Jump to content

Life like Opossum

Active Members
  • Posts

    78
  • Joined

  • Last visited

Everything posted by Life like Opossum

  1. This 33GB file that has caused all this sputter, it seems quite useful! Does anyone have a download link for the file? I'm always looking for great word files/tables to use and share. Thanks
  2. I would also like to ask everyone what your favorite Backtrack interface is. Do you prefer KDE or Gnome? Which one is better and why, I'd love to know what everyone thinks :)
  3. I will torrent all of them to help out! My pc runs 24/7 and offers up torrents, ventrilo and minecraft! Once I'm done school I'm thinking about starting up a little minecraft SMP with a bunch of people for fun. But for now, I'll stick to torrents. Torrents are running 24/7. I have to use my unlimited data and 5mbps upload somehow.
  4. Thanks I appreciate the info. I have always used net stat to view my connections but I never knew how to kill them. This utility should. help me a lot. Thanks!
  5. I think you misunderstand what I am wanting here. I am not looking to monitor my girlfriends computer. I was originally looking for a monitoring tool to monitor all of the router traffic so I could know when her little brother is downloading files, as they have quite slow internet here. The following question was regarding network monitoring for my own machine, just so I know what connections are open and which ones I can kill.
  6. Well, it is my girlfriend's network, so no I don't own everything. I am however living in Canada, we have different laws, although intercepting electronic communications is still illegal. The fact is, I doubt they would care, but that is besides the point. Thank you all for the tips, I'll see if I can use any of these options. It turns out they have the router password set the same as their WiFi password (genius right). I'll tinker around and see what I can find out. On a side note, what are some good network monitoring tools for windows that I can use to monitor my own internal traffic? I know about NETSTAT to simply see what connections are open, but I don't know enough about managing connections in windows to kill connections and all that other fun stuff. If anyone knows of any good programs, please let me know.
  7. I'm looking for a network monitoring tool that I can run on a windows machine. My girlfriends brother often hogs the internet and downloads programs while we are trying to do other things, he denies doing this, but I know better. I'm looking for a program that I can use to monitor the traffic coming through the router. Does anyone have any good suggestions of some programs I could use? Also, I wouldn't actually have the routers password so I wouldn't be able to modify anything on it form my end. Simply connected via WiFi and looking to monitor the traffic to catch him red handed.
  8. Here is the download link for Spybot S&D hosted by Safer networking, the makers of the program. download the program from this link. http://www.safer-networking.org/en/ownmirrors1/index.html
  9. Essentially, if someone has connected to your pineapple you have full control. Yes you can DNS Spoof an HTTPS as you are deciding where their traffic actually goes. If you are dealing with a technologically sound individual, they will notice the change and disconnect from the pineapple right away.
  10. I have a friend of mine whose Seagate 2TB external hard drive will get dropped after being plugged in for a couple days and will not re connect unless he uninstalls the associated USB driver, turns off the hard drive, plugs it back in and powers it up. We have tried several options including changing the power settings to keep all usb ports powered. Can anyone else think of anything that could resolve this problem?
  11. Listen to this man!!! Spybot and Avast!! Two of the best free services out there. The paid versions of Avast! do give you some additional protection, but are generally not needed. Spybot is a life saver, it actually kept me form getting key-logged a while back. On that note I'll give you a tip... check over your laptop after your girlfriend uses it to download programs... Also, don't just click "Allow" every time a spybot alert pops up. One of these alerts means that a registry file or another important file is being written, altered or deleted! It is very important to know what programs and making these changes and why. Generally speaking if you are installing a trusted program you can allow what it is trying to alter (this would be programs such as Adobe products and clients such as Steam or Skype). If you are ever installing an unknown or less trustworthy program, be sure you know what registry/sensitive files it is altering before letting them have the access. You can never be to sure now a days...
  12. Here is an excelent tutorial for SQL injection that can be found on the Backtrack 5 forums. The author has a video on the manual and automated methods as well as full descriptions of each and copies of the code. Excelent learning reference. http://www.backtrack...ead.php?t=47186
  13. The basic Avast! setting should be more than enough for the average user. Under the summary tab there should be an option to turn on silent mode. I personaly preffer it, but it is sompletely up to you, you canleave it off if you would like.
