Jump to content

Bountyhunter50

Active Members
  • Posts

    168
  • Joined

  • Last visited

Posts posted by Bountyhunter50

  1. Any AMD processor users out there? I've never had an AMD on any of my rigs, but I was looking at the MOBO Snubs used on her home PC build this week, and it would be a perfect fit for my rig actually (Home File Server). I originally was going to use a Gigabyte LGA 775 board, but apparently that socket type is rare. SO: Having thrown that board out the window on the highway, I did look at the CPU integrated boards starting with Intel. Those... suck. Atom processor at best.

    Now I'm looking at AMD, but I know jack squat about them.

    http://www.asus.com/Motherboards/AMD_CPU_on_Board/E45M1M_PRO/

    That's the mobo in question. Any thoughts? Much appreciated!

  2. If I can kind of expand on this question:

    in my situation (MK4 with Ubuntu Netbook), I cannot see any beacon request in my main interface. Oddly enough as well, when I go into Site Manager and try to restart the wifi there, I get zilch. Installed OPGK Aircrack-ng , started up mon0 and tried to see APs, nothing. the MK4 is connected WLAN into my existing network (only way wirelessly I can access it ATM)

  3. hQIMA95OUJ1L93Q5AQ/+Oa9OoGuB48ZrpIfHnqOcgDY65nRPDz4H/iIiuU6M4Lbr

    81VLgwioHzxHoEWbdMYOHJLOQmzZP54GQ0dGFGmmWSLm+UBJ9QNQnGmeMjQ8tpHV

    l3LxYQRj0cqbF3lexXUU6KWr65iptEa4Nfj247h/M58/O6D9fn2CQJApAcEyrPJK

    /b1xChVVsdWwFrGt99HN4M0JDl0qWFwtoMiIKIXBfpNLIzKhAwKa09lDhojzCKk1

    RiybbsW4+dB8an7qqhKGyGo2YyztDo/UezXU5cIBo2VZ3AJN5JXQZl+OnkCST+l4

    qo2ncIGUPKWf/wfFrQgQnTjPlF2TFwiOA+08WFw33OUHtjG60pRxAVlThkx/s3qA

    /1lwkZY4CpS9IJih6077BfoUokJ1idxsqn/+JLE7UbAhyMwTaU4/tpL2skiRJEPo

    AdfmbxQY8cTFZ67et/ZxZhk1vS+mCD7sSV55cD9U7ovii8MKFJ0eAts4my8CNH08

    n7r6HP87jE6VuNkYDfYYIB0d1aqJA9Gdck8haZuxdvjfvVWNWRIoSz7RNMRIiwHj

    1kBBUFfSg4UCQahbvAaSFAu0gnzbE0CMFEXTt8A0xIq8YEIQlTYU7OiY/p29ZhNJ

    KBde+nC10eHZkUMfPM2O+odopB8qXxyI1tTAPso7fWW8jzEeT1E3AJowglesqy3S

    6QE2qU86LR6KstPSqA03X0AJpMq1RB3Ea7rGnSblGpPX2HEWwfSPndm4q4iKPyUV

    WrlS4aEHx/6HY1LOr1jtX2jWupd6IMjyzWvm8/y3USl6ivI+9JPFoPCudi7SfTvT

    D2r7nIxKfr8/dNy4c1DKdqc+LUT/0W2nbZALPElKZuUCOxwuXplbVu8HC+SxNKzA

    pZQX3nNu0MkWRvMPYGgfaR3099WORSvScjm86UwNEmEVu3FrK1JcLCbIoxawCwBG

    xb39tpWwa3RsNgZ9JJp2Q4TObtFa2LsIWI55T/cgYm+1rthLSrrYWsbyNK1zUGf5

    MjfIisPJL4AyBVtwyiWRbUiMUooWbcMjmscR4Ot7QQv2AxUh4O39LM9ZtJjwyKkd

    U4o1gksQCEanow4Od9S3mpAG3yo+aidNWdEumu3GIJN7SvyVvtdcipMzPD+r4Xsp

    /au7r1kRorF9eM7qMwgltYDeKdeffjIj7EiqYx2vX2rJJ8Yl+uCZaOEXOOKESmi+

    seuZxTd7dNg/Yw/nO3HPbAFWufYlS5pxgs3KaV1WpxPXOlx4cT0ifFIPtXtKySfm

    sGkDuldJ+tMgytXg9Mzj9VJa1+4WuX59Hbg8scjMFzpBA2/6pUbyY1oOZcHjgVoM

    hbU30nG1hQub3/h6ka4d+GqqC+y3xYNXA8EoVsM9Ez/lhl+F5Ul1VOlr6E8hMvjX

    vRIfdttf+sE9mryLj8RnRueDIx454PSWADViCG5R479PsZEPH8mZzMPt1ijBpBmA

