Jump to content

whitehat

Active Members
  • Posts

    170
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by whitehat

  1. lol o come on what's black hat about bots? i mean i suppose you could use them for spamming and that's blackhat/grayhat but i honestly dont. i use them for SEO in the case of Facebook and I've got a secret business plan involving the linkedin bot (it's http://linkedinbot.com/ but i'm not necessarily recommending this particular bot at this time). I thought the Twitter one would be good for SEO but I want to get one that's not $395 or made FSBS (for skids by skids). i know a guy with 55,000 twitter accounts, and i'm just sayin', i would feel more confident in my masculinity if i also knew how to make billions of accounts and use them in an automated way. not to abuse it, just for the fun and the educational value. but even so..i guess if bots are wrong then i dont wanna be right LOL. but it's all about what you do with em, you know. i'd really like an open source one, but im sure that's not gonna happen.
  2. I've slowly fallen in love with Facebook Friend Adder Pro, by http://www.livelyservice.com . I'm experimenting with a LinkedIn bot www.linkedinbot.com though it's been giving me trouble. They also make a Twitter one, but they are trying to charge $395 so save your money until someone cracks it and they change the price to $30. Does anyone else know of anything good? Of course there's Scrapebox and a macro utility called iRobot Soft, but as far as social networking and other fun bots that aren't backdoored underground malware -- does anyone know of anything good? Links would be appreciated!
  3. do you play against other people online for free? jw
  4. thank you bro's! bat country?? well yea, when i lived in Georgia there were bats, but i have to wonder where bat country is lol it's the bat droppings that i dont like
  5. Thanks Infiltrator. LOL Digi. Come on, no one dared me tho? What's wrong with you guys LOL jk They called me back before I even got home and offered me 30% more than I was expecting. Almost 6 figures! Which is good, because I spent 8 years in school making $1,600/mo as a research assistant and I have a student loan. I signed the contract and now I've just done the background check and name badge paperwork. Today was SUCH a good day :)! *Oh* and guess what? I took my 2 pimped out hacker laptops and I took the smaller of the 2 antennas. Didn't need the antenna but my new PhD in CS boss guy loved the hacked out laptops and it sure couldn't have hurt. I think maybe he saw the antenna in my briefcase but idk. I truly DIDN'T think I would get the jobs Digi, but I wasn't trying to be disrespectful to them with the antennas. These guys are all hackers and wear blue jeans to work. They're like us!
  6. I have an interview @ Intel for a science position in about 10 hours. I'm too nervous to sleep. They told me to bring my laptop so that they can make me demonstrate proficiency with my software apps on the spot. My laptop is a semi-flagrant linux hacker box with plenty of LED's, skins, etc. In addition, BackTrack, which is the OS on the comp I'm taking, doesn't play well with the internal network adapter. I've also destroyed network-manager and the replacement .deb's of it I downloaded give me dependency error with dpkg -i. But anyway, I will need to get online to RDP with my MATLAB cloud in the interview. I *could* just ask for a wired connection, but wouldn't it be funny if I took one of my giant hak5 antennas?? I have the large Yagi and the one that looks like a satellite dish receiver. The question is, of course, does anyone dare me to do it?
  7. WTF?? I didn't know anything about this. Piracy is wrong, but we all know it has a long history among almost all key players throughout decades of the computer revolution and it's been widely accepted as a societal problem, which we've been dealing with by creating better laws, more consumer friendly / non-monopolistic software pricing structures, better technical measures, and ISP-based bandwidth punishments. It's been working with dramatically increasing effectiveness. Most digital pirates are students and most, like myself, gradually cessated from piracy over a period of years, as the social environment, laws, and alternatives change, and our means and maturity increases. It's an on-going process and America is leading the way in reduction of piracy. To ruin the life of a MIT researcher who has spent his entire life studying and living in student quasi-poverty to earn a respectable position in academia, when his only crime is a vice that nearly 100% of people under 35 are or have been engaged in as well is not only an unfair and arbitrary exercise of law enforcement, it's a socially outrageous abridgment of freedom. This was over JSTOR articles??? You wanna talk JSTOR articles? OK, let me tell you something -- I've spent my entire life (minus 2 corporate years) in major research universities just like MIT. I'd say that about 80% of professors give out copies of JSTOR/other copyrighted empirical articles to their students. At big universities it's common that professors will pick out 5-10 articles to accompany a text book and may have a local printer bind them and sell them to the students. In that case, they aren't just reproducing the articles, the printer and maybe even the professor are getting PAID for it! This is widespread. At UA, USC, UGA, FSU, OSU, UCLA, UC Davis, UC Irvine, UH Manoa, and others I know that this commonly occurs in classes with HUNDREDS of students in some cases (underclassman undergraduate classes). We've been CUTTING DOWN on it, increasing technical control, and adapting policy -- just like with