Jump to content

Paper Tiger

Active Members
  • Posts

    26
  • Joined

  • Last visited

Posts posted by Paper Tiger

  1. Ok sooo....... How to proceed without sounding like a nut?


    I just moved to DC a month ago from Norther VA so I'm not new to this area and used to the military industrial complex. the other day I was walking my dog and swear I caught a laser in my right eye when I turned around, it was bright and that sucker HURT!!!! my eye has been hurting for a number of days now and I'm fairly sure It was a laser since I have been hit in the eye with a high powered one before, and even experience the same resulting pain. I thought nothing of it except it wasn't your normal laser and it seemed to hit me right in the eye and no where else. no laser trails like it was from a gun or laser pen.


    Well..... I went out walking my dog a few days later and when I was in the exact same location (give or take 5 feet) the same thing happened!!!!! First I got blasted in my right eye again, then I turned to look at my dog and saw the laser hit his dog tag with 100% accuracy about 20 times. It was a blinking circle of red about the size of a quarter. This wasn't a hand operated laser pen, this is something else!!! At first I thought I was crazy, but after I saw that I was convinced that it was in fact a laser I was hit in the eye with. There aren't many locations this laser could be located at, but I think this device is either being used by the parking enforcement or located in a row house nearby.


    I would like to setup some type of device that will help me locate the source of this laser so I can put a stop to is or sue someone for injuring my eye. It's been a week and my right eye kills, plus I just has Lasik only 7 months ago and this has affected my eye negatively. Can anyone point me in the right direction? even if I have to build the device myself I'm determined to locate this laser and put a stop the the chicanery. For all I know it could be some NUTTER doing target practice and I don't want to be any part of that. Please help!

  2. Sounds like alot of fun. I would love to be appart of something like this and get paid big bucks lol...

    I would suggest a noscript plugin( not sure if available for ie ) and a training class on how it works... not sure if something like this is applicable...

    firewall rules for the win.

    AHAHAHAHA - no big bucks here. I just found out I made less than 32K last year.... half of what my contract said. :( I'm about to start doing magic on the street, I love magic a lot more and it pays well during the warm months.)

  3. my thoughts exactly, I'm glad we're on the same page. It's probably setup to attack anyone it can, I have no reason to think this would be targeted. I'm going to pay that PC a visit and see if I can locate any web history from the rough time of the DMP to get more info. I was able to use this data to get management to actual listen when I say "Flash is BAD and shouldn't be installed by default and only if it's absolutely needed." currently they have it on every single box. They've been scratching their heads why IE crashes for about a month. I've been checked out because of lack of sleep and debt. I did find out good news though, presenting this actually qualifies me for some money if they impalement my idea. Too bad It's nothing like the reward for catching a 0-day.

  4. The game is a foot! ......no, actually it's a game. I've been doing some sleuthing and thought this might be fun to share. I have a few crashes on my user base's PC's and it looks to me like exploitation attempts. I'm also hoping some of you my be able to help me focus on the right stuff. I'm not 100% sure what I'm looking at, but I know this isn't the usual DMP output because I see Jscript in my crash dump stack!
    For this post I will be analyzing crashdump files from the
    C:\users\%username%\appdata\local\crashdumps

    In the past month the performance monitoring software we use is showing IE crashes. most of the IE crashes are usually simple fixes, but as you will see below some are getting crashes from Jscript running. Usually I also see a reference to Flash OCX in the dmp.

    Is this what I think it is? can you offer any further enlightenment on the situation or potential solutions? Jscript Cannot be disabled because I work for lawyers so everything is mine mine mine now now now......

    The following crash dump is slightly different from the ones I saw last week, but are still very close in nature.

    oh one more thing, if any of you know how I can get symbols paths to fix the first three ERRORS in the dump output I'd really appreciate it. I can't get a straight answer from anyone on the web, and I'm starting to think I'm the only one doing this these days. kind of like how I'm the only person I've ever met that actually read the 9/11 commission report (HINT, that report said we should attack Iraq and nothing about what happened on 9/11, and to secure the northern border because obviously we have a problem here in America with undocumented Canadians are poll vaulting across the boarder.) I digress.....

    ************************************************************ *******************
    *                                                                             *
    *                        Exception Analysis                                   *
    *                                                                             *
    *******************************************************************************
    
    
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for EMET.dll - 
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for HooksCore.dll - 
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for Flash32_20_0_0_228.ocx - 
    
    
    FAULTING_IP: 
    jscript9!NativeCodeGenerator::IsNativeFunctionAddr+c
    0a5b4e21 8b7074          mov     esi,dword ptr [eax+74h]
    
    
    EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)
    ExceptionAddress: 0a5b4e21 (jscript9!NativeCodeGenerator::IsNativeFunctionAddr+0x0000000c)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000001
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 8542d2a7
    Attempt to read from address 8542d2a7
    
    
    CONTEXT:  00000000 -- (.cxr 0x0;r)
    eax=8542d233 ebx=042eb170 ecx=8542d233 edx=34600120 esi=0a646e75 edi=34600120
    eip=0a5b4e21 esp=042ea848 ebp=042ea85c iopl=0         nv up ei ng nz na pe nc
    cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00210286
    jscript9!NativeCodeGenerator::IsNativeFunctionAddr+0xc:
    0a5b4e21 8b7074          mov     esi,dword ptr [eax+74h] ds:002b:8542d2a7=????????
    