    NTlImVnGYtkZTmMmPIC1Y26N/5rGi4MbVp6qHmV15qB6WlpgKyePnmrXx1FYWURk

    fyoAqM9TvidbBk4tCv20f3EjLuOPfHb3

    =1hm+

    B) I learned something today

  4. Bingo!

    So I have an encrypted .txt file ( basic OS encryption offered in Mac OS X), If I wanted to base a personal judgement (to determine if it sucks royally), is anyone possibly able to recommend how to pretty much crack my own encrypted file?

  5. *Edited 12/19/12

    Ok so here's pretty much what's up with my MK4, I can NOT see any beacon requests, no devices calling for their "remembered" ap's, not even my own devices! I also cannot connect to the MK4 (Posing as a client "Oh look, unlocked Wifi")

    • Running a Mark IV
    • Software running 2.7.0
    • Connecting it VIA Ubuntu 12.10
    • I use the pineapple WLAN out to an Apple Airport Express , which is wirelessly connected to my router. If necessary , I occasionally connect my laptop via local ethernet on the MK4.
    • Wireless, MK4 Karma (Which doesn't work, I see ZERO beacon requests from other devices, including my own.), AutoStart, Cron Jobs, URL Snarf, DNS Spoof
    • Ping results : Average 1.583 ms, no higher than 1.85
    • Is the problem repeatable (Every time the MK4 is on):
    • Nothing had to be done to recreate things, I just suddenly stopped seeing beacon requests. I've actually re-flashed the pineapple twice, a 100% clean slate.
    • Basic system log *Warning, it's pretty lengthy. Sorry, just providing anything that might be useful :)

    00:01:14 Pineapple user.info sysinit: sh: write error: Invalid argument

    00:01:14 Pineapple user.info sysinit: sh: write error: Invalid argument

    00:01:14 Pineapple user.info sysinit: setting up led WLAN

    00:01:14 Pineapple user.info sysinit: setting up led WAN

    00:01:14 Pineapple user.info sysinit: setting up led USB

    00:01:14 Pineapple user.info sysinit: setting up led LAN

    00:01:14 Pineapple user.info sysinit: Selected interface 'wlan0'

    00:01:14 Pineapple user.info sysinit: OK

    00:01:14 Pineapple user.info sysinit: /etc/rc.common: eval: line 1: can't create /sys/class/leds/alfa:blue:wan/mode: nonexistent directory

    00:01:14 Pineapple user.info sysinit: /etc/rc.common: eval: line 1: can't create /sys/class/leds/alfa:blue:wan/device_name: nonexistent directory

    00:01:14 Pineapple user.info sysinit: /etc/rc.common: eval: line 1: can't create /sys/class/leds/alfa:blue:lan/mode: nonexistent directory

    00:01:14 Pineapple user.info sysinit: /etc/rc.common: eval: line 1: can't create /sys/class/leds/alfa:blue:lan/device_name: nonexistent directory

    00:01:14 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.234 00:26:18:69:d2:ca

    00:01:14 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPOFFER(br-lan) 172.16.42.234 00:26:18:69:d2:ca

