Jump to content

SmoothCriminal

Dedicated Members
  • Posts

    713
  • Joined

Posts posted by SmoothCriminal

  1. http://it.slashdot.org/story/09/07/11/1430...oups-Threatened

    So I haven't posted here in a while, but I saw this and thought this was crazy and maybe some of you would share my thoughts. The group is stating that security and white hat hackers, like many of the people here, are a bad thing and hurting the community. That by using full disclosure of exploits they are making everything less secure. Simply put I think this is absurd. Sure script kiddies can get a hold of exploits and take advantage of them, but the whole point of full disclosure is so that the vendor can patch the issue and prevent bad things from happening. Without full disclosure developers would not learn of vulnerabilities in their products and then security would be truly bad. I personally hope these people end up going to jail from the work of white hat hackers at the FBI tracking and arresting them.

    Thoughts?

  2. If you couldn't pick it up from Vako's post, posting things like "I 0wn3d the sch00lz network" isn't exactly smiled upon. Instead start by posting they software/system architecture, how you discovered the vulnerability, and how you exploited it, in a way to educate not bloat about your 1337ness. Vako wasn't personally attacking you per say he was attacking your post. He is basically saying: try this post again.

    Edit: Oh and post a potential fix for the security weakness if at all possible.

  3. I would think about security/motion activated lights. You would be surprised by how far they will go to scare off people. If you decide to go with cameras, remember that probably the largest point of failure for most cameras is lack of lighting. So either put lights out with the cameras, or go with more expensive cameras with night vision or cameras with IR lights.

  4. I agree with Vako, but if you are willing to throw down just a little extra, go with the nvidia GTX 200 series. Oh, and on a random note, what is with the start menu/taskbar on top?

  5. If you just keep track of which usb goes to which user, you could have the payload just send out an email identifying itself with a number, which corresponds with your data on who got what usb drive. That way you are not technically getting user information (although you probably could get their IP address from this) from them. Though, I agree check with your instructor.

  6. and also i have already got 2 jobs ( 1 in Tata Consultency Services and 1 in Infosys , i wonder if u ever heard of them,but i have to tell you anyway) as software developer.....so i need not worry about that either.......i did not want to talk about my personal details but you insisted.

    I have heard of both of them. Both companies were at a recent Computer Round table Job fair that my University hosted. Funny story about Tata. I was browsing the career fair, looking for internships. I saw Tata and decided to check them out after all that I had heard about the company recently in the news and in one of my business-technology classes. So I went over there and the person gave me his spiel about the company, and basically said one of the unique internships they offered to me was to go to India and other countries and teach English. Since this did not relate to my field (the career fair was hosted by my major, Computer and Information Technology) I just smiled and nodded. I then asked about summer internships and he gave me his spiel again. I asked him where they were located in the U.S. and he promptly replied "all 55 states". Anyway just thought that was funny...

  7. I would like to know how to tell what your Subnet is. I am trying to do a custom IP Address and it says "Your IP Address must be in your Subnet." I do not know what to do or how it works, can someone please explain how to figure out what IP to use.

    I don't quite understand what your question is, but if you are just trying to find out what subnet you are in, just open up your command prompt and type in ipconfig and that will tell you your subnet mask. Based on that you can find the network portion of your IP address, and the host portion.

    There are loads of tutorials on subnetting, just google it.

  8. Well I'm not using a "true" hub. It is actually a wireless router that has DHCP off and is connected to a router through a lan port. We are both plugged in through lan ports also.

    And I'm using Ubuntu and Wireshark.

    Most likely then the router has a switch in it, and that is essentially what you are plugged into. As was said before, you can use software such as Cain to perform the MITM attack.

  9. I just figured out what was wrong with my capturing ... I didn't have the latest version of shockwave flash. I am now using Flash v10.0r12 and it works perfectly.

    @madbear & SmoothCriminal - I suggest checking what your versions are. http://kb.adobe.com/selfservice/viewConten...rnalId=tn_15507

    ----

    Ok, I'm both making my own timeshifter and editing this one ... soon to come: mp3 bitrate of 320 (hells yeah!), folderizing the songs, and maybe an option to disable mp4 --> mp3 conversion.

    *EDIT: oh yeah .. and I changed around the auto-refresh code (added it to the headers, instead of randomly in the middle of the page), so it should work properly.

    I have the latest version of shockwave installed, as far as I can tell, that is not the issue.

  10. If it is truly a hub then yes you will see all the packets, but I am assuming that you are not using a hub, but rather a switch. If it is a hub, then yes technically you will only get broadcast packets since everything the hub sees it broadcasts, hence broadcast packets.

    Oh and let your brother watch porn in peace.

×
×
  • Create New...