Jump to content

THCMinister

Active Members
  • Posts

    256
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by THCMinister

  1. Look at the reaver/bully help and you will see a switch to specify a pin to try. It will then get the password.

    I believe it is -p

  2. I have been running Linux for quite some time now, from Arch to Xiaopan and everything in between. I have played the traditional minimalistic games that come preinstalled such as kbounce or frozen bubble, to installing UT2004, Postal 2, Counterstrike and Gary's Mod via wine. Wine becomes buggy and games don't always play smoothly. I'm aware of Steam being available for Linux now, but I'm looking more for games that are developed to run on specific to linux/multiplatorm. and preferably games not involving Steam.

    What games would you guys recommend? Also what specs would you have for the games you recommended?

  3. This may assist you in understanding.

    Trusted certificates are typically used to make secure connections to a server over the Internet. A certificate is required in order to avoid the case that a malicious party which happens to be on the path to the target server pretends to be the target. Such a scenario is commonly referred to as a man-in-the-middle attack. The client uses the CA certificate to verify the CA signature on the server certificate, as part of the checks before establishing a secure connection. Usually, client software —for example, browsers— include a set of trusted CA certificates. That makes sense inasmuch as users need to trust their client software: A malicious or compromised client can skip any security check and still fool its users into believing otherwise.

    The customers of a CA are server administrators who need a certificate that their servers will present to clients. Commercial CAs charge to issue certificates, and their customers expect the CA's certificate to be included by most web browsers, so that secure connections to the certified server work smoothly out of the box. The number of web browsers and other devices and applications that trust a particular certificate authority is referred to as ubiquity. Mozilla, which is a non-profit organization, distributes several commercial CA certificates with its products.[1] While Mozilla developed their own policy, the CA/Browser Forum developed similar guidelines for CA trust. A single CA certificate may be shared among multiple CAs or their resellers. A root CA certificate may be the base to issue multiple intermediate CA certificates with varying validation requirements.

    Aside from commercial CAs, some providers issue digital certificates to the public at no cost; a noteworthy example is CAcert. Large institutions or government entities may have their own PKIs, each including their own CAs. Formally, any site using self-signed certificates acts as its own CA too. At any rate, decent clients allow users to add or remove CA certificates at will. While server certificates usually last for a rather short period, CA certificates last much longer,[2] so, for frequently visited servers, it is less error-prone to import and trust the CA that issues their certificates rather than confirm a security exception every time the server's certificate is renewed.

    A less frequent usage of trusted certificates is for encrypting or signing messages. CAs issue end-user certificates too, which can be used with S/MIME. However, encryption requires the recipient's public key and, since authors and recipients of encrypted messages presumably know one another, the usefulness of a trusted third party remains confined to the signature verification of messages sent to public mailing lists.

    Source: http://en.wikipedia.org/wiki/Certificate_authority

  4. "PCZombie" is in reference to the name of the AP, I understand you are connecting to the "BigPond" but are you not flooding the SSIDs and using the MAC of the actual AP?

  5. I will fire up my BT laptop when I get home, hopefully be able to answer your questions. What's in the wicdf preferences? I'm Out in the field right now with Kali.

  6. print screen should do it, they should do it, the pictures should be auto saved. the screen should react like a shutter to a camera. Are you on a virtual machine?

  7. My company uses BMC's Footprints. Overall it is a fantastic product, in my opinion. Different user access roles, charts and graphs to represent response times/number of tickets/resolved by/ etc.. It has the ability to generate tickets from email, this is helpful for have monitoring software auto open tickets/close them when thresholds are met. With that being said , our instance was set up poorly, people didnt take time to understand the product before diving in. This makes it convoluted with unnecessary data/users/tickets/etc..

  8. Here is a start of a script I had written a while ago that I haven't had time to finish. It is designed to run on kali linux, it will not work on the pineapple unless altered due to it spawning a new gnome terminal. A bit more needs to be added and functions created to handle the looping, etc.. Hope this helps, I can assist you when I have time. Feel free to shoot me a message/post here.

    Bully.sh

    Edit: Code removed. I accidently posted test code, many error not to mention it wouldn't function, I will post as soon as I get time to locate my partially functioning script. Sorry.

  9. Why don't you first try determine the client(s) connecting that could be doing this. Then maybe scan those client(s) and see what's going on. Are they connecting from the same MAC every time? Things like that. Do recon.

  10. It was just SELinux. Most of the security we ran was network software/hardware based security. Routers/switches/etc.. Root was disabled but there were users with elevated privileges. Developers never had access to Production, and in Dev, they very seldom had elevated privileges. We mainly set them up with RSA keys. We had a lot of monitoring applications for linux(and windows) that was primarily for security.

  11. Monitor mode allows the card to passively collect raw data, no frames are transmitted. All packets captured are unfiltered. Some cards that allow transmitting of packets while monitoring(packet injection) allows you to obtain unfiltered packets that contain data relating to the injected data you're transmitting. This in turn allows the cracking/info gathering programs to function.

×
×
  • Create New...