    00:01:14 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPDISCOVER(br-lan) 172.16.42.234 00:26:18:69:d2:ca

    00:01:14 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.234 00:26:18:69:d2:ca derek-1005HA

    00:01:13 Pineapple kern.info kernel: [ 73.450000] br-lan: port 2(wlan0) entered forwarding state

    00:01:11 Pineapple kern.info kernel: [ 71.450000] br-lan: port 2(wlan0) entered forwarding state

    00:01:11 Pineapple kern.info kernel: [ 71.440000] br-lan: port 2(wlan0) entered forwarding state

    00:01:11 Pineapple kern.info kernel: [ 71.360000] device wlan0 entered promiscuous mode

    00:01:10 Pineapple kern.info kernel: [ 70.550000] device wlan0 left promiscuous mode

    00:01:10 Pineapple kern.info kernel: [ 70.550000] br-lan: port 2(wlan0) entered disabled state

    00:01:10 Pineapple daemon.info dnsmasq[1676]: using nameserver 8.8.8.8#53

    00:01:10 Pineapple daemon.info dnsmasq[1676]: using nameserver 208.67.222.222#53

    00:01:10 Pineapple daemon.info dnsmasq[1676]: using nameserver 208.67.220.220#53

    00:01:10 Pineapple daemon.info dnsmasq[1676]: using local addresses only for domain lan

    00:01:10 Pineapple daemon.info dnsmasq[1676]: using local addresses only for domain lan

    00:01:10 Pineapple daemon.info dnsmasq[1676]: started, version 2.62 cachesize 150

    00:01:10 Pineapple daemon.info dnsmasq[1676]: reading /tmp/resolv.conf.auto

    00:01:10 Pineapple daemon.info dnsmasq[1676]: read /etc/hosts - 1 addresses

    00:01:10 Pineapple daemon.info dnsmasq[1676]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack

    00:01:10 Pineapple daemon.info dnsmasq-dhcp[1676]: read /etc/ethers - 0 addresses

    00:01:10 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCP, IP range 172.16.42.100 -- 172.16.42.249, lease time 12h

    00:01:07 Pineapple user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!

    00:01:07 Pineapple user.notice dnsmasq: Allowing 127.0.0.0/8 responses

    00:01:05 Pineapple user.notice ifup: Allowing Router Advertisements on wan (eth1)

    00:01:04 Pineapple daemon.notice netifd: wan (1284): Sending select for 192.168.0.15...

    00:01:04 Pineapple daemon.notice netifd: wan (1284): Sending discover...

    00:01:04 Pineapple daemon.notice netifd: wan (1284): Lease of 192.168.0.15 obtained, lease time 86400

    00:01:04 Pineapple daemon.notice netifd: Interface 'wan' is now up

    00:01:04 Pineapple authpriv.info dropbear[1577]: Running in background

    00:01:03 Pineapple kern.info kernel: [ 63.140000] br-lan: port 2(wlan0) entered forwarding state

    00:01:03 Pineapple cron.info crond[1560]: crond: crond (busybox 1.19.4) started, log level 5

    00:01:01 Pineapple kern.info kernel: [ 61.140000] br-lan: port 2(wlan0) entered forwarding state

    00:01:01 Pineapple kern.info kernel: [ 61.140000] br-lan: port 2(wlan0) entered forwarding state

    00:01:01 Pineapple daemon.notice netifd: wan (1284): Sending discover...