software, movies, music, etc. It's a SOCIETAL problem that we are dealing with at the SOCIAL level and is not meant to result in INDIVIDUAL martyrdom, as it did in the early 00's to society's disgust. Consider that society as a whole not only suffers when piracy occurs, but to some extent society also gains. In economic terms, you'd say that there is marginal utility derived from the consumption of pirated materials and that any consumers' utility adds to marginal social benefit. Given this, doesn't it make sense that if college students have benefited from decades of pirating society's music/games/movies/warez/etc and this is funded by society because the rest of society suffered from their piracy then isn't it only fair that former university students (i.e. professors) pay back society by providing the marginal benefit of unofficial/pirated access to JSTOR articles? It's socio-economic karma. It was supposed to happen. THANK YOU ANONYMOUS, for showing the family of this individual that some of us aren't iron fisted Nazi's, like whoever decided to legally attack this young man. I want to see someone resign over this. Give me the Dean's resignation. I don't even really like Anonymous, because I believe a lot of what they've done has hurt American interest, without considering the hideously oppressive regimes that this helps. Wikileaks in particular is a problem. *However*, when I see Anonymous do stuff like this or saving that gang rape victim from a football team/town covering up the rape, it really warms my heart. My impression of Anonymous is that it's basically American youth + assorted international support + organized anti-American foreign organizations trying to manipulate American culture. I hope that this is a sign that the American youth and their non-evil supporters are going to use their powers for restrained, socially positive, minimally illegal protests like this. America HAS to be able to embrace this type of demonstration if we want to remain the socially and economically open nation that originally defined us and made us great. So let's see some more of this, some less of the anti-government stuff, and perhaps some pro-American operations! Nice show, Anonymous.
  8. What exactly is the difference between multipass and multiboot? Sorry, I am new to this subforum. I have tons of USB dongles created with YUMI that multiboot linux, is that the same as what you guys are doing? I don't see any multiboot makers for OS X though. Are there any?
  9. What major flaw were we talking about? But yea -- vulnerabilities are so numerous and widespread I'm kinda surprised that the OP was surprised about a new vuln. If it really was a 0day yesterday I'd like to know though :) I concur with what overwraith said, though I'd add that programs can actually be even (much) longer than thousands of lines. Even programs written in a short amount of time may be millions of lines long, depending on what approach is taken by the person writing them (if you weren't very parsimonious, at least).
  10. lo0: flags=[censored]<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16284 options=3<RXCSUM,TXCSUM> inet6 [censored]::1%lo0 prefixlen 64 scopeid 0x1 inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet 127.94.0.1 netmask 0xff000000 inet 127.94.0.2 netmask 0xff000000 gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280 stf0: flags=0<> mtu 1280 en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1400 ether [censored] inet6 [censored]%en0 prefixlen 64 scopeid 0x4 inet 10.0.1.5 netmask 0xffffff00 broadcast 10.0.1.255 media: autoselect status: active p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304 ether [censored] media: autoselect status: inactive utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 f[censored]
  11. OK, I'm tethered to 3G now as a work around. Here's my post, which I'm also posting at my ISP's forum, but all they ever say it to powercycle.... Hi, I'm having a heck of an issue with an intermitent connection that's been going on for the better part of 3-4 months. There are also drastic variations in speed, but I only mention that as a possible symtom of the intermitent connectivity, which is the most important thing to focus on. It comes and goes, but on average I have this problem 20 days out of the month. I am usually online approximately 3-10 minutes at a time, then offline for 30 seconds - 3 minutes or so. I do use multiple VPN's for school. I've tried toggling VPN connections when I'm disconnected and it somehow seems to help perhaps 25% of the time. When I use the ifconfig commands on my Linux or OS X machines, sometimes I see VPN-related interfaces that I don't really know much about, such as gif0, p2p0, ppp0, etc, even when I'm not connected. On the Macbook I no longer see a wlan0 interfaces even when connected by WLAN, which I think is weird. I have about 12 internet connected devices, all running Linux or OS X. This problem happens on all of them. The problem persists even when only connecting any one device, when there is wired or wireless internet, and regardless of my DHCP/NAT settings. I've tried powercycling, flashing, and toggling other options on my Apple router via the Airport Utility (router console). Phone support transfers me, says they can't help, says it's not their job, etc. I tried chat support and they wanted to help, but I keep getting disconnected. They say there is not an outage in the area. Another forum suggested that perhaps it could be an issue at the pole or a congested network. The problem does not occur if I connect to any network other than my home network though, which makes things even weirder. Thank you very much in advance for any insight!
