Jump to content

Life like Opossum

Active Members
  • Posts

    78
  • Joined

  • Last visited

Posts posted by Life like Opossum

  1. I will torrent all of them to help out! My pc runs 24/7 and offers up torrents, ventrilo and minecraft! Once I'm done school I'm thinking about starting up a little minecraft SMP with a bunch of people for fun. But for now, I'll stick to torrents. Torrents are running 24/7. I have to use my unlimited data and 5mbps upload somehow.

  2. While its illegal, you could use a RAT to monitor what your GF does on her computer. If you need more information about it, visit the hackforums.net. I can't discuss more about this, because its against the Hak5 forum rules.

    I think you misunderstand what I am wanting here. I am not looking to monitor my girlfriends computer. I was originally looking for a monitoring tool to monitor all of the router traffic so I could know when her little brother is downloading files, as they have quite slow internet here. The following question was regarding network monitoring for my own machine, just so I know what connections are open and which ones I can kill.

  3. Well, it is my girlfriend's network, so no I don't own everything. I am however living in Canada, we have different laws, although intercepting electronic communications is still illegal. The fact is, I doubt they would care, but that is besides the point. Thank you all for the tips, I'll see if I can use any of these options. It turns out they have the router password set the same as their WiFi password (genius right). I'll tinker around and see what I can find out.

    On a side note, what are some good network monitoring tools for windows that I can use to monitor my own internal traffic? I know about NETSTAT to simply see what connections are open, but I don't know enough about managing connections in windows to kill connections and all that other fun stuff.

    If anyone knows of any good programs, please let me know.

  4. I'm looking for a network monitoring tool that I can run on a windows machine. My girlfriends brother often hogs the internet and downloads programs while we are trying to do other things, he denies doing this, but I know better. I'm looking for a program that I can use to monitor the traffic coming through the router. Does anyone have any good suggestions of some programs I could use?

    Also, I wouldn't actually have the routers password so I wouldn't be able to modify anything on it form my end. Simply connected via WiFi and looking to monitor the traffic to catch him red handed.

  5. Essentially, if someone has connected to your pineapple you have full control. Yes you can DNS Spoof an HTTPS as you are deciding where their traffic actually goes. If you are dealing with a technologically sound individual, they will notice the change and disconnect from the pineapple right away.

  6. I have a friend of mine whose Seagate 2TB external hard drive will get dropped after being plugged in for a couple days and will not re connect unless he uninstalls the associated USB driver, turns off the hard drive, plugs it back in and powers it up.

    We have tried several options including changing the power settings to keep all usb ports powered. Can anyone else think of anything that could resolve this problem?

  7. Yes its part of Spybot! It no only detected spyware, but it also locks some important files like the host file for instance.

    If some malware, attempt to alter the host file, Spybot will protect the file from being modified.

    Listen to this man!!! Spybot and Avast!! Two of the best free services out there. The paid versions of Avast! do give you some additional protection, but are generally not needed. Spybot is a life saver, it actually kept me form getting key-logged a while back. On that note I'll give you a tip... check over your laptop after your girlfriend uses it to download programs...

    Also, don't just click "Allow" every time a spybot alert pops up. One of these alerts means that a registry file or another important file is being written, altered or deleted! It is very important to know what programs and making these changes and why. Generally speaking if you are installing a trusted program you can allow what it is trying to alter (this would be programs such as Adobe products and clients such as Steam or Skype). If you are ever installing an unknown or less trustworthy program, be sure you know what registry/sensitive files it is altering before letting them have the access. You can never be to sure now a days...

  8. The basic Avast! setting should be more than enough for the average user. Under the summary tab there should be an option to turn on silent mode. I personaly preffer it, but it is sompletely up to you, you canleave it off if you would like.

  9. If you find yourself constantly cracking into a network with the same SSID rainbow tables are great. Taking the time to compile your own is an excellent choice as well. If you use programs such as jack the ripper and cowpatty you can get very extensive tables that include a-z 0-9 and even the special characters. Mind you this can take time, but you can get yourself a 100% complete file that contains every possible outcome. The files may get large, but this is possible.

  10. As an extention on what Saelani said the GSM companies can track you without triangulation (i.e. using different antenna's) also (if they want), as your cell phone conmnects to an antenna they have a reasonable good idea of your signal strength (I can't remember the exact technical details) and from that they could 'guestimate' your probable location. If you happen to be on a 360 degree antenna then this is not to bad, if you are on a 120 degree antenna the area where you could be is a lot smaller already.

    Of course I live an a country that has practically no rural areas left so triangulation is almost always possbile here ...

    Should come to Canada, it's great! Well as long as the new internet privacy bill doesn't get into effect... Bill C11 if anyone is interested in reading.

    http://www.parl.gc.ca/HousePublications/Publication.aspx?Docid=5144516&File=9

  11. If you are up to it, why not change OS and install a linux distro, thse days most of them are very user friendly both in use and in installing. That way you remove a large threat surface since at the moment there are not a lot of virusses being written for linux (simply because not enough people make use of it to make ot profitable for the criminals) ... Since you are new to computer learning linus or windows is going to take you the same amount of time and most of the info on linux can be found online (free books, forums etc.). Also most of the software you need to secure yourself is going to be free ...