    02:16:22 Pineapple daemon.warn dnsmasq-dhcp[1676]: no address range available for DHCP request via eth1

    02:14:35 Pineapple kern.info kernel: [ 6764.700000] eth0: link down

    02:14:35 Pineapple kern.info kernel: [ 6764.700000] br-lan: port 1(eth0) entered disabled state

    02:14:01 Pineapple daemon.warn dnsmasq-dhcp[1676]: no address range available for DHCP request via eth1

    02:13:27 Pineapple kern.info kernel: [ 6696.200000] br-lan: port 1(eth0) entered forwarding state

    02:13:25 Pineapple kern.info kernel: [ 6694.200000] eth0: link up (1000Mbps/Full duplex)

    02:13:25 Pineapple kern.info kernel: [ 6694.200000] br-lan: port 1(eth0) entered forwarding state

    02:13:25 Pineapple kern.info kernel: [ 6694.200000] br-lan: port 1(eth0) entered forwarding state

    02:13:25 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.234 00:26:18:69:d2:ca

    02:13:25 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.234 00:26:18:69:d2:ca derek-1005HA

    02:11:43 Pineapple cron.info crond[5628]: crond: crond (busybox 1.19.4) started, log level 5

    02:10:46 Pineapple cron.info crond[5509]: crond: crond (busybox 1.19.4) started, log level 5

    02:10:01 Pineapple user.notice root: CLEANUP: memory looking good

    02:10:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    02:10:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    02:10:01 Pineapple cron.info crond[1560]: crond: USER root pid 5256 cmd /pineapple/scripts/cleanup.sh

    02:09:40 Pineapple kern.info kernel: [ 6469.180000] eth0: link down

    02:09:40 Pineapple kern.info kernel: [ 6469.180000] br-lan: port 1(eth0) entered disabled state

    02:09:07 Pineapple daemon.warn dnsmasq-dhcp[1676]: no address range available for DHCP request via eth1

    02:05:28 Pineapple authpriv.info dropbear[4290]: Exit (root): Exited normally

    02:05:01 Pineapple user.notice root: CLEANUP: memory below threshold, dropping pagecache, dentries and inodes

    02:05:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    02:05:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    02:05:01 Pineapple cron.info crond[1560]: crond: USER root pid 4891 cmd /pineapple/scripts/cleanup.sh

    02:00:19 Pineapple authpriv.notice dropbear[4290]: Password auth succeeded for 'root' from 172.16.42.234:34499

    02:00:16 Pineapple authpriv.info dropbear[4290]: Child connection from 172.16.42.234:34499

    02:00:01 Pineapple user.notice root: CLEANUP: memory looking good

    02:00:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    02:00:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    02:00:01 Pineapple cron.info crond[1560]: crond: USER root pid 4264 cmd /pineapple/scripts/cleanup.sh

    01:55:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:55:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:55:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:55:01 Pineapple cron.info crond[1560]: crond: USER root pid 3820 cmd /pineapple/scripts/cleanup.sh

    01:54:30 Pineapple kern.info kernel: [ 5559.370000] br-lan: port 1(eth0) entered forwarding state

    01:54:29 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.234 00:26:18:69:d2:ca

    01:54:29 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.234 00:26:18:69:d2:ca derek-1005HA

    01:54:28 Pineapple kern.info kernel: [ 5557.370000] eth0: link up (1000Mbps/Full duplex)

    01:54:28 Pineapple kern.info kernel: [ 5557.370000] br-lan: port 1(eth0) entered forwarding state

    01:54:28 Pineapple kern.info kernel: [ 5557.370000] br-lan: port 1(eth0) entered forwarding state

    01:54:24 Pineapple kern.info kernel: [ 5552.870000] eth0: link down

    01:54:24 Pineapple kern.info kernel: [ 5552.870000] br-lan: port 1(eth0) entered disabled state

    01:52:59 Pineapple authpriv.info dropbear[3497]: Exit (root): Exited normally

    01:51:06 Pineapple authpriv.notice dropbear[3497]: Password auth succeeded for 'root' from 172.16.42.234:60417

    01:50:55 Pineapple authpriv.info dropbear[3497]: Child connection from 172.16.42.234:60417

    01:50:16 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.234 00:26:18:69:d2:ca

    01:50:16 Pineapple daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.234 00:26:18:69:d2:ca derek-1005HA

