Jump to content

Radau

Active Members
  • Posts

    157
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Radau

  1. I'm in a rush heading home but do you have repositories for Redhat based systems up yet? I'm using Fedora 17 currently and this seems like it'd be a pretty cool thing to have. Either way I'll look into it when I get home, cheers! :)
  2. I'm going to have to say that all of the stuff posted is highly unlikely, with some of it being downright impossible to do. If he's really worried he could restore a clean install which usually rids users of paranoria as well as calling the cable company and getting the IP address changed (while the computer is being reverted to a factory state). What it's looking like to me is he's too paranoid or his ex is downright insane, also it's damn near impossible to do anything to a bios remotely. As far as the hidden AP in his house if he's using a strong authentication like WPA2 with a strong password and WPS off there shouldn't be an issue with that, alternatively he could just turn off wireless and use a Ethernet connection. If he thinks they are somehow getting into his PC (which would most likely involve them breaking and entering with the list you gave us) then I'd suggest he lock it down on both ends. Start off with encrypting the hard drive as well as getting a way to physically lock the computer as well (or lock the side so the cmos can't be cleared without the key to the lock, then passwording the bios). Those are my suggestions but I really doubt he has much to worry about unless you flat out know they're doing something, in which case I'd get in contact with law enforcement like i said.
  3. You would need separate licenses if this was within a business, but since you're a home user I believe you can run it unlicensed (the activate windows later option). Downside to this is I don't think you really get to update.
  4. Care to elaborate a bit more on what you're trying to do? What you posted is pretty vague. You could use virtualbox and create a scenario so long as you remember to not allow outside communications with your network. A host only adapter might work too, play around with the settings and you'll probably get what you're looking for.
  5. If I were you I'd start off with Virtualbox if you have the power to run it. If you do that you wont need dedicated hardware for every host, just be sure to isolate the network. Plenty of exploitable target virtual machines you can download too like metasploitable, ultimatelamp, the list really goes on and on.
  6. I still prefer the "Let me google that for you" website :P http://lmgtfy.com/?q=What+is+Tcp+7175%3F
  7. While possible I could still see a potential for this to somehow go wrong in some way or another. Now if we could put the two players on a VPN or something like that without actual access to the internet from that VPN it could help out a little bit to keep it contained. That's just my 2 cents though, the idea itself is nice and I've seen a few things like it done before but mainly web based or with people in the same room.
  8. Just finished watching it, pretty good movie. Apparently the officer that was after Assange during the time period said it was more fiction than fact. Either way I thought it was a good movie, definitely recommended. B)
  9. I use avast 2012 IS on my gaming PC due to the lax firewall rules and un-intrusiveness of it. Comodo's firewall is overprotective if you don't go in and set it to 'training' mode or whatever. Then it's intrustive for the first week popping up asking if you want to allow things (usually like windows firewall is for the first week or so) but after that it stays pretty hidden. I have yet to see the Comodo Endpoint manager used in a business environment but I think it would work well at managing all of the machines antiviruses and firewalls from one platform, rather than relying on the user to do everything.
  10. My cousin just bought me The WarZ, looking forward to trying that on the 15th with my clan mates B)
  11. It should if that version has SET (which it should), I haven't ever tried metasploit from windows actually. I will find out soon enough how well it works on Android... as soon as msfupdate is completed. I swear it has been running for about 12 hours now, oh well patience is a virtue I suppose. B) (image resized)
  12. Couldn't agree more about studying for a networking certification or taking a class. Check some of the local community colleges in your area and see if they offer a CCNA prep course or something of the like. If it's affordable (the one at my community college was) then you should go for it. It helps to have other people to work through it with, plus you don't have to drop money on cisco switches. Alternatively, if you do not want to drop the money for a course Cisco Packet Tracer is a fairly good mock network building tool (with some flaws) that gives you access to most everything you would need to study any of the more basic things. Another thing you could try is checking some local companies for any equipment they may be throwing out, that's how I acquired various servers, laptops and desktops that I'm applying towards my path to a CCIE. As for actual programs, backtrack will have pretty much everything you could ask for and more. Armitage (if it's still supported) is a good tool to get into metasploit and understand how it works. The Social Engineering Toolkit (SET) is also relative easy to use and very powerful. But like I said before it really depends on just what type of hacking and/or cracking you were looking into, if you can give us some general ideas it may help us help you.
  13. I'm surprised that nobody has mentioned Dual Core yet seeing as how much int80 has been on the show in the past. Plus their music is just plain freaking awesome.
  14. WOW Hahaha. Steam is also a very good platform for getting an IP address, but you have to initiate a voice chat. Upshot is they don't necessary have to answer for you to get it.
  15. Just going to list off some favorites, it'd take me at least a year to list all of my music... (not listed in any order) A perfect Circle Tool God is an Astronaut Feint Hudson Mohawke (Particularly Fuse) Nine inch Nails Monster Magnet Pendulum Scars on Broadway Less than Jake Sleep Dealer The Devil Wears Prada Those are just a few, but then again I don't have any specific music I use when messing with stuff. It's just whatever comes on the playlist next :P
  16. I personally like Comodo antivirus with the endpoint manager. Been trying it in a vbox network and it sure does take out some hassle. Downside is Comodo can be intrusive at times.
  17. Dynamic DNS such as No-Ip or DynDNS also works very well over or combined with the bitly links. Some people panic when the website name is just an IP Address for some reason
  18. This post may be interesting to you if you haven't seen it already: http://forums.hak5.o...-and-hackademy/ Welcome aboard! :) As for what you can use, you really are only limited to what kind of hacking you want to pursue. For example lately I've been getting into hacking from mobile devices (Galaxy S3 with Backtrack 5, just waiting on Monitor Mode to be patched), but you could also focus on website vulnerabilities and tools similar to the WiFi pineapple. For the most part you're limited by your imagination and your willingness to learn. If I were you I would test the water with all of the different types that interest you and find out what you like.
  19. I don't even know what to say about this, yet another up and coming invasion of privacy it would appear.
  20. I read through the Hackademy page and I am really liking the concept. I have a few friends overseas and in South America that really want to get into pentesting but lack the resources and a teacher. This looks very promising so far and I will be sure to refer them over to it straight away so they can read through the pre-launch info, thanks for the notification about these programs! :D
  21. This community really doesn't need your attitude. You're giving us all a bad name by attacking those who should be your friends. I suggest you drop this before it escalates further and ends up in someone getting banned.
  22. You're wrong, this is a forum about anything tech related and he has just a right as anyone else to express his feelings on a matter. There are specific sub-forums for hacking and security and this is not one of them (note: Everything Else).
  23. Bit of a bump but the firewall is working great. I completely forgot that you released it too! Been running some tests against it and it's holding up against all of the common attacks like it said it would so that's great!
  24. Sounds like it would be a great alternative for smaller businesses, would this be able to take place of the required yearly pentests for businesses or is that undecided? I'm not entirely sure if that law even did get passed years ago but I remember hearing about it. Either way both websites sound like a great idea :D
×
×
  • Create New...