Jump to content

Dec100

Active Members
  • Posts

    62
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by Dec100

  1. Digip and GuardMoony are right - There are great success stories of people who dropped out of school and made it big, but these are good stories because it's rare. For most people, building up via a good education and then experience is the way to go, and most decent employers know this and will support it.

    "Putting a company together" doesn't sound that solid to me, but if they will pay you a contracted wage while at the same time continuing your education...

    Was the potential employer also in school or what? Why were they there?

  2. Yeah, it is a kick, but it's part of buying from abroad.

    Try to use the local postage service rather than UPS, when possible. These will come via Royal Mail, who are a bit less pedantic on these things. I believe UPS add a fee when they have to collect the duty, so you were probably asked to pay that as part of the fee too.

  3. I haven't searched to see what's already out there training-wise, but I'd be most interested in smartphone/tablet forensics personally. Basic things like how to take a forensic image of a phone/tablet don't seem so straight forward on these devices, so I think a course where you bring your own device and then go through a mock investigation would be fun.

    I guess it depends on whether you are aiming this at LE/professionals or forensic newbies/hobbyists.

  4. Depending on where you are dialing from, you may need to press 9 for an outside line (e.g. from a work place or some hotels).

    Aside from that, what Tom said. Whatever number it says on the cab firm's card or yell.co.uk - just dial that.

    I am traveling to Leeds

    My commiserations (I kid, I kid). :)

  5. Good stuff - Glad you got it fixed!

    I'm speculating, but from your trace it looked to me like the devices and the server were getting out of synch on the connections. For example, reasons the server may respond directly with a RST could be because of a firewall/HIPS (unlikely because it was working before) or because the server thinks it already has a connection open to that device on the same port. It suggests to me that the device thought the connection had closed and was trying to re-establish it, but the server thought the old one was still open so was rejecting the new connection. All guesswork, of course, but certainly Nuance's issue to fix.

  6. Your best bet is to download VirtualBox (or similar) and create your own VM lab to practice in. You could then have a VM running Windows XP or 7 as your target machine, and a VM with Kali as your attack machine. There are also a number of purposely vulnerable Linux distros/apps available to practice attacking in a VM lab.

    Look at:

    Damn Vulnerable Web Application - http://www.dvwa.co.uk/

    Mutillidae - http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10

    Bad Store - http://www.badstore.net/

    Metasploitable - http://www.offensive-security.com/metasploit-unleashed/Metasploitable

    And loads more I'm forgetting.

    If you can't set-up your own lab, there are various paid-for labs you can rent access to, but I've never done that myself.

    I believe this one is free, but I've never used it: http://www.hackthissite.org/

    Good luck!

  7. I can vouch for violent python, great book and very entertaining :)

    I'm not the original poster, but just wanted to say thanks to you and iamk3 for the Violent Python recommendation. I got the book after I read about it here, and it really is fun.

  8. Well Wireshark should show you any TCP resets.

    What about looking for patterns? For example, do the devices lose connection after 30/40 minutes regardless of use, or is it only when they haven't been used for that long? If all devices lose connection at the same time, and regardless of when they were last used, it sounds like the server is the key and I would start looking on that.

    Obviously, make sure you have the latest hot fixes and software installed.

  9. Just having a thought, I'm assuming I just run wireshark on the server then filter out the IPs of the MFDs that talk to it. I'll have a look tomorrow.

    I think you are on the right track. IP display filters for Wireshark:

    "ip.dst == x.x.x.x" (Match destination IP)

    "ip.src == x.x.x.x" (Match source IP)

    "ip.addr == x.x.x.x" (Match either)

    I believe you can also specify networks (e.g. "ip.addr == 10.10.0.0/16").

    Incidentally, your problem sounds like it could be something like the NICs going into sleep mode or some such? Might be worth looking for an option along those lines in the MFD settings. I'd probably be asking Ricoh support before spending my time sniffing packets, because this may be something easy to fix they see all the time.

    Good luck!

  10. i also found a windows version on btscanner from pentest..

    Sounds good - If you get something scripted, let us know how it goes.

    In theory, you could get something logging Bluetooth, wifi probes and audio/video, which you just set running when you leave the house.

  11. MalwareBytes (the business version, at least) has command line options to run silent updates and scans, so you can certainly script that and save the log to a location of your choice without user input.

    I'm not sure what else to say without knowing the specifics. In general terms, you just need to write out what you want to achieve and what is wrong with the current process. Then you can go about finding improvements, whether by purchasing different tools, creating better scripts, or by identifying better processes. Break it up into little problems (e.g. that program crashes out) and look at them one by one if you don't know where to start.

  12. Not to piss on anyone's fire, but remember you can't fully trust any third party.

    Obviously, it depends on what you are doing, but assuming you are some kind of political activist in Narnia - I don't think you can trust any VPN provider. Even if they don't log anything, what's to stop the authorities seizing the servers and turning on logging? I doubt they are obliged to tell the customers if they do.

    If you just want to hide your Google search data or watch the BBC from the US, fine. If you want anonymous Internet access, you aren't easily going to get it from home.

×
×
  • Create New...