but I would almost definitly get kicked out of college and may be arrested. Thats asuming I got cought of course. There are a few unmonitored computers dotted arounbd the building, but at this stage it is definitly not worth the risk. (The wise hacker knows when to strike and when not to).
  13. Thats a good point, how some bugs/vunrabilits have been discovered is obviuse. For example the bug I discoverd (at least to my knolage i'm the only person that discoverd this) in AntiVir 6 where you could change the config file to allow the use of all the Pro edtion featurs but only with using the free version, but vunrabilitys like that vunrability in the RPC service on windows that allowed for compleate remote access. Dispite my overall understanding of computers and networks, i fail to see how poeple discover such vunrabilitys. Perhaps some one could enlighten me on this.
  14. I can't see how you have managed to get spyware on to your computer. I have never got any on my current (and one befor) instalation of windows. I of course use firefox with NoScript and adblock. Never use IE (ever). Perhaps it has some thing to do with me never downloading and running executable files. The clostest encounter I have had with spyware in my own house in recent times was when one person visited my web site and had spyware on there computer, notably distrabuted from here: http://www.funwebproducts.com/.
  15. How did you get this spyware on your computer?
  16. Today I was thinking about using 2 or 3 computers as a Beowulf cluster at college (using ClusterKnoppix). Which i'm sure no one would have any thing agesnt providing no one wanted to use the computers at the time (obviusly i would ask for permisson). I can't set up a beowulf cluster at home becasue well... I don't have the hardware, I have 1 (out of 6) computer that will successfuly boot from LAN. After a while of thinking about it, i realised this is an awfull idea, becasue it would mean that any and all computers turned on after I set up the master (since they dfault boot from LAN) would load clusterknoppix, since the DHCP server is on a diffrent network (the trafic is routed to it) and so the master node would send the DHCP responce when a computer asked for it befor the genuine server does. This of course lead me to thinking, what could some one who genuinly wanted to malitously load all the computers on a DHCP based network with clusterkoppix do. The obviuse one would be to use all the nodes to brtue force passwords on the servers of that network. What are your thoughts of taking over a network though use of a 'rouge' DHCP server? What do you surgest one does with a Beowulf cluster of 200 or so computers?
  17. In the Mozilla Application Data directory, usualy some thing like C:Documents and settins<user name>Application DataMozilla, some thing like that, you should probably make a backup befor you delete it.
  18. Did you try removing your firefox profile?
  19. Netmeeting? pfff thats nothing, now NetOp is some thing ^^ You should remotly kill random tasks on people computers in the same room as you for a good old laugh (you know how to use the tasklist and taskkill commands rihgt?)
  20. For the sace of prosperity, I have blog this: http://sparda.hopto.org/blog/
  21. *cough* parden my language *cough* OMFG!!!!!!!!!1111!!onehundreadandeleven11!!!!! (I warned you) My crazy idea with the heating of the disk and hubbing it fucking worked xD This has to be one of the most crack pot bodges i'v ever done, and it fucking worked xD!!!!
  22. it's scratched on the transparnt plastic
  23. Like any operating system you cannot just use PHLAK, you have to want to do some thing specificly befor you can use it, for example, you can ARP poison like in that episode of Hak5, but they used Whoppix insted, but it works just as well.
×
×
  • Create New...