Jump to content
Hak5 Forums


Active Members
  • Content count

  • Joined

  • Last visited

  • Days Won



About i8igmac

  • Rank
    Hak5 Ninja
  1. I use iptables and what ever proxy mitm tool you like that is capable of modifying the data. burpsuit is a good one because you have full control with a nice visual. if you want to get into building your own proxy, there is a lot to learn with modifying http headers. One of my projects was replace all executable's with meterpreter. (exe,zip,rar,msi, etc) Most of these files still download over http.
  2. [BugReport] Aircrack .cap to .hccap

    There are other tools that do this. Your best bet is from a linux labtop. I forget what tool I used to successfully convert pcap for use wilth hashcat. I hate to say google it but. I can't remember off the top of my head. "Pcap to hccap"
  3. Android home cloud/ftp backup

    I have a linux desktop that runs 24/7 raid configuration ftp server. Has any one used recently android apps for ftp upload and download. I have correct chmod folder permissions. The android apps I use are inconsistent, socket errors and failure half way through a single file upload. this file server is my backup solution. When you experience data lost you will understand.
  4. My network was brute forced... I let them in lol

    Yah. I email the admin. They respond appropriately asking for detailed information of the attack. but I decided I want to keep my honey pot running hoping to capture private exploits and log as many ip's as possible. The list is big. All easily exploitable
  5. (Your trying to kill the labtop?) Good luck with this. when the system reaches a dangerous temp it powers off... You might have to put a decent amount of effort into this. You could give it a black screen. From the bios disable the hard drive. or a little water. Let it dry out before you beg for a new one.
  6. hide port 1471

    Iptables You might have to drop all Then allow -ip https://www.garron.me/en/bits/iptables-open-port-for-specific-ip.html
  7. Deep Web Crawler Building 101

    I would setup crunch real quick. See if you can create a quick multithreaded python/perl/or ruby script. send out 10,000 dns request, dump the results to a log file for grepable filtering after the scan completes and time this activity. When complete figure the time it took compared to how many successful 200 response.
  8. Deep Web Crawler Building 101

    cuda wont matter. The bottle neck is waiting on that 200 response. 16^(32) = kabillion my math is inaccurate but this is crazy amount of computing... You need IoT distributed. I have been logging IoT activity for a few months. I have a decent list of infected ip addresses.
  9. Deep Web Crawler Building 101

    You would need a botnet style brute force. the dns response time is slow and needs to be distributed across lots of multi threaded bots.
  10. CryptoMining Via Youtube?

    This is simply a legit YouTube video. well Maybe copyright content but thats it. Possibly he has other videos with instructions to downloading software to hack your wifes cellphone. The only harm a person could do with a YouTube page is post links to cpumining software or verbal instructions. Monitor your cpu. this should be a habit for any puter neerd.
  11. How can you config a Linux system from Web+php

    It seems like your on the right path. if you have working examples I would like to see how you accomplish things. I have taken a break From this with family life. I have run into loads of problems that I will have to over come. (Example) if I run a reaver attack from the press of a jquery button and open a client connection from another device to view the same tcpstream. There is alot of data management or tcpstream management that has to cover all situations that might happen... I challenge you to run a reaver attack. Stream the data. Close the browser. view the stream on multiple devices. topical behavior. Ill get back to it when im done with school.
  12. Help needed for new website!

    Images maybe subject to copyright. Maybe some one could elaborate. I guess these images maybe used for non profit purpose.
  13. Nethunter as an every-day-use OS?

    I have also been interested in this. do any of these nexus devices have autheros wifi chip? packet injection works with internal chip? I'm not interested if I have to carry around usb wifi card.
  14. SSLsplit not working

    I don't believe this tool has worked in 5 years... maybe it does work on sites that have not Implant the latest security protocols like hsts. You guys should learn how to use these tools on a kali linux labtop. Understand the steps it takes to configure these attacks. Then trouble shooting is simple... back in the day I would use arpspoof and sslstrip... its a simple attack to learn. Maybe 4 commands to configure this.
  15. Hhah. You could also hold down your receipts so they don't blow off your desk. most people put this stuff in a bag and use it as a conversational prop. Dude show me how to use your L33T hacker tactical kit. Sure thing bro. Ummm. I can't right now. Nothing is working.