Jump to content

Darkmist!

Active Members
  • Posts

    104
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Darkmist!

  1. i have had to re-authorize several times using my school email. if my school deletes my email then i cant re-authorize and get the software/training. or at least thats what i gather from looking at it. i think that if i log in enough i can keep it authorized. the school email is based off of the live.com email sign in.
  2. what is a great way to decompile programs such as javascript, flash, exe, etc. what programs do you, the hak5 elite use?
  3. well you can make your own TCP/IP stack and just open up up listening connections that are reporting that they have room for a connection but not the memory. this will force the connection to stay open and not be dropped by the attacker. this way you can DOS a connection with 1 laptop. my explanation is a bit fuzzy. they went into great detail on it on security now under the sockstress podcast. im at work so i cant go into much detail. but look into that
  4. WORD. i also just unlocked free training from the dreamspark website. i only have a quarter left in school so i gotta hurry up and load up as much knowlege as possible. its funny. i took most of my core IS courses in the middle of my 4 years and ive been on gen eds for the last year. my knowlege is getting fuzzy so im trying my best to stay up on it
  5. Darkmist!

    honey pot

    i want to build a honeypot. i went to the honeynet site and was trying to download the glastopf version but for the life of me i cannot find the download link. it goes to an overview page but no links to the download. does anyone have a good setup for a honeypot thats easy to configure? i think im going to install a really old copy of windows pre service pack 1 and see how long it takes to get infected just sitting on the web. use wireshark to sniff the packets and record it. any suggestions for me? part of this is to test various firewall solutions on extremely vulnerable machines. im bored with removing infections and i want to see first hand how viruses and malware can infect a machine with a vulnerability and then see it spread from machine to machine on the network. im thinking of making a few virtual machines for this and have them be in a DMZ on the network.
  6. http://www.clustermonkey.net/content/view/211/1/ good guide to clustering and making a sweet little box
  7. all you have to do is get a notebook that has a PCMCIA slot and a NIC or WLAN that fits. its individual mac address is attached to the card. you then go to a cofee shop or open wireless network and go to town. if the heat comes up just throw away the card. remember to pay with cash
  8. ok thanks. ill be setting it up and letting all know how it goes
  9. ive been perusing the forums for a while now and i havent seen a topic like this one i want to get into supporting an enterprise network but i do not have the hardware to do so nor do i feel comfortable going into a job as an admin without some practice behind the wheel. im just graduating college with a bachelors but unfortunately a lot of what ive done is theoretical and learning from books instead of hands on hardware. i wish to make several virtual machines with an AD, DNS, DHCP, etc.. and make them secured as well as monitor traffic between them. is there any software out there taht will emulate standard users network usage so that i can have, oh lets say 15 or so, users generating data back and forth? if so is it free or do i have to pay a fee for it. i can get student copies of all the microsoft OS's through dreamspark for free so i dont need to purchase the software any advice would be sweet my main server will be the basic VMware Os that matt talked about. it will have 8 GB of ram with an intel q6600 quad core processor air overclocked to 3.5 ghz. i have an evga 780i chipset mobo that i believe will handle the virtualization. any advice or tips is greatly appreciated
  10. well all i was hoping for was a good start off.. anyone know how to download the vids from security tube. i would like to put them on myipod to listen to. any site like keepvid.com would be epic
  11. One good link to encryption talk is to go to security now and look up their several part talk of asymmetric and symmetric encryption Really helped me understand it
  12. uhh.. there is a file explorer in freenas. you just log in and it gives you a web interface to view the file structure as well as all the files and their size
  13. what happened to the follow-up segments in regards to the reverse engineering of applications? i was looking forward to the followups but they have not come. i do really love the VMware topics and am not wishing for them to stop. was just curious as to where my segments went to
  14. now to add this to the hacksaw and have it automatically put this in when you insert the thumb drive
  15. i love the BTwhitetest2 one. with the actual firebreathing. looks amazing.. keep up the great work sir
  16. i was in london in early july and they have almost 0 public garbage cans because of this very reason. too likely to plant bombs in them and have the cenario that i proposed happen. (carrying around a mcdonalds bag full of garbage for miles kinda sux while touring lol)
  17. all new US passports have RFID in them and better yet it identifies you as a US citizen. so someone who is smart can make a device that goes boom that has an RFID reader and when you walk by a garbage can and your passport recognizes you as a US citizen bye bye you GG USA no other passport in the world ID's you like ours does best thing to do with new Credit cards that have both mag strips and RFID is to put it in the microwave for 10 sec. thinkgeek.com has some great passport wallets that block RFID
  18. i have a Freenas box in a relatives office andi just cannot seem to get everyone setup right. the main boss can access her share and the shares of the other users but the 2 other office workers cannot see their shares. i have a personal share for each of them and a global share so that they can share presentations and such without having to email it to each other and overloading their email system. all of the user names match up right and i have local authentication setup so they log in with their passwords for their local machines to the matching passwords on the NAS. i just cannot get the 2 other office workers to see their shares at all. they are all running Mac OS X. and there will be 2 windows PCs connected as well but those are just ancient remnants that will just be doing data backups to (financials and other things like that)
  19. i would wait until the code is released to really worry about it. of course shut down your servers just in case but its probably a hoax anyone know who these anti-sec people are?
  20. i want that background. please post the link to it. /drool
  21. great start. they need to hire more of us hackers to secure up the place. i know someone in the military with a computer that still runs Symantic corporate AV 2007. the state of our security is pretty sad
  22. lol.. classic i had a customer bitch me out for 20 min because his mouse didnt work on his brand new computer and he hated our store and everything was my fault i pushed the button just above his touchpad and turned it from amber to blue. looked up and said "well thats fixed.. anything else you had an issue with sir or were you leaving?"
  23. damn... im taking a family trip to france and england during this time. oh well.. ill have to meet up with some fellow hak5ians at some other local
×
×
  • Create New...