Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

Profile Information

  • Gender
  • Location

Recent Profile Visitors

1,322 profile views

Drei_Drachen's Achievements


Newbie (1/14)

  1. We use a lot of web based apps. These URL's are bookmarked in their browser of choice. This worked for about 90% of our users. However, there are a select few that MUST have the shortcuts placed on their desktop. What's so funny about that you ask? Well, if the user switches computers, we will almost always get a trouble ticket saying, "I don't have access to (web based program) because it's not installed." ... ... ...*facepalm*
  2. You could also store the root password in a plain txt file. I know that's not a config issue...but hey, it is poor practice and i'm sure it still happens. LOL
  3. Are you saying that you are sql injecting w3schools? Or are you just sharing it as a SQL resource?
  4. There's a billion ways to do DoS. The long and short is that with any DoS/DDoS the idea is generally the same. You are trying to use up all the available resources of your target thus slowing down or halting the device completely. You can do ping of death, SYN flooding, infect the server with malware that uses up it's resources...etc You can also flood the system with so many requests that the bandwidth is all gobbled up. Even if the server could handle it, their bandwidth limit could not. Those are just a few examples.
  5. Bluetooth, just like wifi, runs on 2.4 GHz. So yes, your proposed setup will make things noisy. On top of that...Expensive has hell! See "Myth #1" on the link below. http://www.cisco.com/en/US/prod/collateral/wireless/ps9391/ps9393/ps9394/prod_white_paper0900aecd807395a9_ns736_Networking_Solutions_White_Paper.html
  6. Exactly...the size of the overlapping areas are going to depend on the strength of the AP's broadcasting. The stronger the signal, the closer you are that AP. So using your last graphic, if the signal to router 1 is stronger than 2 and 3...you know that within that overlapping area, you are going to be closer to 1...Upper left. If you are the same strength on 1 and 2...but weaker on 3...it's going to be top middle. Shortening the broadcast distance helps in that it shortens the radius around the AP. Meaning, if your device can see the AP, it's within (just using an arbitrary number) 25 ft instead of 50-100 ft...Which is fine...you just need more devices to cover more area. I assume it also helps because being closer to the AP means a lesser chance of interference artificially weakening the signal and throwing your math off. Your graphics are correct. Your understanding of the general concept is spot on. The actual process of finding that point within the three circles is called trilateration. http://en.wikipedia.org/wiki/Trilateration The equations are pretty straight forward. Mathematically, the challenge is going to be finding the numbers to plug into the equations. As for the coding part...best of luck to ya. B) Edit: Here is a more in-depth explanation of how you would accomplish your task. http://sdiwc.net/digital-library/download.php?id=00000223.pdf
  7. You're pretty much spot on. You need to be able to access the device and get the signal strength from preferably 3 or more wifi access points. Since the locations of the access points are known, you can look at the signal strength of each of them and come up with a relative location. You can do the same thing with Cell Towers. Their location is known. If the phone company (or law enforcement) need to track your phone, you query the phone for cell tower data and triangulate from there. If you are looking for a cheap solution (and have a little programming ability), you can use Google's API. You get 100 queries a day for free. Depending on how many access points you have in your building, their location service can be pretty accurate. Just as an example, the school I work for has ipads (among other devices). Apple also uses wifi geolocation. If I open the map program on any ipad and allow it to 'use my location', it will give me to the room, where that ipad is located. This is because we have so many AP's, it's pretty easy to triangulate. So this leads to the next question...how do Google and Apple know the locations of our AP's? Lets pick up on what you mentioned about google. They had gotten in trouble for essentially war driving their street view cars. Well...that's one way to get this info. What's another? You know how your smartphone tells you that it is sending 'anonymous' info back to the manufacturer? Guess what else it's sending...Wifi access points, Cell towers, and their signal strength at a given location. Apple and Google both admit they do it. Since smartphones have wifi, cell, AND gps...they are the perfect device. Of course, you have the option to disable this 'feature', but how many people really will? So, instead of sending cars out to war drive, they just get their users to do it for them...Pretty ingenious if you ask me.
  8. On step 6 in the screen shot, there is a place that says, "When starting from this disk, Documents and settings will be"...then it gives you 2 options. The default is "stored in reserved extra space". Below that there is a slider that lets you choose how much space on your usb that you want to use. It's default is 1gb. So my guess is that you didn't change that setting. Move it higher to allow it to partition more usable space on your usb drive. Also...there is a hak5 episode, though i forget which one, where Darren talks about how all usb drives are not created equal. Certain drives will give you better system performance than others.
  9. Is apache configured for that hostname? It needs to know that when it sees example.domain.com it serves the correct pages.
  10. http://forums.hak5.org/index.php?/topic/29492-how-secure-is-secure-128bit-vs-1024bit-webhosting-services/ ^^ See the thread above. They talked about this topic a few months ago. the short version is that there is a difference between symmetric and asymmetric key sizes. Should help clear up why some algorithms use 128-bit or 256-bit and others use 1024 and 2048 (and higher B) ).
  11. With putty, anything you highlight is automatically copied to the clipboard. To paste anything that's in the clipboard, simply right click in the putty terminal.
  12. There is a rumor that he is the guy they based the current Tony Stark character after.
  13. There is...vtp database was a typo on my part. You can type vlan database from the enable prompt and do the setup that way. However, on newer switches it will scream about that being a deprecated way to do it. Now you're supposed to do it from the config term prompt using the vtp commands. On older switches like the one newbi3 is configuring, you have to use the vlan database command.
  14. White House Down is just as bad...great action, entertaining as hell. But yeah, typical Hollywood 'soldiers'. Hollywood doesn't like to let things like reality get in the way of a good action thriller. :)
  • Create New...