Jump to content

Atomix.Gray

Active Members
  • Posts

    38
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Atomix.Gray's Achievements

Newbie

Newbie (1/14)

  1. That would be correct. Once you connect to a wifi spot - your device will send probe request (which is what you're seeing) Windows for example will remember all the wifi spots you connect to and keep asking for them This is how your wifi will automatically connect to a wifi hotspot.. So yes you're correct you can see other wifi hotspots people have been too.
  2. Amazon EC2 is another great choice. I agree with price. Linux servers are normally cheaper - so this is a bonus.
  3. I am hoping to make grrcon... #beer #food
  4. I do remember my first hack. I used a Tool called NetBus - via wackamole.exe had good times sending people to random pron sites - opening CD roms drives - playing sounds... nothing too evil :)
  5. Found the answer - not sure why - yet. Drove out to the site and setup wireshark - even though the account was setup correctly it was still failing. Wireshark SMB packets stated incorrect Login - which I KNEW was wrong. I remembered a while back setting up SQL 2008 and the account had issues unless the domain name was in all CAPS - sure enough - changed the domain name to all CAPS and Boom it worked - no more lock outs!!
  6. Anyone going to the SharePoint Conference in Vegas this year?
  7. Thanks for the ideas guys so far no luck - Jason I was leaning towards that as well. However, we have File Shares that have 200+ users connected at one time. - however they are not using the same account. I will dig through the event logs more. I've been paying more attention to the logs and reports that come from QRadar - time to get down and dirty.
  8. Hey all - really could use some ideas - let me explain the issue. We've setup 195 Xerox Printers to be able to Scan to a network folder location (1 location) The Xerox's are using a Scan template (the template contains - Scan location, Domain, Username, Password) So no manual input is being done by the end user. The scan to network folder is using SMB protocol over port 139. We have ACLs set on each locations router to allow this traffic. Now the problem we are seeing is the service account used on each Xerox - is randomly being locked out by the Printers. We know the password is correct on the printers (as a few minutes or hours prior to the printer locking the account out we have successful files being placed inside the folder) I thought grabbing a pcap file of the traffic - but honestly I don't think Xerox support is going to be of any help with this one.
  9. Ah - yes the Mega Primer. I've been meaning to check all those videos out. Thanks!
  10. My lab is just using an older Linksys wireless-g router. Tested this on a 2wire AT&T one - worked as well. I will try to process the cap file tonight. I've never used CoWPAtty - so I will find the command and switches to try and process it with that as well. (If aircrack does not work) Was anyone else able replicate this? This would beat having to deauth or wait for someone to connect. digininja - thanks for the script - :) been working on a FakeAP + Metaspolit one - just trying to teach myself basic scripting (coming from a strict VBscript background)
  11. I assume you have enabled USB and added the adapter via USB settings?
  12. I was messing around in my lab last night and - (think) I found a really easy way to get a WPA handshake. However, I want to run this by everyone and see if I am way off base here. So I had an airodunmp-ng running capturing packets - trying to find way to get a handshake if no clients were available to deauth - so I had a brand new phone - that's never been connected to my lab network before. I enabled Wifi on my new phone and tried to connect to my labs AP - I used the wrong PIN/Pass Phrase on purpose - my phone stated it was the wrong PIN/Pass Phrase - however I noticed that I got a WPA Handshake. I was able to reproduce this over and over again. Has anyone else seen this? Is this normal? My understanding to get an successful WPA Handshake - you need a client to connect successfully to the AP. **Note I haven't tried to crack the .cap file yet.
×
×
  • Create New...