    01:50:15 Pineapple kern.info kernel: [ 5304.660000] br-lan: port 1(eth0) entered forwarding state

    01:50:13 Pineapple kern.info kernel: [ 5302.660000] eth0: link up (1000Mbps/Full duplex)

    01:50:13 Pineapple kern.info kernel: [ 5302.660000] br-lan: port 1(eth0) entered forwarding state

    01:50:13 Pineapple kern.info kernel: [ 5302.660000] br-lan: port 1(eth0) entered forwarding state

    01:50:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:50:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:50:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:50:01 Pineapple cron.info crond[1560]: crond: USER root pid 3429 cmd /pineapple/scripts/cleanup.sh

    01:45:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:45:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:45:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:45:01 Pineapple cron.info crond[1560]: crond: USER root pid 3214 cmd /pineapple/scripts/cleanup.sh

    01:43:37 Pineapple daemon.warn dnsmasq-dhcp[1676]: no address range available for DHCP request via eth1

    01:43:27 Pineapple kern.info kernel: [ 4896.660000] eth0: link down

    01:43:27 Pineapple kern.info kernel: [ 4896.660000] br-lan: port 1(eth0) entered disabled state

    01:40:01 Pineapple user.notice root: CLEANUP: memory below threshold, dropping pagecache, dentries and inodes

    01:40:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:40:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:40:01 Pineapple cron.info crond[1560]: crond: USER root pid 2836 cmd /pineapple/scripts/cleanup.sh

    01:39:59 Pineapple kern.info kernel: [ 4688.380000] device br-lan entered promiscuous mode

    01:35:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:35:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:35:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:35:01 Pineapple cron.info crond[1560]: crond: USER root pid 2645 cmd /pineapple/scripts/cleanup.sh

    01:30:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:30:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:30:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:30:01 Pineapple cron.info crond[1560]: crond: USER root pid 2528 cmd /pineapple/scripts/cleanup.sh

    01:25:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:25:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:25:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:25:01 Pineapple cron.info crond[1560]: crond: USER root pid 2411 cmd /pineapple/scripts/cleanup.sh

    01:20:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:20:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:20:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:20:01 Pineapple cron.info crond[1560]: crond: USER root pid 2294 cmd /pineapple/scripts/cleanup.sh

    01:15:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:15:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:15:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:15:01 Pineapple cron.info crond[1560]: crond: USER root pid 2177 cmd /pineapple/scripts/cleanup.sh

    01:10:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:10:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:10:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:10:01 Pineapple cron.info crond[1560]: crond: USER root pid 2060 cmd /pineapple/scripts/cleanup.sh

    01:05:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:05:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:05:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:05:01 Pineapple cron.info crond[1560]: crond: USER root pid 1969 cmd /pineapple/scripts/cleanup.sh

    01:00:01 Pineapple user.notice root: CLEANUP: memory looking good

    01:00:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    01:00:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    01:00:01 Pineapple cron.info crond[1560]: crond: USER root pid 1957 cmd /pineapple/scripts/cleanup.sh

    00:55:01 Pineapple user.notice root: CLEANUP: memory looking good

    00:55:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    00:55:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    00:55:01 Pineapple cron.info crond[1560]: crond: USER root pid 1945 cmd /pineapple/scripts/cleanup.sh

    00:50:01 Pineapple user.notice root: CLEANUP: memory looking good

    00:50:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    00:50:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    00:50:01 Pineapple cron.info crond[1560]: crond: USER root pid 1933 cmd /pineapple/scripts/cleanup.sh

    00:45:01 Pineapple user.notice root: CLEANUP: memory looking good

    00:45:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    00:45:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    00:45:01 Pineapple cron.info crond[1560]: crond: USER root pid 1921 cmd /pineapple/scripts/cleanup.sh

    00:40:01 Pineapple user.notice root: CLEANUP: memory looking good

    00:40:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    00:40:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    00:40:01 Pineapple cron.info crond[1560]: crond: USER root pid 1909 cmd /pineapple/scripts/cleanup.sh