  12. hey bros. oh, right, i thought it was you Mr P. No worries. I will retype if need be. I am also going to post on my ISP's forums. thanks for the help digiP
  13. Who is the mod of this forum? I made a thread earlier about an ifconfig question relating to my internet connectivity. I lost connectivity while editing and it created a copy instead, which I commented should be deleted. However, it seems that all copies are gone. Could you please restore the original? I'm only able to stay online 2-3 minutes at a time, so it's really hard to recreate the post.
  14. which person did you beat first when you played megan man? i always either went for either the time freezer guy or the bubbleman dude. bubbleman was more fun but timeguy was better strategy
  15. megan man would win easy, unless they all rushed him at once or someone pulled out a shuriken (sp?) before MM blasted them with his arm-gat
  16. i guess this should be the format... ettercap -W key_length:string_or_passphrase:wep_key -G [/CODE] well that's what once source says, but it lacks the specification of a wlan interface and when i try it with -G the GUI pops up but it's just in its default state. also, where does it specify the target?
  17. Can someone give me an example of ettercap usage with -W (i.e. --wep-key) for sniffing via wlan? It says something interesting in -h about the -W... it sounds like if you have the WEP key then you can actually decrypt something that you're sniffing...but I'm trying it on myself and I can't get it to work right. Using the -T user interface i got it to say that it's starting unified sniffing but it never does anything interesting. Should I be able to use the WEP key with -W to see all my data being transferred in plain text or how does it work? I wanna see the WEP key decrypt something...
  18. Secret Service, not CIA, if you want to be a stickler. Kevin Mitnick got the Secret Service on camera picking their noses and they told him that's why he got 5 years in jail instead of probation. I don't think even Mitnick messed around with the CIA tho.
  19. The government just needs to make a decision on if they are going to allow it or not, instead of randomly punishing exit node operators. I haven't followed all the links in this thread, but it sounds like they are allowing operation and use of Tor, but choosing random volunteers in the project and ruining their lives because the government can't solve the paradox of (i) wanting the Internet to retain an anonymous component for the larger good of the world, while (ii) simultaneously wanting to rule with an iron fist and have 100% surveillance. They (or we) want to have the cake and eat it too. I don't really know much about any specific anonymity project (and with what little I know I'd prefer i2p over Tor by a thin margin). however the whole Internet used to be more anonymous, before Sauron's eye got so big and before the internet became infested with a vast ocean of lamers (thanks AOL, Yahoo!, Google, and FaceBook). Freedom to express yourself anonymously and to develop an online identity independent of your normal life is a large part of what brought the Internet to the prominence that it enjoys today. It's supposed to be that way and that's what sparked an international anti-oppressor revolution in the Arab world. If American had chosen to be the model of online freedom, privacy, and limited regulation, then China, North Korea, and much more of the Arab world would have seen that and taken advantage of it, potentially leading to world peace, prosperity and freedom. Bad guys can take advantage of anonymity too, obviously. That's why traditional intelligence and security forces should have to stay vigilant and heighten their skills at traditional police work, instead of perverting and poisoning what's left of the Internet in search of a lazy way to spy and bully the citizen population.
  20. oh yea, i think a lot of folks here are into that type of stuff too. of course, it's kind of stretching the word hack to cover modifications instead of just penetration, but i'm totally with you. i for one am heavy into Roomba "hacking"
  21. I've been using computers since I was 8 and I have my share of degrees, but thanks to a really horrible undergrad adviser computers and formal education almost never coincided for me. I'm very busy and couldn't pay much, but is there any good online network/security/programming training that you'd recommend? My tuition preferences would be free, nearly free, or expensive-but-you-can-get-a-full-scholarship.
  22. Ah ha! You did find the culprit. Also, the same message is apparently part of Ubuntu, and a dormant part of BackTrack. I fixed the start up message. The original, which you quoted, was a bit too much 1984, anti-user "no expectation of privacy" BS for my taste. Now it says: Btw did you try Bastille? I like it, asides from this boot up annoyance. Here's how I changed the message (this is from an ubuntu guide i googled last night): Display a Banner If you want to try to scare novice attackers, it can be funny to display a banner containing legalese. This doesn't add any security, because anyone that's managed to break in won't care about a "no trespassing" sign--but it might give a bad guy a chuckle. To add a banner that will be displayed before authentication, find this line: #Banner /etc/issue.net and replace it with: Banner /etc/issue.net This will display the contents of the /etc/issue.net file, which you should edit to your taste. If you want to display the same banner to SSH users as to users logging in on a local console, replace the line with: Banner /etc/issue
×
×
  • Create New...