Jump to content

vailixi

Active Members
  • Posts

    377
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by vailixi

  1. Running services on port 4444 is going to be a dead giveaway you are a hacker. Just sayin'. If I was scanning the network and saw 4444 I would think metasploit. That brings up an interesting question. Is there a reliable way to hijack a meterpreter session? Or maybe use ARP spoofing to make the target machine think you are the intruder machine and effectively MITM the session. It would sure save me a lot of work. Just intercept the attackers commands. Nullify them. Issue your own commands.
  2. I use something like this to waterproof my wireless USB in SMA out. 2" PVC with some end caps. I put a twist on cap on one side so I could access the device and put some teflon tape. Pretty much just like you would to seal a pipe. What I used: PVC primer and cement, silicone sealer, PVC pipe and fittings, about 30' of 550 cord, a side release buckle, a cheap carabiner (Not for climbing or heavy load bearing), teflon tape, an SMA 200 cable, a USB extension cord. I put the cord and clips on there then I realized all of the cord are kind a cluster so I will probably redesign it so the cord roll around the container and put some velco straps to hold them in place when not in use and maybe a MALICE clip so it can mount to the MOLLE system on the outside of my pack. Here's the thing with an outside AP. You don't put the AP outside you can just drill a hole and run the antenna wire outside and mount the antenna. That is probably cheaper than buying an outdoor AP. Or just build a waterproof enclosure for it. If you need cooling just fill the thing up with mineral oil and run some copper rods out of it for heat convection. I mean like unless you really need to install something that makes you look pro.
  3. I had an issue with running armitage on the first go. I fixed it pretty easily. In fact so easily I thought it was just something I might have done. usually it was: service postgresql start service metasploit start armitage Butwhen I went to run armitage I got some errors. So I ran: msfdb init msfconsole msfupdate Then I tried again and armitage worked fine. I have no idea what happened or why but I hope that helps anyone having that kind of issue. I'm not sure the commands or the order I ran them. I downloaded Kali via torrent and the network speed was great considering my location. I noticed flash and all of the audio stuff that is notiorous for being buggy on Debian works right out of the box and that is a bonus because watching a tutorial or listening to music improves my overall computing experience. I'm going to see how well veil-evasion is supported on 2.0. Update: veil-evasion installs fine Update: I also noticed my ALFA usb wifi dongle is now fully supported. I mean I can actually run it like a regular wifi card with: ifconfig wlan0 down macchanger -r wlan0 ifconfig wlan0 up I had some issues with downing the interface before where it would throw a lot of flags and pretty much just not work. So I could only change the device's MAC by preup. So once the networking came online the first time the MAC could not be changed again. This is About to hack this old Netgear and test out pixie WPS.
  4. I probably posted in this thread before. But I didn't feel like checking. I read through the last couple of pages and it seems there are some interesting people joining lately. Favourite game: Ninja Gaiden (NES 1989) Favourite OS: Anything Debian Nationality: American Accent: Northwest (Basically no accent) Sex: Male Race: White (Cosmopolitan European) Height: 5'11" Build: Semi Athletic Music: Anything high energy Favourite book: Too many to count Other hobbies: Making interesting things from paracord. Anything bushcraft. Martial arts: Braziallian Jiu Jitsu, Wing Tsun Kung Fu, Muay Thai, Western Boxing, I'm also good at knife thowing and a few other random skills. Car: I have a beater. I usually walk. Occupation: Swiss army knife Status: Single. Looking for Mrs right. Mrs right now is fun too. Trying to keep some momentum going in my personal and professional life. I'm what psycologists call an underrachiving genius. What it really is, once I learn something I get bored of it right away. Or at least that's the way it used to be. I've been working 10 hour days back to back for a long time now. I just realized most of this is not about hacking.
  5. Are there any good side srolling shooters for Linux. Old school like Contra and Metal Slug?
  6. I know you can log MAC addresses along with the manuafacturer information with airdump-ng. You can also log the GPS information. It's a one liner you can run from terminal but I can't remember it right off hand.