    00:35:01 Pineapple user.notice root: CLEANUP: memory looking good

    00:35:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    00:35:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    00:35:01 Pineapple cron.info crond[1560]: crond: USER root pid 1897 cmd /pineapple/scripts/cleanup.sh

    00:30:01 Pineapple user.notice root: CLEANUP: memory looking good

    00:30:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    00:30:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    00:30:01 Pineapple cron.info crond[1560]: crond: USER root pid 1885 cmd /pineapple/scripts/cleanup.sh

    00:25:01 Pineapple user.notice root: CLEANUP: memory looking good

    00:25:01 Pineapple user.notice root: CLEANUP: Karma log looking good

    00:25:01 Pineapple user.notice root: CLEANUP: Clean-up Script Executed

    00:25:01 Pineapple cron.info crond[1560]: crond: USER root pid 1873 cmd /pineapple/scripts/cleanup.sh

    00:24:03 Pineapple user.info autossh[1317]: ssh exited with status 1; autossh exiting

    00:23:53 Pineapple cron.err crond[1560]: time disparity of 22599382 minutes detected

  6. That logic makes sense actually. My laptop (Running latest Ubuntu) actually has the drive encrypted with the swap encrypted as well.

    AES: is that (in terms of intensity) similar to JQuery ? Very new to that.

    *Off to Google!

  7. I'm planning on revisiting an old plugin from back in the day with email (of course I can't remember the name , but it's in Cryogenig Storage Backup) but it was after configuring the backend, write the e-mail, and turn on the plugin for the sed draft and it would do a double-pass encryption (I had it set for two).

  8. All encryption requires a key, it is the key that makes this pass through the data different to someone elses pass through the data.

    Isn't there a way to sort of Decrypt without sed Key? If I'm blowing smoke tell me please :) easiest way to explain , think of Bond and M16, they see the encryption, and then BAM it's decrypted sometime later.

  9. Ok so as an ongoing personal research , one thing I've REALLY been wanting to get into encryption. I know there are plenty of "free text encryptors", but I want to get into the encryption that doesn't require a key, or any of that jazz, i want to learn the hard way essentially. Anyone shed some light? :)

  10. Yeah, I'd say, setup two VM's, see if you can intercept the traffic, and if you can push any data onto the receiving end and what it does to the receiving VM chat client. Only issue, is if they connect to a central chat server, might get blocked or filtered if not in the expected protocol, user agent, and format they want, so requires some digging into it. Most chat clients these days also encrypt most everything except for a few older clients and protocols, although some have addons for secure talk over the same client platforms. For example, AIM used to be sent in the clear, today I think its encrypted(haven't used it in a while) but I know pidgin implements the aim chat protocol but I think lets you also chat with encryption on if the other person is also using pigin.(don't quote me on that) https://developer.pi...urityandPrivacy

    That's what I'm gonna try to do, I have a Win7 VM , I'll get a BT5 VM going (Backtrack 5, too many abbreviations there) and play around with it. On the brighter side: I did get wireshark to function on my iMac (OS X Lion) and I was able to snag an ip. The protocol was pretty much encrypted going out, except for a few messages here and there. However: did a whois on the ip and it came back as a local ip (Local being within my city) so either they're spoofing or part of a trace route to hide their backs.

    By the way, I'm trying to do this VIA Yahoo IM, but I'm running Adium on my iMac. Should have probably disclosed sooner.

  11. Chat program in question or protocol in use? Depending on what is used, you can try wireshark to see if you get the other persons IP, but in most cases, you only get the chat programs server IP that you both connect to or proxy over.