  14. If you find yourself constantly cracking into a network with the same SSID rainbow tables are great. Taking the time to compile your own is an excellent choice as well. If you use programs such as jack the ripper and cowpatty you can get very extensive tables that include a-z 0-9 and even the special characters. Mind you this can take time, but you can get yourself a 100% complete file that contains every possible outcome. The files may get large, but this is possible.
  15. Should come to Canada, it's great! Well as long as the new internet privacy bill doesn't get into effect... Bill C11 if anyone is interested in reading. http://www.parl.gc.ca/HousePublications/Publication.aspx?Docid=5144516&File=9
  16. Great info, this is a very viable solution. You can still run windows services within Linux using wine or simply virtualizing a windows environment (quite easy to do but can be demenading on hardware).
  17. I do not personaly use the ABP pop-up addon but it does help if you want seemless browsing with no pop-ups.
  18. My top two suggestions for windows would be Avast! antivirus. If you sign up with a free account you can turn on silent mode which will make the program never both you with pop-ups unless it is actually something of importance. Secondly I would suggest Spybot S&D. It is a free spyware and malware removal tool that also comes with a nifty background program called Tea Timer that constantly watches registry files and a few other key locations to ensure that nothing fishy is going on. If any scripts are ran that attempt to change any key components of your computer an alert will pop up, similar to the windows administrator prompts but without the locking of the pc. This includes both wanted and unwanted scripts, so it asks what you would like to do; allow, block and of course, "do this for all" (if you want the program to be useless click that). There are several other tools that can be used including network connection managers to ensure that no unauthorized connections are being made. I would also suggest the Firefox add-on "Add Block Plus", just to keep those pesky pop-ups away. I'm sure other forum members here will have plenty of other options as well (I could use a network manager myself). Hope this helps!
  19. This is true, you can edit the max power factor and such to increase range. Overall you will get a stronger signal with a better antenna (such as the yagi). While yes it is true that it is not an omnidirectional antenna (you have to point it), it has an exceptional radius for being a, sorry if I use the wrong term here, directional antenna. Comparing the yagi to other large parabolic antennas, the yagi performs in such a manner that it is apparent that it has a wider radius. Omnidirectional antennas are great and allow for the most versatility, but if you don't mind slowly turning your antenna until you find the strongest, or at least a suitable signal, a stronger directional antenna will get you better signal quality.
  20. I'd suggest the Yagi antenna from the Hack Shop. From the demonstration that was recently done on Hak5 it seems that the Yagi has the best signal radius (you don't have to point it super accurately).
  21. I was recently employeed in the wireless industry (I worked for Bell) and I can tell you that for Canada all cell phones are constantly conected to no less than 3 towers within an urban environment. In Rural settings it is a mimumum of 1 tower with a mean or average of 2 towers at all times. The purpose behind this is triangulation. As most devices have the capability to access GPS services, it is neccisary for locating the individual. In urban centers you can expect accuracy of plus or minus a couple of feet. In Rural areas this can be a lot higher.
  22. A better option would be to randomise his MAC address and simply turn off auto connect on his wifi... or use a LAN connection. Someone as "Smart" as Sabu should know about these things...
  23. I second that!It would be great to have these up and running!
  24. First of all if we go back to the original term "Hacker" it was coined by a group of MIT students who "Hacked" a model train to make it run faster. The modern term is used as an over generalization that has grown to encompass basically every type of modification you can think of, not just in reference to computing. When referring to computer "Hacking" you have 3 basic groups. White hat hackers, Grey hat hackers and Black hat hackers (White Hats, Grey Hats and Black Hats). Your White hats are your IT professionals working for the large cyber security companies developing tools to safeguard information and networks. Grey hats are as they sound, in the middle of the other two types. These types of hackers attempt to bend or break the rules that have been programmed into certain protocols in order to gain access to information or systems that they otherwise would not have access to. These types of hackers are non-malicious and typically do this for fun, to help improve security, or simply to test what is currently in place. Black hats are the nefarious ones! They are the ones who are trying to steal information, break systems and networks and even render systems useless (malware, spyware and viruses, especially Trojans! are usually made by these types of individuals). I know I am not 100% accurate here as there are other reasons people will engage in hacking behavior, but it is a start and a basic guideline. Now all we need to do is educate the rest of the world so we aren't always seen as criminals...
×
×
  • Create New...