Shiva
Active Members-
Posts
27 -
Joined
-
Last visited
Everything posted by Shiva
-
....actually that's not even close to being true I used a program called IPMaster Pro. Check it out for yourself :D i still stand by what i said: when messaging on a one to one basis - directly, sniffing the connection reveals the other person's IP Thats not what you said you said there's nothing in there about one to one, and in the context you add it seemed like you said just firing up a sniffer will tell you the IP but you need to know ehere to look and what IP are not the one's your are looking for... Just to let you know. That's what i said and that's what you said and this is me saying it again :D , now if you could pay attention or read my lips, LOL. If you run a sniffer using any messaging software, when chatting up someone on a one to one basis, running the sniffer will reveal the other persons IP. The sniffer i tested with is called IPMaster Pro. You can use any other sniffer of your choice. Of course it would require you to know where to look, it will require you to recognise an ip, know wut it is, how it looks like. The very fact that you are firing up a sniffer and trying to sniff a connection, denotes that you do know what you are looking for.
-
imho, hacking involves more of social engineering than actual techie stuff like breaking in and owning a box. You might checkout Kevn Mitnick's Art of Deception. Of course you gotta have tech skill, but more often than not, you could do wonders with social engineering while it would take longer to do the same technically, imho.
-
Thanks for the new method. In your method how does one interleave the 5.1 audio stream instead of the stereo :?: If one decrypts it 1st, one can de-interleave the audio stream in the decrypting process. How can this b done using any dvd? Thanks in advance
-
For multiple reasons. To name a few: 1: Educational Purpose :D 2: All discussions under hacking arent they all educational in motive :P 3: Because its possible & just out of my reach, so its kinda appealing 4: In case of a theoritical entry into a machine, i would think it would be a good idea to leave as little trace as possible, and if any footprints are to be left, wouldnt it be great if it those could b fudged - :P
-
....actually that's not even close to being true I used a program called IPMaster Pro. Check it out for yourself :D i still stand by what i said: when messaging on a one to one basis - directly, sniffing the connection reveals the other person's IP
-
hi Does anyone know how to programatically spoof an IP? if some can give me a sample code (C, delphi, java), i would be grateful. thanks in advance
-
When chatting up someone using any messaging apps, not in a forum, but on one to one basis, if u run a sniffer, you will immediately get the other person's IP.
-
Sorry for the typos earlier - erm ... instead catering to a bunch of firewalls, how bout targetting only the most frequently used 1, such as Zone Alarm - its popular - and its pretty good. So a succesful pentest on that would pave the way for others?? LOL ZA by default gives, the default browser, alg.exe (application layer Gateway Service, svchost.exe (Generic Host Process for Win32 Services), access to the net.
-
hi Renegaecanuck, how about using http streaming to bypass firewalls? Since most firewalls are set up to allow HTTP traffic to go through which will of course mean both conections will have to be on at the same time. But at least this way, the level of suspicion aroused is tiny if not nil :D
-
Nod32 with updated Av signatures, detects amish's Payload :?
-
how bout a feature that checks da local installed firewall for apps dat have permission to access the net, and then use those programs to send out the mail, instead of disabling / re-enabling the firewall or messy stuff like that. It would b kewl since, getting at the info is not a prob, getting it out and to you in a manner to not alert any trace of suspicion is the trickier part
-
Do you know the service name for the windows firewall? Just as a side note, if you know the admin pwd of a remote box which has remote registry enabled ( i think its enabled by default ) then u can use PSList from http:www.SysInternals.com to get a list of services running on dat box n snipe em one by 1.
-
The easy way if you got the Gift of the Gab Read Keven Mitnick's Book - The Art of Deception and practise The hard way Learn to code Suscribe to the mailing lists @ secutityfocus such as Bugtrack Understand the topics discussed well enough to include them in yur code :D
-
Why take the trouble of cracking a windows pwd when u can reset it (to blank) LOL :D
-
It aint worth trying to break the pwd cus it could take like forever, especailly if the pwd is strong. Simplest and the fastest way to go is to get whatever u got from another source.
-
There should b a reset switch :roll: i think the default Username & pwd are: Admin & password :?: hope this helps!
-
use Aircrack yu'll get IP address & its corresponding MAc address
-
Tonz of programs available for this google for Motion Detector USB Camera
-
U could do a del /? to get all the parameters it can take. /? works with most dos commands.
-
erm ... for Net Stop to work u hafta know the other's pc's Username & pwd and u hafta do it from an an account that belongs to the Administrator's grp. Also, if ya kill the FW, especially on boxes with SP2 installed, da Security Centre's msgs's will kick in n start displaying not loaded or some such msg. It may also start Windows own "firewall" if it can b considered a fw at all - lol. Any other thoughts on this? thx in adv
-
hiya well! Batch file's can be compiled. well! yea if you sniff the connection - then its a different story, BUT its much safer to compile the batch file then leave it as plaintext isn't it? cus then duh --> plain text - you dont even have to sniff - you can just see that yu'v been hacked into, and know the mail id to where its going? and the mail id's pwd too :cry: If you compile on the other hand, to see the mail id & its pwd, you have to use a hex editor or sniff the traffic, a lot more difficult than just seeing the mail id & its pwd - :D Just a thought anyway erm ... da? well! just as kewl is kewl is to cool da is to the - also 2 words instead of 3? :D Better now
-
Hi, Since your email username & pwd figure part of the bat file, dont u think it's a good idea to compile the damn thing ??
-
hi, wut if the if a host has a firewall up & running? because the fw will catch it, saying a program is trying to send mail. how does 1 overcome this kinda scenario?? thx in adv