Jump to content

Dаrren Kitchen

Active Members
  • Posts

    107
  • Joined

  • Last visited

Posts posted by Dаrren Kitchen

  1. Phreaknic 12 (2008) Hacker Con

    This is a quick and dirty video documentary of the things that when on around the talks and event at Phreaknic 12 (2008). Don't watch if you get sick at shaky cam movies like Blair Witch or Cloverfield. A rough timeline of the content in the video is as follows:

    http://www.irongeek.com/i.php?page=videos/...c-12-hacker-con

    Intro and leaving Louisville with Brian. Morgellon talks about hacking the Arduino micro controller platform. Sorteal talks about the LiVes Open Source video editor. AT&T Batman building by night. Mojo-JoJo soldering some stuff for the shooting range. The patron gods of hackerdom. Registration. Con swag overview. Morgellon gets his discreet logic on. AK-47 building with HandGrip and Buttstock. Froggy talks up Notacon, which I plan to go to next year. Skydog explains the Jware chair toss event, and then we compete. Rootwars hacker wargames. I ask Int80 about using his nerdcore music in some of my videos. NotLarry explains rootwars. Some iPhone hacking with Lee Baird and John Skinner. I do a little Bluecaseing/Warnibbling with the Bluetooth on my Nokia n810. John, Lee, Brian and I go to the German restaurant. I blind DOSman with the light from my camera and check out what folks are doing with the Arduinos Droops brought for folks to play with. I check back in on R00tW4rz. I blind Droops. I talk Ettercap filters with operat0r. USB door key fun with the Arduino. More breadboard fun. Nokia n810 + Ettercap Filter + Lemon-part = win. Int80 gets down with his own bad self, and the rest of Phreaknic. I find an energy drink with protein. Folks play with the hardware keyloggers I brought, and we have some epic fail with the IBM Model M + USB adapter + Mac OS 10.5. Winn Schwartau joins in on the keylogger fun. DOSman and Zack use a directional antenna from the 9th floor to search downtown Nashville for WiFi access points. Zoom in on Al. John and Lee eat jerky. Daren and Shannon from Hak5 blind me this time. :) Then they do a quick interview. I interview TRiP about the legalities of wardriving, sniffing and leaving your access point open so you have plausible deniability of copyright infringement (most likely it won't hold water in court if you are a computer geek). I give Hak5 Daren beef jerky. Ziplock had more con badges than God. I meet up with Iridium. I talk with Nightcarnage about the audio/video setup at Phreaknic. As I predicted, the Potters won the WiFi Race. I say why this was the best Phreaknic ever. Using green lasers on crack dealers. Techno in the dark, the Aiptek action HD does not do well in low light. Nicodemius shows off his Minority Report like multi-touch table. Hula hoop contest. I check back in with Jeff Cotton and his USB keyed door. I strap on my gear to leave the con. Brian and I do a wrap up of our thoughts on Phreaknic 2008.

  2. Thanks. I got this email just a bit ago:

    Subject: Err(T)or - Man I kill myself

    From:Magnus Valle to irongeek

    I would like to mention that when using TOR, you encrypt you packets on every OR, hence the name. This is why each server's are independently unaware who you are.

    Secondly, and more impotently, TOR network pads out all the packets to an equal size so you cannot analyse the traffic by looking at the size, only the frequency - and most routers have allot of traffic, so this isn't always too easy.

    And lastly, I am no security expert in any way, shape or form. I just know this.

    - iAlta

    I responded with:

    "I would like to mention that when using TOR, you encrypt you packets

    on every OR, hence the name. This is why each server's are

    independently unaware who you are."

    Yep, that's why I mention negotiation of keys with each node.

    "Secondly, and more impotently, TOR network pads out all the packets

    to an equal size so you cannot analyse the traffic by looking at the

    size, only the frequency - and most routers have allot of traffic, so

    this isn't always too easy."

    I had not heard of the padding, I not arguing with you on that point

    but can you point me to a source for more information? I can

    understand chopping them all to uniform size, but padding would take

    up extra precious bandwidth on the Tor network. Even with uniform

    packets, total amount of data in a given time can me correlated

    between an entry and exit node in a given time period:

    http://wiki.noreply.org/noreply/TheOnionRo...c315198b875f34c

    So it is a real possible attack, even if it's not something to worry about much.

    Thanks,

    Adrian

    I'm really not sure what errors he is pointing out, since I think what I said in the video was correct, if over simplified. Maybe there was a better way to say it? Is there anything you all think I should correct?

  3. IGiGLE: Irongeek's WiGLE WiFi Database to Google Earth Client for Wardrive Mapping

    A little app I wrote that lets you directly import data from the online WiGLE WiFi Wardrive database into a KML file, then view it in Google Earth.

    http://www.irongeek.com/i.php?page=securit...ardrive-mapping

    Hope someone finds it useful. The code is real ugly right now, but with some more time... If you have ideas for more functions let me know.

  4. Anyone know a good UPnP Forwarding Tool, one where you can arbitrarily put in the port and IP would want to forward to? Many P2P clients have built in UPnP forwarding functions, but anyone know a tool that lets you set it up yourself?

×
×
  • Create New...