  7. You should check out PHP/MySQL tutorials on thenewboston YouTube channel. There are 200 video tutorials total. There is a search engine tutorial that goes into exploding and splitting strings. Stuff I really don't know how to do in PHP. I hate PHP with a passion. Also there is the MySQL manual http://dev.mysql.com/doc/ Also there is a pirate bay clone on github. https://github.com/isohuntto/openbay There might be some code there you can use. If I remember right there is a SQL dump of TPB available and that's a lot of torrents. I'm going to give my two cents on torrents. Torrents are a great way share files. Since I do almost everything with software I can build from source on Linux I don't really need to download anything illegally. But when I'm downloading a Linux image torrents seem to be a lot faster than a http or ftp download. What I think would be great is a site full of open source software of creative commons documentary and educational type movies. I would like to see a lot of YouTubers make their videos available for download.
  8. That Glenn Beck clip was cash. I remember people telling me I couldn't put metal in the microwave. Then I wrote a blog post on microwave smelting. Here's a video.
  9. I'll try live booting. I hadn't thought to check the image that way. I probably should have. Sweet on 2.0 being avilable soon. I wonder what fancy new gadgets it will include. Veil-evasion and the WPS pixiedust fork of Reaver would be nice to have preinstalled.
  10. Recently I've had this issue with Kali 1.10a in Virtualbox on Ubuntu 15.10. I have no problem installing the image. When I try to boot the new install it just crashes at login. I thought to myself crap Kali isn't wanting to work. So I decided I would just use Debian and just install kali-linux-all over that. When I try to boot into debian-8.1.0 I get a no bootable media found error. So this has me wondering is this a Virtualbox issue, an Ubuntu Issue, or an issue with Debian 8? I'm leaning toward it's an Ubuntu issue because I've never had this kind of issue with other host operating systems and Virtualbox. But really I'm not sure. One thing I noticed when I booted into Kali was that the microcode failed to update. This shouldn't even be an issue right? Microcode updates happen when you do bios updates and whatnot right? No idea. I've been trying to spend more time outdoors lately. I jump on my computer to do some stuff. Nothing works again. Go figure.
  11. True, it's more likely somebody was butthurt about not getting a bug bounty and then sold or published the exploit. As far as the profitability of commerical exploitation I'm not sure. I've never tried it. But it seems commerical blackhats use the oldest possible exploit to get the job done. The upgraded version of the kit usually has newer exploits. Hypothetically if one was really good at e-whoring, social media marketing, or search engine optimization, mass exploitation via web exploit kit could be fairly profitable. User visits site and becomes part of the botnet.
  12. The stuff I'm thinking of isn't thick like coax. It's about as thick as ethernet.
  13. Some ISPs have WPA keys which are mathematically related to user information such as the user account number or telephone number. Some are hashes of these numbers and some WPA keys are phone numbers. So in cases like this you can look up the area code(s) and prefixes for the local area generate a phone list from that. In the case of account numbers It's just a matter of knowing how many characters the account number is. If you know the hashing algorithm you can generate a wordlist for that ISPs access points. Then write a script to generate lookup tables for every single standard ESSID within the scope of. Some of them are MY-WIFIXXXX. So basically all of the ESSIDs are predictable as far as their names. So a 10 digit numeric list should probably be included in any WPA wordlist.
  14. On of the guys I work for wanted to print some documents from his iPhone and iPad. I started looking up software. Seems only a few printers work with iPhone and iPad. I would have thought that any network attached printer would work. But they are not all airprint compatible. The printer he's wanting to print to is a LaserJet P2030 series. I wasn't sure if there was an app that would work for this. There is a Windows machine there as well. So I had thought about setting file sharing betweent he phone and and Windows machine so he could drag and drop the documents to the PC and use a VNC viewer to print from Windows but that is a lot more steps than just printing from the iPhone. So is there an easy work around for this?
