Jump to content

IOSys

Active Members
  • Posts

    169
  • Joined

  • Last visited

Everything posted by IOSys

  1. Uhm... Since jailbraking isn't hacking, the tools needed are not "hacker-tools", they are tools that serve a legitimate (and legal) purpose . And it doesn't even matter if you use the word "hack" in it's true meaning or the media-meaning ("hack" = "crime") :) I'm looking forward to rock-boxing my wrong-generation iPod Classic ( It was a prize ) and then use it .. Since there is no way in Hell I'll instal iTunes it just collects dust somewhere atm .
  2. Assuming it isn't a faked UFD that's a Alcor-controller, tools are here : http://translate.google.com/translate?hl=e...3Fname%3Diflash
  3. Eureka !!! I knew there was a reason for not trashing those old mp3-players in the drawer :)
  4. Well, what do you expect when you offer something for download that basically pwns people 200 % ??
  5. Then don't bother using it . Using apps like truecrypt without understanding what they do and how only leads to a false sense of security . Besides, "being to lazy to bother" is a noobish attitude .. But go ahead and download this little password-entry GUI with no source-code from a unknown guy with 10 posts ..
  6. IOSys

    Skype Cracked?

    No it can't . Just because the media and the skiddies confuse the terms it doesn't make hackers crackers or vice versa . And file-sharers aren't "pirates", despite what the media (and even the most juvenile file-sharers) want you to believe .. "Piracy is a war-like act committed by private parties (not affiliated with any government) that engage in acts of robbery and/or criminal violence at sea" .. Words actually have defined meanings and the words you choose to use influence peoples perception of the issue.
  7. If you really want to learn Linux, Gentoo isn't a bad distro to choose.. True, it is not as easy as Ubuntu.. and that's exactly why it's a great place to start learning Linux .. Now that's the spirit of a true hacker [/s]
  8. IOSys

    Skype Cracked?

