Jump to content

mubix

Dedicated Members
  • Posts

    516
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by mubix

  1. http://digg.com/d1wx5Y?t

    The Offensive Security Team along with several active community members, have been working diligently to bring you an in depth course on the Metasploit Framework – “Mastering the Framework”.

    The course will be presented in the usual “Offensive Security” online format – a PDF lab Guide and a set of Flash Videos. The PDF guide along with offline labs for the MSF Unleashed course will be free of charge. We are working with Metasploit.com and Hackers for Charity to put all proceeds from this course towards feeding children in Kenya and Uganda.

  2. Nope sorry guys, I was wrong. I thought VOIP and said Skype. Skype has crazy bits of encryption from client to client so it doesn't really matter how much of the conversation you get. VoIP on the other hand is cake to do.

    Sorry for the misunderstanding.

  3. Yeah, its the same info as the show notes I think

    The easiest way is set up two hosts at DYNDNS, have them both point to your server, use a domain just as we showed and set their name servers to the DYNDNS hosts that you created.

    I don't check the forums that often, but sending email to feedback@hak5.org usually gets a quick response.

  4. My understanding of it, when i saw it at defcon is that you can edit the code on the device, and change what it displays. Any luck doing so mubix? Segment on the show perhaps?

    I am not much of a hardware hacker. So I doubt it will become a segment. But I am making a video on basic functionality.

  5. So here are some of my suggestions:

    1. Every tool that you include, check it's license as you will be distributing it.
    2. Compatibility is key. If it doesn't work on peoples hardware, they can't get to the awesome tools
    3. Decide if you are doing a LiveCD, a USB, a VM, a installable distro, or all of the above.
    4. Get help. A project this size isn't something that is easily accomplished alone
    5. As for a list of tools used, just look around some of the security forums and see what tools are being asked about their usage. Another place to look is the tools released at security conferences.

    If this is going to just be a learning experience, then may I suggest jumping into Gentoo.

    Good luck.

  6. No other volunteers?

    They record the talks anyways, and post them online. So, I think we got you covered. I will ask at the con for the video a bit early if possible of Darren's talk.

×
×
  • Create New...