  15. Just overpriced military gear. Nothing to see here.
  16. If you were just going to do like 4 characters prefixed, suffixed or both you could just put all of the 4 char sequences into a string array and for each iteration just concat the the extra chars to the dictionary word. Also if you are working with a list of names you could just grab the sirnames and firstnames and make two arrays. Then loop through and concat the first+last or last+first or first.last or first+middle+last or whatever. If you're doing emails addresses you grab a list of the top email provider domainnames and just output that at the end. Great way to send spam without sending spam. Just make an email list and put them into your email provider's address book. Then sign up for a throw away facebook account and add contacts from address book. Or say you are looking for person on LinkedIn and you want to add them so you can get a job. Just use permutations of the first+last+domain until you find their real email address to send them an invite. Sorry for birdwalking from the orginal subject. Most words if they are capitalized are just capitalized at the beginning except names and some things that are camel cased. Then you could use some substitution rules like for 1337speak, fauxcrypt, or other sensationalized spelling rulesets. BTW if anyone knows how to do that with string streams in C++ please post an example. But here's just a tiny bit of code. Sorry for being so lazy on the code lately. Working a lot. //Simple program that outputs mangled words from a list and puts the output into another list. #include <string> #include <sstream> #include <iostream> #include <cctype> #include <fstream> int a; int b; int c; int d; using namespace std; int main (int argc, char* argv[3]) { {ofstream myfile; myfile.open (argv[2]); { string line; ifstream infile (argv[1]); if (infile.is_open()) { while ( getline (infile,line) ){ for (a = 32; a <= 126; a++){ for (a = 32; a <= 126; a++){ for (a = 32; a <= 126; a++){ for (a = 32; a <= 126; a++){ cout << line << char(a) << char(b) << char(c) << char(d) << endl; cout << char(a) << char(b) << char(c) << char(d) << line << endl; // I forgot how to do string streams for concatenating strings in C++ But if you are going to run crypto against each output you will need to dump each line into a single variable. } } } } } infile.close(); myfile.close(); } else cout << "Unable to open file" << endl; } } return 0; } Also I think it would be a fun project to collaberate on a wordlist compilation.
  17. I grabbed every list I could find from places like skull, hack forums, various english, french german, latin dictionaries, dictionaries of medical and science terminology, short lists, leaked passwords. That was about 100GB total and about 1300 lists. Then I used some bashfu to make sense of it. Split, sort, awk, sed, uniq, and some other commands. I'll see if I can dig up the commands list. There are a lot of ways to sort with BASH so if you do it different or have something to add please share. The simplest way to merge wordlists is with cat. cat *txt > mylists.txt You can pipe cat. cat *txt | sort -u -i > list1.txt You can pipe some more with nawk. cat list.txt | nawk '{str=$0; if (gsub(".", "") <= 63) print str}' > list2.txt cat list2.txt | nawk '{str=$0; if (gsub(".", "") >= 8) print str}' > list3.txt Once the wordlist gets to big it will start sucking up all of your RAM and swap so you will have to split the list down to managable size. split --bytes=2000000 --verbose wordlist.txt More BASH #!/bin/bash count=0 nums=$(ls -l | grep -v ^l | wc -l) echo "Processing $(ls -l | grep -v ^l | wc -l) original files" for i in $( ls ); do echo "Processing $i" mv $i temp.txt cat temp.txt | nawk '{str=$0; if (gsub(".", "") <= 63) print str}' | nawk '{str=$0; if (gsub(".", "") >= 8) print str}' | sort -i -u > $i done; sort and merge sort -imu -o newmergedfile.txt * I think the script would be something like the following. Sorry in advance for syntax errors. It's pretty much copy pasta from my notes and editing off the top of my head and it's pretty late. Long day today. But you get the gist of it. #!/bin/bash count=0 nums=$(ls -l /root/Desktop/mylists/ | grep -v ^l | wc -l) echo "Processing $(ls -l | grep -v ^l | wc -l) original files" for i in $( ls /root/Desktop/mylists/ ); do echo "Processing $i" # this will sort each text file alphnumerically and cut strings shorter than 8 characters and longer than 63 and remove whitespace $i ((count ++)) mv /root/Desktop/mylists/${i} /root/Desktop/mylists/temp.txt cat root/Desktop/myslists/temp.txt | awk '{ print length, $0 }' | sort -n | cut -d" " -f2- | nawk '{str=$0; if (gsub(".", "") >= 8) print str}' |nawk '{str=$0; if (gsub(".", "") <= 63) print str}' > $i rm /root/Desktop/mylists/temp.txt echo "$count / $nums complete" done; Basically you'll want to split the lists into managable sizes so the bash utilities don't crash do to memory allocation issues. Then sort them for uniqs merge etc. I'll see if I can find some of my older command line histories. I was in the habbit of saving them for a while. Incidentally. I've had one person interested in a copy via mail but the individual is in the United Kingdom. If I ship something like a wordlist is that going to get me in trouble?
