Jump to content

nopenopenope

Active Members
  • Posts

    242
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by nopenopenope

  1. Damn it, i was going to say that lol. or just break the ones your not useing and glue in the keyboard and mouse. If your really strict on the security (for a buisness or w/e) dont have them mounted to the case, and have the keyboard and mouse attached internally. All depends on your setup and what your employee's need. I like a physical security approach over a software approach. A guy using a flash drive is alot less suspicious than a guy with bolt cutters, or digging around behind his computer.
  2. Do the network PC's have bios passwords? he could boot from linux and do anything he wants, or portable .exe's off a flash drive could allow him to escalate his privileges. Also you can get access to cmd easily simply with notepad and saving a specific file as .bat, you can also get access to cmd with paint as seen from a past hak5 episode. It really all depends on how you have 'blocked' things. Its the simple stuff that lets you get to the big stuff. He could be sniffing, dumping hashes, running exploits. You should probably just ask him. I used to do this kind of stuff all the time in high school lol.
  3. If you want to learn then this is a great source http://www.securitytube.net/ the backtrack forums are also great for basic how-to's google around for any other questions you have. If you can't fine what your looking for specifically then just post a thread somewhere. Just make sure you always google first. EDIT: also, this is where I get all my 'hacker' news and what not, not really anything to learn, but interesting stuff none the less. http://thehackernews.com/
  4. Oh ya, looking forward to this. hopefully It will work with tethering to a phone, if not ill just use the wifi hotspot on my phone and an alfa. good work darren. P.S. we need sslstrip on this thing. and possibly driftnet. no more scripts and tether with laptops, just straight up packet capturing goodness. tied with maybe a flash drive and an alfa. This will be sweet.
  5. metasploit? google. read. google again. read some more. wash. and repeat.
  6. Didn't apple already go to court and loose on this? Most of the time it will void your warrenty, but if you get it back to factory settings, they shouldn't be able to tell. just dont physically break it to the point of no restore (or break it more so they can't read the software: for phone insurance and what not)
  7. I know there is an anodoid app for steaming video's, also the revision 3 app works for that too (not sure if there is an iphone app or not) and the forums are set up for mobile view as well, so theres not really a need for an app, just make a shortcut on your home screen to the site.
  8. airmon-zc works for alot of the intel chipsets, theres a patch somewhere out that to work around this, as most (if not all) scripts implement airmon-ng and rewriting them tends to screw everything up. I tried this with gerix wifi cracker and my SSID list filled with a bunch of errors instead of AP's. Find a patch, or get a alfa, dont deal with airmon-zc.
  9. ________________________ |.........................................| |.........................................| |....Will White Hat for Beer....| |.........................................| |.........................................| -------------------------------------------
  10. I went to derbycon last year as well, it was my first con, looking forward to it again this year, hope to actually meet some people from here this year.
  11. as far as creating your own country code, if you mess up the file they're located in, you could possibly screw up all your country code. It's unlikely but I'd rather not get blamed for some thing that some one messed up, and then complaining about what ever problems happened. It worked fine for me, but somone else might have issues. And it might over heat your adapter, I haven't came across that issue, but it could happen. yes, it changes the mac address. That shouldn't cause any problems what so ever.
  12. run lsusb and see if you can find it in that list. and if you do, Sometimes its a little buggy and I have a script that a run after I connect to fix any airmon-ng start wlan0 issues or anything that starts giving you that SOCFLAGS (or what ever it is) error. #! /bin/bash rmmod rtl8187 rfkill block all rfkill unblock all modprobe rtl8187 rfkill unblock all ifconfig wlan0 up thats the basic script, just save it in a file on your desktop in the VM and run cd Desktop/ chmod +x file then(in the same location) run ./file also you can add some other things to the script (like i do) to make everything a little easier when using monitor mode and such #! /bin/bash rmmod rtl8187 rfkill block all rfkill unblock all modprobe rtl8187 rfkill unblock all iw reg set BZ #(increases TX power on all interfaces, to change back just issue 'iw reg set 00') (00 being the american country code, if your not from america you can run 'iw reg get' before you change anything) macchanger -r wlan0 #(changes the mac address to a random one) airmon-ng start wlan0 #(starts monitor mode on the interface mon0) ifconfig mon0 down #(interfaces need to be down to change mac addresses, and to change country codes, but the initial rfkills bring wlan0 down so you wont need to bring it down after that point. also changing country codes only needs to be done once for all interfaces until you reboot.) macchanger -r mon0 #(changes the monitor mode interface to a randome mac) ifconfig wlan0 up ifconfig mon0 up if you really want, you can create your own country code by fallowing this guide and increase the TX power even higher http://hacking-library.com/forum/viewtopic.php?f=36&t=284&p=550#p550 scroll down to "Override regulatory domain restrictions" (I won't help anyone with the creating the country code, if you screw something up, don't blame me, or anyone else) then just change the script above to 'iw reg set XX' This might be a little off topic for your problem, but it should help you, and others later on.