    As a side effect Linux often uses less resources then windows so your little netbook will feel really fast ... For this to happen you need of course to install the best distribution for you ...

    Great info, this is a very viable solution. You can still run windows services within Linux using wine or simply virtualizing a windows environment (quite easy to do but can be demenading on hardware).

  12. Thanks for the suggestions, also for the Ad Block Plus, does it need the Adblock Plus Pop-up Addon too?

    Also, this was the suggestion I got on another board, thoughts?

    I do not personaly use the ABP pop-up addon but it does help if you want seemless browsing with no pop-ups.

  13. My top two suggestions for windows would be Avast! antivirus. If you sign up with a free account you can turn on silent mode which will make the program never both you with pop-ups unless it is actually something of importance. Secondly I would suggest Spybot S&D. It is a free spyware and malware removal tool that also comes with a nifty background program called Tea Timer that constantly watches registry files and a few other key locations to ensure that nothing fishy is going on. If any scripts are ran that attempt to change any key components of your computer an alert will pop up, similar to the windows administrator prompts but without the locking of the pc. This includes both wanted and unwanted scripts, so it asks what you would like to do; allow, block and of course, "do this for all" (if you want the program to be useless click that). There are several other tools that can be used including network connection managers to ensure that no unauthorized connections are being made. I would also suggest the Firefox add-on "Add Block Plus", just to keep those pesky pop-ups away. I'm sure other forum members here will have plenty of other options as well (I could use a network manager myself). Hope this helps!

  14. This is true, you can edit the max power factor and such to increase range. Overall you will get a stronger signal with a better antenna (such as the yagi). While yes it is true that it is not an omnidirectional antenna (you have to point it), it has an exceptional radius for being a, sorry if I use the wrong term here, directional antenna. Comparing the yagi to other large parabolic antennas, the yagi performs in such a manner that it is apparent that it has a wider radius. Omnidirectional antennas are great and allow for the most versatility, but if you don't mind slowly turning your antenna until you find the strongest, or at least a suitable signal, a stronger directional antenna will get you better signal quality.

  15. I'm not sure on the accuracy of the 3G modem and triangulation, but if google can give you pin point accuracy within a few feet over wifi, I'm pretty sure law enforcment could do it too. If you own a device like an ipad or touchpad, or mobile phone that uses wireless, use google's location service and be surprised what it shows. From my touchpad, using bing maps and the google api, it shows me within a few feet of where I am, or more correctly, where my wireless router is. No IP lookup, but wireless device triangulation. I wouldn't expect to use a 3G access point as my cover with any regard to security. Especially if I had it with me, moving from place to place, it just makes it that much easier for them to track you.

    I was recently employeed in the wireless industry (I worked for Bell) and I can tell you that for Canada all cell phones are constantly conected to no less than 3 towers within an urban environment. In Rural settings it is a mimumum of 1 tower with a mean or average of 2 towers at all times. The purpose behind this is triangulation. As most devices have the capability to access GPS services, it is neccisary for locating the individual. In urban centers you can expect accuracy of plus or minus a couple of feet. In Rural areas this can be a lot higher.

  16. I read the FBI affidavit on Sabu... it seemed that they actually pinned all that stuff on him from setting up a device similar to a pineapple outside his home and verifying that it was indeed his MAC addy connecting to his router where they were able to see he was connecting to TOR. If the dude would have just spoofed a MAC or set it to a random one everytime the machine booted and leeched off of his neighbor's wifi, then they wouldn't have been able to catch him (using their rules of engagement, or it would have been much more difficult). I'm not saying it's right to do that, I'd never do that, but come on, if you're gonna hack gov contractors you can't just connect to your home router and jump on TOR thinking you'll be protected.

    A better option would be to randomise his MAC address and simply turn off auto connect on his wifi... or use a LAN connection. Someone as "Smart" as Sabu should know about these things...

  17. Probably a good idea, to change your screen name, to something other than your email address alone. Even if its not your email address, if it were someones, this site gets scraped and visited thousands of times a day. Thats one sure fire way to ensure you get on every spam list on the planet real quick, or if was someone you didn't like, well, same thing just malicious.

    Working on that :)

  18. First of all if we go back to the original term "Hacker" it was coined by a group of MIT students who "Hacked" a model train to make it run faster. The modern term is used as an over generalization that has grown to encompass basically every type of modification you can think of, not just in reference to computing. When referring to computer "Hacking" you have 3 basic groups. White hat hackers, Grey hat hackers and Black hat hackers (White Hats, Grey Hats and Black Hats). Your White hats are your IT professionals working for the large cyber security companies developing tools to safeguard information and networks. Grey hats are as they sound, in the middle of the other two types. These types of hackers attempt to bend or break the rules that have been programmed into certain protocols in order to gain access to information or systems that they otherwise would not have access to. These types of hackers are non-malicious and typically do this for fun, to help improve security, or simply to test what is currently in place. Black hats are the nefarious ones! They are the ones who are trying to steal information, break systems and networks and even render systems useless (malware, spyware and viruses, especially Trojans! are usually made by these types of individuals). I know I am not 100% accurate here as there are other reasons people will engage in hacking behavior, but it is a start and a basic guideline. Now all we need to do is educate the rest of the world so we aren't always seen as criminals...

×
×
  • Create New...