  18. I'm looking for a wifi antenna cable but I'm not sure what type of cable I should purchase. Are SMA and LMR compatible? Are there adapters? What are the parts called that I'm looking for? It's the kind of cable you connect a wireless device to one end and an antenna on the other. I want to run an antenna up a tree in the back 40 and maybe some other stuff. Are wifi cable and TV cable essentially the same except for the connector sizes? The pictures all look the same on Google. Anyway what parts do I need? LMR-200? is that what I'm looking for?
  19. I have a list with about 1.3 billion words 8-63 chars (about 15.5GB). It took me about month to create. I would be willing to burn that to some DVDs and mail them to anyone who wants to start a torrent. I just don't have the upload speed to with my ISP because I'm in the boonies. So I'm not even going to try to send that much data. It would be depressingly slow. I've heard a lot of people say that having a smaller list and a good ruleset for creating permutations works just as well even better than having a large list.
  20. It's probably common practice for some companies to leave critical bugs in working code and cater the exploit to vulnerability which can then be sold. Ethically questionable but highly profitable. I have 2067 packages installed on my machine right now. Many users have more than that. More installed programs means more lines of code. More lines of code usually means more bugs. And there are a lot of people who will install an application recommended by a friend. Mobile apps and browers plugins are often installed without a lot of descretion. How many facebook games use Flash? What is Adobe's motivation for giving away Flash for free. Plenty of programs make use of deprecated libraries. Do devs do this on purpose because they know there are vulns in the code? It's sure it has happened before. It would be easy enough to deny that anything like that was going down if the bugs are discovered and published down the road. Just think of a developer who is hard up for cash. He is one of a few hundred people working at a software company. Some intelligence agency, foreign or domesty, or cybercriminal pays said dev a large sum of money and all he has to do is include some buggy code that will probably go unnoticed for the forseeable future. The software product is installed on millions of computers. And so it goes. So say there 1000 or so software packages with critical bugs being produced at any give time. Keeping the abc companies or kackers who are in the know out of your computer may prove quite difficult. Incidentally I just figured out something cool. You can pipe the output of dpkg to wc like this: dpkg --get-selections | wc -l I also leave you with this question since I'm not really up on forensics and bug hunting type stuff. Antiviruses use signatures to scan viruses. Is there a software to scan for bad code. Like take an object dump of each object and compare strings and functions to functions and strings in a database for possible matches. Then alerting the end user of possible security risks that may arise from installing the software. I can see how hackers would just use this find security holes in systems and software and I understand that code can be obfuscated or encypted to avoid detection. But nontheless it might be useful to come up with something that does this. So rather than scanning for malicious software you would be scanning for the vulnerabilities that will allow malicious software to be installed on the target system. You could also create an online database of known checksums of version of each library or object to verify that it is what it says it is as per what. Software could query the database for checksums to validated the each package cryptographically. I realize it's possible to create to packages with an identical checksum that are toally different. Just basically keep encoded the file until you get a collision and bob's your uncle. Most people just don't have the compute power for this though.
  21. Some howtos here: https://www.offensive-security.com/metasploit-unleashed/ If youwant some books https://www.nostarch.com/catalog/security Metasploit: The Penetration Tester's Guide is a pretty good title for newbs.
  22. Yeah I'm thinking a 7" tablet would be fine. The 4" width would be ok. Anything bigger is just to clunky. Anything smaller is lame because I don't like squinting or trying to read up close. I'm thinking I'm going to go with Kydex for the holder and some 50mm webbing with velcro. Not sure on padding it under the Kydex portion. But I think Kydex, rivets, webbing, and velcro I'll be into it for about $20 in materials. Maybe a bit more. I need the waterproofing. It will be affordable but not be a piece of junk. Not $300. And more importantly custom.
  23. I suppose. I'm thinking the tablet is still going to be the most viable option.
×
×
  • Create New...