Jump to content

Remotesh

Active Members
  • Posts

    65
  • Joined

  • Last visited

Everything posted by Remotesh

  1. If its just the Touchpad then you can do a little check on the connections to see if that's the problem. Just use a flat tip screw driver and pop out the keyboard. The Touchpad's connection to the laptops mobo should be right at the bottom. My Touchpad on my Asus 1201n gets disconnected every once in a while because I move it around a lot. But I use an external mouse most of the time so It doesn't really bother me. Hope it helps :D -Remotesh
  2. A week or two ago, there was a kid who arp poisoned his school's network. He posted something along the lines, "You guys don't know who I am!". Well needless to say, one of you guys found out all of his information, IP address, servers, websites, and other stuff, and recent searches through his proxy (He was looking at some weird fetishes) I get how you guys found his twitter and such (was the same username). How did you find all of the rest out? I am most curious on how you found out what he was searching through his proxy. Thanks for the help. -Remotesh
  3. Is Uplink even multiplayer?
  4. He got it from Gelaskins, For some reason I cant post pictures right now, Will try again later. (On my laptop)
  5. Remotesh

    Question

    He probably specified a certain directory that he wanted to copy, such as the User Folder (My Documents, etc) I don't know about you guys but I don't have more than 32gb in my User Folder. (Then again I don't have alot of pictures.) Its a autorun.inf file on a usb driver that when the usb drive is connected it would run the autorun.inf (Much like a CD when your installing a game) The autorun.inf would list the batch script as the first thing to run and then it (the batch script) would run and go through the script that you wrote. Allowing you to do anything from copying files to deleting the System32 file (If you have administrative access, ergo the user could think it was something else and run it as administrator cause you created a readme of some sort and set up a legit looking directory :D). Its very easy to do. -Remotesh
  6. Can you ask the question a little bit clearer? What I got from all that, is that a friend installed an antivirus onto his pendrive, and it auto runs and removes virus when he inserts it. However onn most newer machines now a days the autorun feature is enabled by default so that doesn't really work on newer operating systems. But a majority of machines still use xp to this day, so I would suggest try it on a windows xp machine to see if your install works. Here is a list of alternatives that you can try. http://www.pendriveapps.com/software/portable-antivirus-firewall/ I myself use Avast and ClamWin when dealing with an infected computer. -Remotesh
  7. He replied to my email, gave me the information, and the picture. -Remotesh
  8. Im assuming that this also prevents safe mode from running, or you would have already done that, Then run a usb install of Spyware SnD or ClamWin AV (or both!). You can always run an ubuntu live cd then run an AV. You could also use Trinity Rescue Kit. (Personally I love this.) Link: http://trinityhome.org/Home/index.php?content=TRINITY_RESCUE_KIT_DOWNLOAD -Remotesh
  9. Yes, because this location storing was a "mistake" on Apple and it was a bug.... www.nytimes.com/2011/04/28/technology/28apple.html?_r=1 (Sorry if link doesnt work apparently safari cant transfer links across different windows???? Ill look into that later.) I don't like Apple, used to have an ipod touch 1st gen. Jail broke it that same day. I think I was metaphorically breaking out of the Jail that was Apple. Anyway on a the matter at hand, I've read somewhere that if you turn some settings off that you can disable the logging of the data. Im just surprised that no one has a made a app that clears it every hour or so, then again Apple would either not let it come into the market, or delete it from the market. (Android Market doesn't restrict much, mostly stuff that infringes on cell phone companies contracts, aka netflix on some rooted phones.) Either way, if your jailbroken i suggest looking at some apps that will clear that data file every few hours or so. -Remotesh
  10. Its been so long since I've seen a Let Me Google That For You link. Use to do it to my buddies all the time when they asked me a question. Good times, good times. Anyway check out some of the pinned stickies. Some of them still hold some decent info so it would be a great read and tutorial. Have Fun, -Remotesh
  11. Perfectly normal for someone who could have a lot to loose if their files have been tampered with. Other than a few C++ programs, a web design template, and my Minecraft saves. I dont have anything that valuable to loose on dropbox so i don't take extra steps to encrypt that data.