  13. I found it a bit of a joke, I never cracked any code, fired up maltego, ran some transforms on the site, and found www.canyoucrackit.co.uk/soyoudidit.asp (not to be a spoiler but ya) You would think that after entering the correct password you would get a cookie to allow only the person that entered that correct password to be able to access that portion of the site (for say a limited amount of time), but no. It was a good idea but just seemed like kind of a fail on the overall design. Why would a hacker crack a code when he finds all the information needed in the information gathering portion of his research. Its like trying to crack a WPA key for a business when they have a bill board outside with the password on it. Good idea, and cracking challenges are fun, but its always a good idea to get some information on the entire infrastructure first. :)
  14. i've actually been using this for quite some time. not with a pineapple though (i perfer linux for that), its much better than cain and abel. i still cant get sslstripping to work with it though :/
  15. Now I have 2 working pinapple v2's with mark 3 on them :) thank you! great work!
  16. ok thank you for clarifying. I'll try to flash it tonight sometime. looks like everyone else is getting it to work. so good work Sebkinne! Congrats on the new title :D
  17. So just to clarify. I take my pineapple v2 stock from hak5. and use the redboot method #2 and after I'm all done I should have mark3 firmware? Just want to make sure I'm following this correctly. Also, all the line break issues are fixed on the wifipineapple.com wiki correct?
  18. will do darren. good work. if nothing else i just got my deposit back from verizon so i might have to splurge and just get the new one. Do i get a frequent buyers discount yet? :P jk lol
  19. does the pineapple i trade in need to be working? :P because i messed up a line when changing IP addressing and now i have no ip address. so you would have to use a serial cable to flash it... anyway i have a second v2 thats working fine and would trade either or in, and try to upgrade the other, but when you say trade in do you mean you'll flash it for us? or give us a whole new one with the new hardware?
  20. This is the kind of crap that happens when politicians find the need to "get involved" with things they do not understand. They don't understand how web crawlers work, or basic functionality of search engines for that matter. the time an effort that it would cost to filter all of the content they are looking for would be outrageous. and those fees would eventually lead back to the customer. who's going to pay for the time for these company's to filter these things? surely not the companies themselves. The entire idea is flawed, but I guess its hard to point out a fallacy to someone who doesn't understand the basics of the subject. Are they going to start filtering foreign VPS's too? They've lost the internet, its no longer theirs and they cant just take away the freedom it presents because they don't like a few things about it. Its like if every house was acceptable to a full out raid without any probable cause or warrant just because a small percentage of the houses in the country contain narcotics. Big brother is trying to monitor that which is not theirs to monitor. They're going to need to watch out for freedom fighters, because they don't seem to know what they're getting themselves into. And thats my small rant on the subject. with much love ~Soka80
  21. ahh digip, i love you. such good debating skills. *two thumbs up*
  22. that going to be fantastic, I'm really looking forward to the mass storage. Did jason say wether or not it will still run HID scripts while its a mass storage as well?
  23. jasagerPwn works just fine for me, i find it the easyiest solution, and it saves me alot of time, and have had it running for 2ish hours no problem. the only problem i've had is i turn karma on, deauth a test machine of mine, and it just ends up reconecting back to the original access point it was on (of course this is nothing to do with jasagerPwn, probably something dumb im doing). and i've been trying to figure out is how to use easytether0 (my tethering interface from my phone) as my default gateway instead of wlan0. i've changed the variable in the script, but still nothing, i think its just something to do with easytether. not sure. also tried connecting to backtrack from the ad-hoc network off my phone, and that was a no go as well. googleing around, it seems like alot of people have the same problem with ad-hoc and linux.
  24. they stopped producing them, for the obvious security reason. your going to have to pick on up on ebay, or something of that sort, im not sure where you could get one, you'll have to just look around. but as far as U3 drives are concerned, they're pretty much a dead exploit when talking about autorun, unless your business is running xp with it left on (i think there was a patch for it on xp, dont quote me on that) and then you have some bigger concerns other than malicious flash drives.
×
×
  • Create New...