Jump to content

Pwnd2Pwnr

Dedicated Members
  • Posts

    580
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by Pwnd2Pwnr

  1. Scary thoughts... but this may just be the tip of the ice berg... eventually ( if you look at history ), this will bring an inevitable CWII
  2. I think Kali autogen/s a key to any local Win 7 box out of the box (with privileges required, of course). Just ma 2 cents...
  3. @Digip: "only service techs were allowed to use them..." LOL... I was thinking, before continuing, that, "Someone is gonna trash their window motor."...
  4. http://www.lockpicks.com/slimjimkit.aspx There they are, logical! 1990 Is calling :P
  5. I haven't heard of it in quite a while; but I think the concept is similar to garage door openers. If you purchased a ZigBee and matched the frequency up and actively listened for car door key fobs... it doesn't seem too far fetched.
  6. I do not own a ducky... So, this is to be taken with a grain of salt; but I think if you threw it in at boot... it may take hold.
  7. https://github.com/ChrisTruncer/Veil Pretty big app... still installing it... if anyone gets a chance to goof off with it before I do; let me know what ya think. ***EDIT*** Passed Malware Bytes... :)
  8. I am just tired of those one things... they come around the same time my girlfriend usually has her aunt over.... I will remember the word eventually. I have blocked it out due to the extraordinary amount of raping all these companies have done to me... kind of like PTSD I suppose...
  9. Non computer related; but whom else feels the anxiety/panic while opening their mailboxes? When was the last time you got something in your mailbox that was worth while. /-\ Upon some extra thought; I have concluded that both forms of mail are almost never containing anything, for a lack of a better word, good.
  10. Not to be the turd in the punch bowl... but be careful and don't be naive enough to post illegal activities on the site if you are TESTING for EDUCATIONAL PURPOSES ONLY... always have the web application admins full permissions before preforming any type of scans. (Careful what you post, buddy... :) )
  11. This is being done in a VM? If so, configure the VM to bridged... Or download Kali Linux... WAY MORE STABLE and it is BT5... just better :)
  12. Thanks, digip. I am going balls to the wall SQL at the moment. I am grasping the commands rather well (about 5 pages worth of hand written notes so far). I have had relations with a SQL server... the best thing is I didn't even have to 'shell' out money for dinner :D . Good times !
  13. LOL... I am getting the same feeling :)
  14. I have found multiple ssh servers... but I have a rule of thumb... If it ain't my SSH... I ain't touching it (unless I have prior vuln assesment permissions). You do know that SSH is also a great way to send-receive illegal images (kiddie porn). I would use the side of caution when it comes to SSH... you have NO clue what maybe being sent... worse yet; if the SSH is coming from a corporation and the admin finds it... anyone whom was engaged in the SSH can/will be charged (maybe even the mitm). I am a cautious Kevin though... so do what is smart.
  15. How are my fellow freaks/geeks doing this FINE Michigan morning. I have Googled the crap out of proper configuration of SQL ninja. I have seen many pages; yet they are vague and far from being :concise:. I know I can understand most of you on these forums... but I am just seeing red and, apparently the little I did know from SQL Server 2008 is proving useless. I find myself in an constant loop of the same walkthrough. Hopefully, someone here at Hak5 knows what the hell they are doing while configuring this .conf. If someone could help in an innocous way; It'd be appreciated. SCOPE: configuring SQLNINJA whilst the other 'guys' just repeat from the forum I first perused. Thanks ahead of time...
  16. what about that wonderful ooVoo? Wait... there may be an existing 0-day...
  17. @Jason Cooper: If I read that right, Asterisk is an open source PBX? edit: I feel old...
  18. I actively run multiple key loggers on every PC in my house. If you have any questions on what is outgoing... I think a netstat -ano would be a great place to start. Then, if you find any IPs you may not know of; you can run a whois against it and maybe find the rogue server that may be logging your keystrokes. Until then, I would not risk logging into anything until you track down the logger and terminate it. It has been a long time since I have been exposed to any malware... but I think this largely attributes my lack of torrent services and piracy. Prevention is key... don't expose your PC to nasties by largely avoiding illegal activities on the internet. Hackers know what is popular and what is not... either way... the risk is rarely worth the benefit.
  19. Still reading this juicy article; but does answer almost all of the Google searches for this particular query. !*DISCLAIMER*! THIS MATERIAL SHOULD ONLY BE USED IN ACCORDANCE TO ANY FEDERAL OR STATE LAW. EDUCATIONAL PURPOSES ONLY http://schierlm.users.sourceforge.net/avevasion.html !*DISCLAIMER*! THIS MATERIAL SHOULD ONLY BE USED IN ACCORDANCE TO ANY FEDERAL OR STATE LAW. EDUCATIONAL PURPOSES ONLY I am somewhat reluctant putting this up. I have recently noticed a spike with some really "iffy" questions around the forums. If you intend to use this information against reputable companies and/or their respective affiliates; please, do not read the above said article. Use this information for the good of mankind (and please, for the love of God, be smart!). If any of the fantastic moderators hak5 has here deems it 'too obscene'... please delete this thread.
  20. Fern is a pretty nifty GUI extension of the aircrack-ng suite. I, myself, prefer the Airoscript-ng... which seems to be a little less buggy... but meh, if you like it GUI... keep it GUI.
  21. The trick, I do believe, is ascertaining the root RSA key, correct?
×
×
  • Create New...