  12. Same here. Would download right now, but at school.
  13. Try doing a hex dump, and format card, then add the previous hex dump like Hitokiri suggested. I think that could work. Unless they do it online and the card is like account details to an online account that stores the amount of money you have on the card. But then you could always "find" one of your neighbors cards who has a lot of money on it and copy it.
  14. Yeah I sent him one a couple days ago, haven't got a response yet. He's probably been busy, since he has been filming the hak tip. Just thought I would ask you guys, if you had any better places to buy skins or if you knew where he bought it. Thanks -Remotesh
  15. A DDoS attack on other people/websites without explicit permission is illegal. Just thought I should warn you. But from my understanding (Im a beginner pentester mind you, Stuck to Virtual Box environments on my server), you have to gather a great number of computers which you've exploited/breached, installed the software to DDoS. (I personally don't know what software, I think you can just ping, don't quote me on it!) Find out the ip of the target you wish to DDoS be it a website or computer server. If it is a computer make sure the port your going to DDoS is open or you will fail. Then simultaneously launch all the clients at the same time to cause a massive use of bandwidth/computing power. That usually disconnects the client, crashes the computer, or causes the computer to go real slow. If it is a webpage it can cause it to crash. Understand that I personally have never looked into learning how to DDoS, so my knowledge is limited to wikipedia and mostly guess work. But if your are just starting in the Computer Security I suggest starting smaller and in a controlled environment to avoid legal issues. Try out and familiarize yourself with a Linux operating system there are many to choose from but i suggest you start with ubuntu, and work your way out from there. Next try setting up a virtual environment using virtual box or something to that equivalent and attempt pentesting the machines you set up. (Backtrack is a great operating system for pentesting.) Knowledge of a programming language is also a plus, C++ is great in my opinion, but I hear Pearl, Ruby, and Python are especially great for exploiting. (Correct me if I am wrong guys.)) If you have any questions post em here on the forum, and we'll help you out.
  16. I usually don't put any personal info out without encryption. But while on the topic, what are a few programs you guys use to encrypt your data? Personally I use encfs if I know I'm going to be on a Linux computer, or TrueCrypt for cross environments.
  17. Just want to know if you guys know where Darren got his Laptop Skin. Looks pretty boss and I want to get a hak5 logo on my Asus. Was gonna go to SkinIt but wanted to hear from you guys first. Thanks -Remotesh
  18. Thanks for opening my eyes about Dropbox. Good thing the only thing I use it for is to sync my Minecraft Saves across my three computers. :D
  19. What graphics card are you using? I havent found many new gaming graphics cards that use VGA, are you sure thats not your Motherboard's vga output? I mean if your on the new intel z68 chipset it shouldnt be a problem to use both at the same time but that was only released this past week. If you are damn you beat me to it!
  20. Do you mean Arp Spoofing? Or do you mean promiscuous mode on your wireless card?
  21. I have an Asus 1201n too, and I'm pretty sure that the default wireless card wont work; Without certain drivers anyway. (Not too certain because I use my wifi adapter with BT.) But yeah when I get home from school today ill see if it works with the default card/and if it doesn't ill (see if its a driver problem) find the drivers you need. Side note: Im pretty sure you can start wicd by typing "wicd start" into the terminal. PS: Welcome to Linux
  22. Must say this opened my eyes, As said before i used to just youtube for different attacks and methods. This guy explains everything in detail which (For me) is great. I deffinitely recommend this to anyone who wants to learn about it!
  23. Remotesh

    Hacksaw

    Switch Blade www.mediafire.com/?gmezejv1jty Old Hacksaw www.mediafire.com/?gxjmdmny5jd
  24. Currently Using http://www.dealextreme.com/p/802-11g-54mbps-high-power-1000mw-usb-2-0-wifi-wireless-network-dongle-35688 Mainly because everything works out of the box, and it even comes with an install disc for Back Track. Also is pretty cheap compared to some of the Alfa's that other people recommend. Anyway, what do you guys use? -Remotesh
  25. Thanks for all the great answers. Im taking Comp Sci AP next year and im supposed to be learning Java, are there any good languages that complement Java in structure and syntax? -Remotesh
×
×
  • Create New...