Jump to content

Doctor

Active Members
  • Posts

    9
  • Joined

  • Last visited

Everything posted by Doctor

  1. What intX80 said. What do you wanna do. Networking, IT, data recovery, or maybe just a general live-cd like ubuntu/etc.
  2. Theres always truecrypt.
  3. Doctor

    Hidden Os

    Ah, well again thank you for clarifying, seeing as this tells me I neeed to read more before I post next time. So I don't look like an idiot.
  4. Doctor

    Hidden Os

    Okay thanks for clarifying that int0x80, I apparently missunderstood your video, derp. Would their be any way combine the two methods and simply encrypt the linux partition and than load to it using the grub?
  5. Now this is where you meet the proverbial fork in the road. You can go down one path and never look back at learning how to "hack" because you will go have your new accont set up and there for won't need remote access to your old computer. Or you could follow the white rabbit down the hole and learn what its all about. But for you my friend I would as reccomended above recccomend Metasploit, Fasttrack or you could just something like TeamViewer or any other rdc to connect to your computer and delete the files if the password hasn't been changed. Of course if I am wrong on the use of Teamviewer, etc. Please feel free to correct me.
  6. Rreally all I can do is agree with Infiltrator and int0x80. Set up a couple virtual machines on you computer and just play around. Figure what you like, what you don't like and go from there. I'm not gonna lie because as you no doubt know, this is gonna take months if not years of practice and your always gonna be learning. So buy some books, search some forums and figure what it is you want to learn and become good at.
  7. Not exactly an expert, but I remember a similar topic started over in /securti. Check to make sure you have your router set to allow port_forwarding to the port you have set under your options for the exploit on the target box. Not sure if it'll be any help though.
  8. Doctor

    Hidden Os

    Alright so here's my problem, I was going through old shmoocon lectures when I stumbled upon int0x80 giving a lecture on antiforensics. Now he didn't go into much detail on how he did it, but part off his method was two partitions. A clean windows 7 install in the front and his linux install in the back. Now this is the part thats bugging me, he didn't use truecrypt and hidden volumes. What he did was used a boot record loaded onto a flash drive, that when plugged in on startup. Would tell the compter to boot partition 2. What I'm having trouble is writing one, I'm not the best programmer out there, quite frankly I suck. But I realized after looking at an example of the master boot record. That its written generally in x86 assembly, which while I've dipped my fingers into while lurning about how a program operates under the hood that is generally c++,c,etc. I'm pretty crappy with it, so if any of you gents would oblige me some advice or help it'd be much appreciateed.
  9. Well no, we wouldn't be sript kiddies for the fact that we don't just use the times and go bam you've been haxxed. We try to understand the underlying principles to why the tool or script works and then we attempt to modify it or make our own. Of course it also helps that like previously said above, hes probaly just doing this to show off to his friends or appear cool. Where as we either do this for a living or we devote years of our time to understanding how to do this. So no we would not be script kiddie for example I still currently consider myself a script kiddie. For the fact that I can't modify or completely undertsand the code behind the tools I use. I on the other hand am attempting to learn the principles behind it before I use it.
×
×
  • Create New...