    So, a bunch of crackers, who claim to be "professional cryptologists and reverse engineers" CRACK a programs encryption-implementation (a clearly ILLEGAL thing to do btw ) and then start talking bad about "hackers" ? I smell commercial bullshit !
  9. Uhm.. Guess why it's called "whole disk encryption" ?? You can either encrypt individual partitions or you can encrypt the entire device . In either case, ALL space of the volume is encrypted . (yes, pgp can also create file-hosted volumes but you can't stuff your OS inside a file and still be able to boot) When you encrypt a storage-volume it is filled entirely with randomly-looking garbage, ie overwritten once . Despite what NIST, The US Military etc etc could make you believe, there are no documented examples of ANY data being recovered from a HDD that has been fully overwritten once . Ever .. Despite this fact, you may be required to sanitize the disk in accordance with Federal guidelines anyway, and depending on the nature of your operation and the data you store, you may even be required to have proof that the disk was sanitized ..
  10. ebox http://www.ebox-platform.com/ has all the things that are still missing in zeroshell .. And then some.. In fact, it may even be a bit to much if you "just" want a good router-distro ..
  11. ..or you could buy a IDE Disk-on-Module and pop it in to a IDE-slot .. http://www.memorydepot.com/ssd_diskonmodule.asp
  12. I think a password based solely on numerical characters has lousy entropy ..
  13. Theses numbers are from Samsungs own data-sheets, you can find the sheets with Google by searching for the part-# : SLC : Samsung OneNAND KFW4G16Q2M rated@ 100k erase-cycles MLC : Samsung K9G8G08U0M rated@ 5-10k erase cycles This is quite good for anyone wanting to know a bit more : "Western Digital White Paper describing calculation and effects of SSD endurance" http://www.wdc.com/WDProducts/SSD/whitepapers/en/NAND_Evolution_0812.pdf
  14. Absolutely, windblows will treat them like any other HDD, allowing you to install and boot windblows from them . A "normal" flash-drive won't let you do that because it behaves like "removable media" instead of a "fixed" or "local" HDD .. However, most flash-drives can be made to appear as a "Fixed" HDD, using their "Mass-Production Tool" The main difference between "normal", relatively cheap, flash-drives and these small "Disk-on-Module" (DoM) devices is that almost all DoM's use Single Level Cell (SLC) NAND-RAM, giving you at least 10x more erase-cycles .. MLC-flash is usually rated at 10k erase-cycles pr cell, as opposed to the guaranteed minimum of 100k erase-cycles for SLC-NAND-RAM. You can also get DoM's that will fit into a IDE-slot on your MoBo and there are also SATA-versions available ..
  15. http://www.memorydepot.com/details.asp?id=DOM2GUSB The reason they are so expensive ? Well, they aren't that much more expensive if you compare the price to other, physically much larger, SLC-flash-drives . ( As is usually the case, "miniature" does cost a bit extra ..) Just an example, the "OCZ Rally 2 Turbo High Performance 8GB USB2.0 Dual Channel Flash Memory Drive" will cost you about 120$ ..
  16. You say you have Whireshark .. Have you actually USED it ??
  17. Now THAT was an interesting device :) It looks like an ATMEL eeprom... What's on the other side of that PCB ? You may be able to find some more info here : http://www.atmel.com/
  18. VID 1130 is supposed to be Tenx Technology, Inc. I haven't seen a tool for, or any of, their products yet, but it must exist somewhere since people are loading their own stuff onto the drive .. Best way to identify it is to disassemble the thing and read the markings on the controller-chip .
  19. That's not what he meant , he means you can't modify the firmware of the controller .. .. but that's only because it's closed-source . (You can modify certain pre-defined variables in the firmware with the controllers mass-production tool) There is a processor, some of those flash-controllers have modified ARM-CPU's (or whatever we should call those things :) ) embedded, others use in-house designs, but they do have a processor .
  20. DD-WRT is a rip-off, use the one it's stolen from instead .. (Still won't work on DIR-655) http://openwrt.org/ Check this out : http://www.ebox-platform.com/ Not exactly a "router-distro", this has EVERYTHING : IMAP-server, NAS, SAMBA, BIND, openVPN etc etc . Uses Ubuntu server-distro with web-administration (firefox included), runs on x86 CPU's .. See the full feature-list here : http://trac.ebox-platform.com/wiki/Features
  21. Thats a Chipsbank 2093-controller, this is the latest (available) MPT : CBM2093_UMPTool_v3.3.9.1_091127 http://translate.googleusercontent.com/tra...K7Gn2OlnbPynUrA
  22. This thread is for posting info on devices that might be fun to hack .. My first candidate is : Yoggie Open-Firewall SOHO http://www.yoggie.com/Open-Firewall-SOHO Main specs : * Intel PXA270 642MHz CPU (Xscale) * 128Mb SDRAM * 128Mb Flash * SD slot (supports SDIO) * 4Mb secured flash * 2 10/100 Ethernet ports (!!) * USB OTG (on-the-go) (!!) * SSH shell-access Image of the board : The SD-slot and RJ45 connectors should give you an idea of how tiny this thing is . A small review available here : http://www.raiden.net/articles/hardware_re..._soho_firewall/ There's a kit containing the "Yoggie Open-SOHO", a Debug-board and a SDK available for US$ 105 : http://www.yoggie.com/e-store/product_info.php?cPath=23&products_id=65 People like us should probably buy that as it allows us to "unbrick" the device in case anything goes wrong :) Things to do with this : Pretty much anything, this is a mini-computer capable of running linux !
  23. Unfortunately only for the IP7100-processor or higher, the DIR 655 uses a 5000-series processor :( It's really a shame, there's so much more the 655 could do, like openVPN, NAS over USB-port ..... This is the best router-distro I've come across, it has almost everything : http://www.zeroshell.net/eng/ My box is an old pentium with 512MB RAM and 2 giga-NIC's, works great . There are also special versions for certain router-boards : http://www.zeroshell.net/eng/hw/
  24. I'm pretty sure you can make the OS think it's a HID just by changing the VID/PID with the mass-production tool (MPT) for your UFD-controller.. Actually getting it to behave like one might be a challenge ..
  25. You have successfully blocked the tracker-communications and DHT . However, the actual data-exchange is "encrypted" if the client is set up to require encrypted transport . Bit-torrent uses 2 flavours of RC4-"encryption" : "Plain" where only the packet-header is encrypted and "Full" (sometimes just called "RC4" in the client ) where the entire packet is encrypted. On top, many torrent-clients are switching from TCP to UDP for the peer-"connection" . And inside those encrypted packets you also have "PEX" running . "Peer EXchange" lets clients share info about peers directly with each other ... So, there's a good chance the unknown encrypted packets you see ARE bit-torrent . Even Sandvine can't reliably block bit-torrent . PS : I still don't get why they run torrents over TOR, just browsing over it is a royal PITA .. And who trusts a system made by the US Navy and MIT anyways ? I realise it's probably a lost cause but it would be a lot better to try and educate people about why using TOR for torrents is a real bad idea. The least dumb will probably understand this : https://blog.torproject.org/blog/bittorrent...-isnt-good-idea
×
×
  • Create New...