Jump to content

Darkmist!

Active Members
  • Posts

    104
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Darkmist!

  1. ooh.. does the rar cracker on backtrack 4 support cuda or which one are you talking about for cuda? ps. thanks for the fast reply
  2. ok so I want to make myself an interceptor and a pinapple. however the fon site only has their fon2.0N router for sale and i cant seem to find anymore on the net. where should i go to get myself these routers so that i can create these beautiful machines they are advertised on the front page of the fon site but not in their shopping cart please help!
  3. you can use installwatch for watching what is installed where when you install an app
  4. so i have this encrypted rar file that i have from years ago, when i thought i was all 1337 and encrypted everything, and i cant seem to remember the password. i dont think it was more then 5 characters but i don't know and i wish to crack the password. i have several computers that i could run a cluster knoppix destro on and spread the work around but i want to try it on my windows box instead of going through all that setup. what does the hak5 community use to get by passwords on their compressed files on both linux and windows?
  5. if you could write applications for it, then it would be a great hacking tool. you could run all of your wifi cracking sofware on it as well as probably install the metasploit framework. if they hack it to install anything on it i will get one.
  6. Darkmist!

    bye Matt

    bye matt. wish you would stay but if you gotta go you gotta go. thanks for all the great episodes you have given us!
  7. so i log into hak5 today and get some random PM stating that im infected. was awesome. noticed they were in the banned userlist. just wondering if anyone else saw them
  8. ok thanks. ive gotten it pretty well setup. i hope to post a howto when i get it fully done
  9. take a palm tungsten or the like and put linux on it. install aircrack and other pentesting software and you are good to go
  10. lol no need to use "open source" a lot. if someone has some experience with what you need they will respond.
  11. i remember something about a web interface being blocked by java only and that if you used noscript to block the code that the web ui was just open and could be modified.
  12. this right here is why the hak5 community is the best on the web. thanks for all of the information and advice you have given me. i will be pouring over this tonight! thanks again to all digip and shonen ftw
  13. ah ok, understood. forgot about that fact. thanks for the help and the responses!
  14. ah gotcha. well i was thinking on along the line of utorrent for example. say there was an exploit within it that if you sent a payload to it that it would allow remote access of a machine. if you have 2 computers on a network that have that port opened up on the routers firewall, then you sent the exploit payload to the port on the firewall, would you get both machines or just one thanks for all of the replies so far, im just getting into pen testing and this is a question that ive had for a long time
  15. ah so you are automatically connected to the machine for which the port is forwarded to from the firewall then. how about attacking multiple targets that have the same port opened on the firewall to them. if you are just sending a connection request to the port, get you a handshake on the multiple machines that the port is forwarded to?
  16. pardon the noob question, but if you have an SPI firewall enabled (which mosty routers have) and NAT configured, then how would you connect to a host behind the router to exploit it? doesn't the SPI firewall only allow packets in that are responding to a request originated from behind the NAT router?
  17. thanks for the quick response. its going to be a database that only about 5 people will have access to. the company that i am helping out just wants to digitize their records (they have 5000 clients currently, and willl expand up to 10000 in a year or so) so a scaling issue really isnt in the top priority, i am going to do my best to secure it. i am a relative of the owner of the company so i can get there when i need but with working full time and school full time i would like the database to be easy to use as well as lower maintinence. i am looking into mysql right now, it will probably work fine but i was just curious as to what others have used as this is a vast resource of experience and theres nothing like the gods of Hak.5 giving their opinion. thanks again
  18. hello all i have been tasked with coming up with a database to host 5 thousand to 10 thousand records of various types, and was wondering what the communities best solution to an issue like this would be. my boss wants to look at sugarcrm as an open source way to keep track of them but they state that you need a database for it. any suggestions? ive seen mysql and ive heard stories of it being a pain in the ass from other coworkers, just looking for easiest to use and maintain as i have limited time to futz with it thanks in advance
  19. uh. if you have the key, that decrypts the volume, why dont you just put that key into truecrypt when selecting the volume to mount?
  20. wow thanks for the help, i will look into it. now with the javascript issue. how would you change the function without decrypting it first? forgive me, i do not do very much with programming or scripting. im still learning lol
  21. Darkmist!

    honey pot

    oh well thank you. that will help.
  22. decompiling shockwave apps for passwords and things. reverse engineering. etc. also wondering what apps people use for stepping into a running processes to inject data. mubix had a vid on his blog about injecting a score into a flash game by putting it into a running process. i am just very interested in how process injection works and how malware works.
  23. heres mine. very basic. nothing cool. duel monitor. dell 22' and an LG 19'. image is of corey taylor. i have that mask (great for holloween).
×
×
  • Create New...