Jump to content

digininja

Global Moderators
  • Posts

    3,817
  • Joined

  • Last visited

  • Days Won

    165

Contact Methods

  • Website URL
    https://digi.ninja
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    Sheffield, UK
  • Interests
    Hacking, Coding, Climbing

Recent Profile Visitors

29,844 profile views

digininja's Achievements

  1. And another one https://www.fail2ban.org/wiki/index.php/Category:HTTP
  2. I assume you've fully read all the fail2ban documentation? https://www.fail2ban.org/wiki/index.php/HOWTOs
  3. It does sound like "answer my homework", but lets see...
  4. Give us more information, what type of information are you looking for, meta data, steganography, hidden but obscured content?
  5. The first thing I would do is to ditch Metasploit and test it all out with netcat. Run a listener internally, set up your ngrok, then try to connect to it using netcat on the outside. That will help you get an idea of how it is all working and to debug it in a much cleaner way.
  6. The pineapple can do all sorts of other things, the bit you are focused on is getting someone to connect to your rogue AP. Checkout all the available modules. Site Survey is built in.
  7. You don't try to go for encrypted APs you go for unencrypted ones, most people have connected to at least one unencrypted AP in the past which is now stored in their favourites list. Think the free one at McDonalds or the hotel they stayed at. There was a bug at one point with a very small number of supplicants where they would happily downgrade to cleartext if the AP they expected to be encrypted wasn't, but doubt there are many of those around any more.
  8. Do you have any stats or data to back that statement up?
  9. Don't know if you've worked this bit out yet, but all you downloaded was a copy of what was there on screen. To get the exploit, you need to download the tgz file from GitHub, decompress it, and then read its readme file for instructions on how to use it. Are you sure this is the right vulnerability? This isn't a beginner level exploit.
  10. Good luck with it then, it's a lot of work you have to do perfectly every time and unless you know you are targeted then I reckon you'd get fed up of it very quickly.
  11. Wouldn't it be easier just to get a new phone? Anything that involves so much work to try to be secure often ends up failing because steps get cut or misunderstood and so not followed correctly. Also once you put a custom ROM on there, you are responsible for keeping it patched which again isn't easy. Finally, you are going to have to put apps on the phone to make it usable, what are you going to do to ensure all of those are fully trusted? I'm sure what you are asking for is possible but often too complex to be practical and not worth the effort.
  12. Read the output, the scan has failed so it won't create any output. Don't know why, check disk space or file access permissions.
  13. ARP packets traverse layer two switches, these are the most common type, but not layer three switches or routers. The easy way to think of it is a router is where your network address changes so it does its work by IP address whereas switches work on the same subnet and so work by ARP first. That isn't really the best way to describe it, but should give you the idea.
  14. digininja

    Question

    Over here, local libraries and coffee shops often have free internet access. Don't know if it is the same in SA.
×
×
  • Create New...