    Best bet is to not reply at all though(since its just straight up spam), or block their nick, since some attacks, only require viewing the message or profile, for them to be able to attack you over some clients, so just reading the message or viewing their profile to see who they are, can trigger an attack. Back in the day, spamming people on AIM was rampant, and for the most part benign unless you clicked links they sent you, but if you thought to go view their profile, there were some tricks like "aol:somelinkstuff" type links you could add to your profile that when a victim went and viewed it, triggered and executed code on your machine, so just be careful whatever you do. Best to block, or report the username if anything, since these are usually drive by, random name generator spam bots, that don;t care what you reply to them and won't really get you anywhere.

    When you first mentioned bots, I was thinking like botnets or something, but instant message chat bots that spam, are pretty common and unless its a real person at the other end intentionally screwing with you, its like hitting your head against a brick wall. Painful not to smart to play along. Not a whole lot you can do. Depending on the chat program though, some of them have old school punt programs, that can kill a users connection or knock them off the chat, but most of the time, they end up being viruses or backdoors to your own computer, so wouldn't recommend trying one that claims to punt users off chat clients. You'd be better served researching the chat clients protocol, and finding bugs in the chat client itself and seeing if its possible to fuzz it with data to make it crash, and if so, see if it can be done remotely, like between two virtual machines with the same chat client and having them speak to one another, try sending data to the one VM and see if you can crash the other client with data sent to it using the same chat protocol.

    Bummer, yeah I figured there wasn't much I could really do, that would be worth any time that is. I guess if I want to have any fun (Like how you said) I could Wireshark them and fuzz like a wild animal and see what happens. Not much if any. regardless, thought it was worth a shot :)

    AOL was fun... :)

    Original Shenanigan days? That's where I started learning about computers! Result of those days: Learned how to build firewalls and port scanning B) Many other things....but that's a different story.

  12. Hey all!

    So, Shenanigans as usual. Have any of you gotten the random Instant message"

    Hey! So I love you , but I want to give you a gift on cam. Here is my url.. " and so on and so forth, or some horsecrap similar to such?

    I'm wanting to try and "Reverse" hack them, and see who the... person is and give them a taste of their own. not sure if this is a topic-appropriate discussion, figured it was worth seeing if it was.

    Any ideas would be great.

  13. Get ready for this:

    I'm wanting to make an Arduino controlled brain that I would tie into a car's audio system. some cars beep/bong/whatever when you turn the car fully over. Well this brain would be able programable to have whatever tone you want in place of the bing/bong/ting (whatever). My idea (Doctor Who fans, get ready) I want to have the Tardis sound play whenever I start my truck, for example.

    Anyone have any ideas? Not wanting to set this project in stone (yet), but just an idea I've been rattling in my mind for a while.

  14. So here is my tale of the Katana install failures:

    I downloaded the .rar and extracted everything without a fuss. Threw it onto a USB in the root (just like the site said, USB is formatted for fat32), then still following the site's install how-to, I find my way to the boot directory on the USB , and try to call ./bootinst.sh (running on Ubuntu 12.10)

    Tried changing the permissions to make it an executable (it was only read/write), chmod u+x bootinst.sh , chmod +x and even 777 & 755. No changes regardless of sudo.

    so then (with a little creativity) I called sudo bash ./bootinst.sh. Magic!! It succeeded.

    Now for the problem:

    "Flushing filesystem buffers, this may take a while....

    Setting up MBR on /dev/sdc...

    bootinst.sh: line 55 ./boot/syslinux/lilo: Permission denied"

    And I've even gone so far as to copy the .sh file over to my linux HDD, change permissions, and tried coppying it back. Nothing there.

    Cycle ended there. Wha-hu??? :blink::mellow:

  15. That's pretty cool!!! It's good to see the youth wanting to get into that. Yeah the starter kit is a good place, I wouldn't so much sit with the manual and strictly read that first. What I started with (personally) learn the board and the components on it and their functions. Outside of that, anything she can design within the laws of electricity and soldering, have fun!! :D

  16. (Speaking again as a Pineapple No0b) What language is the Pineapple programmed with? I'm wanting to create a few custom scripts (Using the Button module :D ) but again, Novice status has already been achieved for me.

×
×
  • Create New...