Jump to content

0xFFFF

Active Members
  • Posts

    16
  • Joined

  • Last visited

Posts posted by 0xFFFF

  1. Ladies and Gentlemen,

     

    I would like to direct your attention to our Proxmark3 Rdv40 Kickstarter!

    If any of you are in to contact or contactless card security research, I strongly recommend you check this out.

    We are already funded and production is waiting on the green light. The team (including myself) have years of experience in the industry and believe we have produced the best proxmark available on the market.

     

    The public repo is here - https://github.com/Proxmark/proxmark3

    The popular iceman fork is here - https://github.com/iceman1001/proxmark3

    5_s.jpg

  2. Hi all,

    Is anyone familiar with invalidating PDF certificates / removing document security?

    I have a number of documents which require an installed certificate (which I have) and a password for said certificate.

    Is there a way to remove this from a PDF?

    I don't have the public key.

    I have tried invalidating the certificate using some perl script magic but the document permissions still prevent me from clearing and removing the invalid certificate.

  3. RaiseFromDead.jpeg

    ...Ok. I'm raising this one from the dead. This topic hasn't been one of those super important projects, hence the really late post.

    The best method (IMO) is to use VSC. So far it's worked on all the machines I've tested. In situations where programs are missing, I've simply copied them or used the -c option in psexec.exe. Don't forget you need to authenticate either using psexec or when opening the command prompt.

    Step 1. Get Admin access using SAM or whatever.

    Step 2. Remote to victim

    psexec \\remotemachine.somedomain.com cmd

    Step 3. See if VSC is working

    vssadmin list shadows

    If it is, make a note of the desired VSC and skip to
    Step 5.

    Step 4. Create a VSC

    vssadmin create shadow /for=C:

    Go back to
    Step 3.

    Step 5. Mount the desired VSC

    mklink /d "C:\VSCmountpoint" \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopyXXX\

    Where VSCmountpoint is a folder anywhere on the system and HarddiskVolumeShadowCopyXXX is the VSC you want to mount.

    Step 6. Copy stuff

    xcopy / copy / whatever the file wherever you want.

    Step 7. Unmount VSC

    rmdir C:\VSCmountpoint

    Step 8. Eat pizza.

    Questions?

  4. I like the SMS idea. For some of those cases it would be ideal. Any ideas on how to configure this? Is there a simple method of sending SMSs from BackTrack using an android attached device?

    There are cases where I like using cloud services but I have some hefty hardware at home which does the job nicely most of the time.

  5. Hi All,

    I bumped in to a big problem the other day when it all of a sudden occurred to me that I have no processing power while I'm out on the move. Normally I would connect to home where I have some heavy hardware to do pass cracking etc… but I’m not always in a situation where I can do this.

    I use a modified 1015PX eeePC to get the job done while I’m on the move but it does not have an express port. The USB ports are 2.0 and the only solution I’ve found thus far is this…

    http://www.asus.com/Graphics_Cards/External_Graphics_Card/XG_Station/#specifications

    …and this…

    http://hackaday.com/2011/10/19/beefing-up-your-laptops-gaming-chops-with-an-external-gpu/

    What does everyone else do when they are pen-testing out in the field and need extra grunt for pass cracking / number crunching stuff?

    Regards,

    -0xFFFF

  6. Not sure if anyone is interested in this but I've made progress. Most are probably already familiar with PsExec. What I've done is used that to silently create a VSC of the the PST on demand which can then be 'restored' and copied or moved from the victims machine. The process will take time due to the size of the PST. I've been working with ~700MB - 1.4GB files.

  7. In my experience I have had a little difficulty duplicating files that are locked by other processes. One method I've used is to forcably release the file and then commence copying. This option is ok but often causes the process to crash. The other method I've used is volume shadow copy. This method is ok if the service is enabled and you don't want the latest changes.

    Both options have major disadvantages and I was wondering if anyone might have a better method?

    The target in my test scenario has been the users outlook PST.

  8. Minor Concern ->

    3) I noticed the Pineapple gets hot after a while, is this a known issue?

    I left my pIII running for 6 hours yesterday and I noticed the same thing. I don't think it is of any real concern. Maybe it might be worthwhile looking at a heatsink mod?

    I'm assuming you were using the AC adaptor?

  9. if the mkIII is anything like mobile phones, computers or TVs or..., give it around a year and the hardware will be discontinued and a new version will come out thats about to be discontinued and then .........

    I attempted to purchase a MK II but they sold out. Fortunately the MK III poped out and I picked that up instead. It's just the average life cycle of technology these days.

  10. I'm sort of in the same boat as MDauer,

    I've got a Ubiquiti Networks Bullet 2 HP partly working (thanks to BIGtoe - Clicky). Also, I have purchased a Pineapple III so I can compare what I've done with the Bullet against the Pineapple III. What I would like to see is a list of all of the required modules their sources and recommended / suggested hardware on the wiki.

×
×
  • Create New...