Jump to content

Pwnd2Pwnr

Dedicated Members
  • Posts

    580
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by Pwnd2Pwnr

  1. Wine always leaves me with headaches (red and binary)
  2. I have been a member of H5 for around a hear... +/- . Before here, I was a long time member of spiceworks (great place, just a little dry). This forum has allowed me to mature as a security minded network admin. Passion is all that you need. PM me for some great reading material :) HEURISTIC FREE
  3. The great thing about the truth is that it takes little or no thought. Lies need energy; truth needs nothing. ;

  4. Pwnd2Pwnr

    Acunetix

    I agree, Digip; but they want the "full package"... I am getting less than 300 $ for about a weeks worth of work (only had to patch Skype :) ) *update* They purchased the scanner... I got to say... I kind of like it. PS... They also gave me an account to their PRTG ... :)
  5. Pwnd2Pwnr

    Acunetix

    I am currently in the market for an "all in one" web vulnerability scanner... the kicker? It needs to be for Windows... Some people just need to spend money, I guess. I have found a couple of them... but the one that caught my eye is Acunetix. I have gone through its 'capabilities'... but fail to see what differentiates that from, say, w3af (although w3af is buggier than bird shit). After test driving the demo; I would have to say that I do enjoy it. The ease of use is pretty cool... yet; I fail to see why they should pay 2,000 + dollars for a vulnerability scanner. Again; they do not want any linux clients... they seemed 'overwhelmed' by it :( Should they purchase it? (I would get a copy of it, too :) ) Any other easy to use vuln scanners I should suggest?
  6. One positive = They thought it was good enough to steal ... ... I am not anywhere near the programming level of people like you, sebkinne, etc., but isn't there a way to bind your Attack Scanner for updates, serial/integrity checks so you can have a cache and verify all of the AS's you sold? (I sound like a Welshman, jk :) ) All in all; they have lost my trust AND I will not support/read any whitepapers, docs, info, etc. as they are probably someone elses' work. B)
  7. @reckles: The word 'bypassing', in itself, is showing me that you have no authorization to get into the systems. The words 'non-repudiation' means you must have some type of authentication to access certain things; like a signature to a credit card. If you did not sign a credit card receipt; you could contest the charges because you, the account holder, did not sign/authorize the charge. The same validation methods are in place to keep people with malicious intent out. If you want to have ANY type of career in the field of IT; you better not mess up your record. @Digip: I feel this thread should be terminated... nothing valuable is being gained here. If he truly were allowed, the IT admin would set it up for him from school. I don't want to be involved in any type of fraud...
  8. Assuming you had/have permissions. You will need his (admin) assistance to allow your client to access the server. You will need an RSA auth key I do believe. Also, I assume you have the non-admin password to the server (which, of course, is for non-repudiaton). Your systems admin shouldn't have an issue walking you through the nescessary process. But, I can't stress this enough... make sure you are sure that you have permissions (in writing to cover your own ass in case anything fishy happens). You can ssh via command line: ~$ ssh (remotenetworkname)@(remotenetworkIP) please enter password: ***************** (you will need an RSA auth key from your admin, to which I can help you with when you get to this point) easy peasy :)
  9. I am not sure if you are listening, reckles. Do you have permissions for accessing ssh to the schools server? What is your intentions? This would be much easier if you just asked the admin why you can't... I personally do not run the server; but if I saw multiple failed attempts in my IDS and tracked it back to you... I would believe you are having malicious intentions for the mere fact you did not ask me (if I were the Admin). Not trying to be a dick; just saying that they are not forgiveful. Schools don't need evidence; they just need word of mouth.
  10. It seems to link all to FFx. Perhaps an extension?
  11. So, how would you classify infosec as? Malicious?
  12. Network+ is in the bag

    1. newbi3

      newbi3

      Very nice! What are you working towards now?

  13. @Digip : I would definitely agree that I have never heard of an ISP redirecting to sites like that. One would think that they would nip that in the ass quickly. @Stevie : Have you slapped any firmware changes to your router? Or, if you have wireless connectivity; you may have been "reaved". Do you have WPS setup? Check your router configs and make sure your not forwarding your traffic to bigwebhost.com (or whatever site it may be). Also, have you ran a netstat -ano? The answer is there; were just not looking in the right place... hopefully your kernel hasn't been rooted.
  14. Hmm... I got the article from packetstormsecurity... good to know, though. :) . I will shoot an email straight away .. jk jk ;)
  15. I have no clue what you just said... Barter for auctioning on Ebay? Shopping @ amazon in the Amazon?
  16. I was perusing an interesting article. I am sure others would like to read about, too. I bring you... http://resources.infosecinstitute.com/gauss-between-technology-and-politics/ Amazing...
  17. Sorry for delayed response. I knew it was something like that. :) . Glad I could help!
  18. Who is your ISP? Big name? No name?
  19. I would go ahead and save myself the money and just get a standard parabolic antenna. They are basically the same thing as the one from radiolabs; except for nearly half the cost. As for the power situation; I know that I have seen people connect a small battery through a dampener (I think it is a dampener, could be wrong)... essentially something that cuts the power down to 12V continously. I can reiterate later; got errands to do... :)
  20. You can also use gparted. Cmds ~$ dmesg ... [ 3.274912] scsi 6:0:0:0: Direct-Access SanDisk Cruzer Blade 1.26 PQ: 0 ANSI: 5 [ 3.275836] sd 6:0:0:0: Attached scsi generic sg2 type 0 [ 3.277023] sd 6:0:0:0: [sdb] 62530624 512-byte logical blocks: (32.0 GB/29.8 GiB) [ 3.278517] sd 6:0:0:0: [sdb] Write Protect is off [ 3.278522] sd 6:0:0:0: [sdb] Mode Sense: 43 00 00 00 ... ~$ sudo gparted /dev/sdb then follow the GUI to partition, format, etc. Protos will work right off rip... gparted walks ya through it :)
×
×
  • Create New...