no42
-
Posts
925 -
Joined
-
Last visited
-
Days Won
17
Posts posted by no42
-
-
Those ones are fixed :)
-
in it.properties what key combination do you have for ASCII_7B =?
-
One question - odd they got both you and your wifes cards; Where do both of you shop? be it petrol stations or internet sites? might narrow down the culprit?
-
- Research
- Testing equipment is not vulnerable to Pineapple attacks
- Testing equipment is not vulnerable to SSL attacks
- Research
-
Cheap option: drawing pin?
-
are you using the zip or svn?
-
The Duck:
The delay is advised to be around 3000 msecs for the OS to recognise and install drivers (Window 7 & 8), Windows XP is slightly faster. Cant remember the speed of Linux and OSX but this number can be tweaked. Using a familiar VID PID speeds this up even more, as some drivers might be preloaded.
Doubt AV is messing about here, as you are at the EFI. AV evasion/Device Control Evasion is by altering the VID & PID. Also you can try altering the Serial Number and Device strings in the main firmware.
OSX:
As for iCloud lock (according to Apple & Genius Team) that engages when a laptop/phone has been reported as stolen.
Best to turn in the device to the police. (Maybe the owner will let you keep it, and remove the lock?)
-
What shows up in dmesg / device-manager?
-
Currently ssltrip 0.9 on OpenWRT fails with the following exception:
......
even after that sslstrip is not working :-(
i go with the 1.0.1 again there sslstrip was working fine after some workaround...
i hope one nice day sslstrip is working with no problems but till then i dont do any updates anymore.
Worked for me.
Sadly URLsnarf doesn't work, also tried re-installing.
UPDATE: Now back-up and running. Silly me, fixed after reinstalling, followed by another reboot :). Whatever the issue was? Classic case of Turn-It-Off-And-On-Again. It was sorted by a 3rd reboot (1x after firmware upgrade, 1x after sslstrip upgrade, 1x after reinstalling urlsnarf).
-
Its a 'Trade' Accton MR3201A device!
Essentially it is the same as a FON.
So sounds like a MK I (might be a MK II).
If anyone else has one of the following devices - they are all essentially the same:
- ACCTON MR3201A
- FON FON2100A,B,C and F
- Edge-Core WA3101
- Philips SNR6500
- SMC WEBT-G
- Siemens Gigaset Wlan repeater 108
-
Use a hexeditor to create a 4 byte file (vidpid.bin); first 2 bytes = VID second 2 bytes = PID
Full list of VIDPIDs can be found https://code.google.com/p/ducky-decode/wiki/Index?tm=6
-
It currently modifies a symlink. It is only a small change (with some sed action) for it to edit to the master_file to persist across reboots.
-
I see the bots are already onto it.
Think we need to read up on http://www.mediawiki.org/wiki/Manual:Combating_spam
-
Depending on your router, and the antenna, it is most likely a neighbour. Then again could be someone with a powerful yagi that could be slightly further away.
Your router config should be able to tell you what clients are connected, if not use kismet.
You can then use kismet with a directional antenna, scanning the area for clients. Find the matching client MAC address (providing attacker is still online & not changing his MAC every time). And narrow down the location.
I've done this and pinned it down to a single house in the past. But then what are you going to do? Police aren't really interested.
Advice:
Go out buy a newer router. Enable WPA2, Disable WPS, Set a very long WPA2 key (24+ chars (preferably almost random))
-
There is a live cd Vipervast http://vipervast.sourceforge.net that should contain all the tools you need.
Also Cain & Able on Windows can do some VOIP stuff.
-
I personally like SyntaxHighlight - GeSHi - Generic Syntax Highlighter
-
FAT32 or VFAT should be fine.
-
U2FsdGVkx19j+O7Yg/IuLAXxN8GmCyLiDU/bDhmo2ZqygAwDWvZOWfT1c3OIvHSO
It is base64 encoded - use base64 decode and the message translates to Salted__????????? this is typical of openssl encrypted strings.
Are we sure the CapitalO's are O or 0(zero)?
-
That is strange.
Have you tried blacklisting the mac address of wlan1?
-
The battery size = 6800mAh
The charger Output = 350mA
6800 / 350 = 19hrs.
But I only left mine on for 12hrs (figured long enough) and the green led went out.
-
the back has 33441 28782 23185 23188 21401 91019 07030 1001 15627 13602 48201 45201 38343 65583 73101 87124 85283 92116 94104 anyone have some direction
Domain.com hint:
LiSeNb NiPtHe HeGaAt HeGaRa
ScZrH FNeK 0YbZn Fm0H
HBaCo AlNdHe CdCaH RhCaH
SrSeLi CCsBi TaMd
OLuCr OTeBi ULv PuRf
-
-
The error is in /pineapple/components/system/karma/includes/helper.js
within function refresh_report()
Because the variable i is bing used twice within a loop (oops).
var karma = data[2]; for (var i = karma.length-1; i >=0 ; i--) { if(karma[i].indexOf("Successful") !== -1){ var client = new Array(); client[0] = karma[i].split(' ')[5]; client[1] = karma[i-1].slice(71); var exists = false; for (var i = clients.length - 1; i >= 0; i--) { if(clients[i][0] == client[0]){ exists = true; } } if(!exists){ clients.push(client); } } }
change the 2nd var i to var j:
var karma = data[2]; for (var i = karma.length-1; i >=0 ; i--) { if(karma[i].indexOf("Successful") !== -1){ var client = new Array(); client[0] = karma[i].split(' ')[5]; client[1] = karma[i-1].slice(71); var exists = false; for (var j = clients.length - 1; j >= 0; j--) { if(clients[j][0] == client[0]){ exists = true; } } if(!exists){ clients.push(client); } } }
-
I'm sure there are more bugs/errors to be found, keep them coming.
Thanks
Snake
Ubertooth: pyside-tools not found Backtrack5 R3
in Community Projects
Posted · Edited by midnitesnake
Question: Which distro are you using?Shouldn't read postings via the phone (shortens titles)Also your using the wrong version of kismet, and you have to compile from source #12