    
    DEFAULT_BUCKET_ID:  INVALID_POINTER_READ
    
    
    PROCESS_NAME:  iexplore.exe
    
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    
    EXCEPTION_PARAMETER1:  00000000
    
    
    EXCEPTION_PARAMETER2:  8542d2a7
    
    
    READ_ADDRESS:  8542d2a7 
    
    
    FOLLOWUP_IP: 
    jscript9!NativeCodeGenerator::IsNativeFunctionAddr+c
    0a5b4e21 8b7074          mov     esi,dword ptr [eax+74h]
    
    
    NTGLOBALFLAG:  0
    
    
    APPLICATION_VERIFIER_FLAGS:  0
    
    
    APP:  iexplore.exe
    
    
    ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) x86fre
    
    
    FAULTING_THREAD:  00001348
    
    
    PRIMARY_PROBLEM_CLASS:  INVALID_POINTER_READ
    
    
    BUGCHECK_STR:  APPLICATION_FAULT_INVALID_POINTER_READ
    
    
    LAST_CONTROL_TRANSFER:  from 0a5b4cc2 to 0a5b4e21
    
    
    STACK_TEXT:  
    042ea85c 0a5b4cc2 34600120 042ea8e0 042ea8ac jscript9!NativeCodeGenerator::IsNativeFunctionAddr+0xc
    042ea86c 0a5b4c8d 34600120 042ea8e0 042ea8e0 jscript9!ThreadContext::IsNativeAddress+0x22
    042ea880 0a5b4cf7 00000001 042ea8e0 00000000 jscript9!Js::JavascriptStackWalker::CheckJavascriptFrame+0x3e
    042ea890 0a5b4d85 042ea8e0 042ea8e0 042ea8e0 jscript9!Js::JavascriptStackWalker::UpdateFrame+0xc
    042ea8a0 0a5b4da5 042ea954 042ea8c4 0a5b5a77 jscript9!Js::JavascriptStackWalker::Walk+0x35
    042ea8ac 0a5b5a77 042ea954 042ea8d0 042ea930 jscript9!Js::JavascriptStackWalker::GetCaller+0xf
    042ea8c4 0a5b5d5e 042ea954 ba7ed600 3ffc7de0 jscript9!Js::JavascriptStackWalker::GetNonLibraryCodeCaller+0x15
    042ea968 0a5b538d 3ffc7de0 042ea990 0000000a jscript9!Js::JavascriptExceptionOperators::WalkStackForExceptionContextInternal+0x15c
    042ea994 0a5b52d0 3ffc7de0 0000000a 00000000 jscript9!Js::JavascriptExceptionOperators::WalkStackForExceptionContext+0x20
    042ea9e0 0a6a5782 00000001 00000001 00000000 jscript9!Js::JavascriptExceptionOperators::ThrowExceptionObjectInternal+0x6c
    042ea9f4 0a629620 00000001 00000000 00000000 jscript9!Js::JavascriptExceptionOperators::ThrowExceptionObject+0x12
    042eaa20 0a609c8d 14f10470 14f10470 042eab08 jscript9!Js::JavascriptExceptionOperators::Throw+0x7d
    042eaa48 0a5ee9b7 00000000 00000000 00000000 jscript9!Js::JavascriptError::ThrowError+0x55
    042eaa64 0a60a3c4 00000000 00000000 00000000 jscript9!Js::JavascriptError::MapAndThrowError+0x34
    042eaa88 0a60a397 227089c0 80070005 22708a00 jscript9!Js::JavascriptError::MapAndThrowError+0x27
    042eaab4 0a60a363 042eab08 042eab2c 0a6559f5 jscript9!HostDispatch::HandleDispatchError+0x4d
    042eaac0 0a6559f5 80070005 042eab08 042eabd0 jscript9!HostDispatch::HandleDispatchError+0x1c
    042eab2c 0a518bc7 002dc789 042eabd0 22708a00 jscript9!HostDispatch::GetValueByDispId+0xf8
    042eab44 0a518b6c 0a892e04 042eabd0 0a518ae0 jscript9!HostDispatch::GetValue+0x2a
    042eab6c 0a486a06 22708a00 000000d4 042eabd0 jscript9!HostDispatch::GetProperty+0x88
    042eaba0 0a4c063d 000000d4 042eabd0 14f10470 jscript9!Js::JavascriptOperators::GetProperty_Internal<0>+0x64
    042eabec 0a50a70d 14f10470 042eb170 042eb170 jscript9!Js::JavascriptOperators::TypeofFld_Internal<0>+0x5b
    042eae8c 0a50aa8f ba7ed1ac 042eb170 02f3ee80 jscript9!Js::InterpreterStackFrame::Process+0x6222
    042eaec4 0a50aaee 042eb15c 20e70d8e 02f3ee80 jscript9!Js::InterpreterStackFrame::OP_TryCatch+0x49
    042eb168 0a48d749 20e70da0 34600120 20e70d80 jscript9!Js::InterpreterStackFrame::Process+0x49a8
    042eb29c 170114c9 042eb2b0 042eb558 0a489b13 jscript9!Js::InterpreterStackFrame::InterpreterThunk<1>+0x200
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    042eb2a8 0a489b13 31923520 02000002 37abf800 0x170114c9
    042eb558 0a48d749 3de922d6 34601000 3de91d90 jscript9!Js::InterpreterStackFrame::Process+0x2040
    042eb6dc 170114e9 042eb6f0 042eb998 0a48d3e1 jscript9!Js::InterpreterStackFrame::InterpreterThunk<1>+0x200
    042eb6e8 0a48d3e1 31923500 10000002 1620e3c0 0x170114e9
    042eb998 0a48d749 3de352ea 3da70d80 3de35010 jscript9!Js::InterpreterStackFrame::Process+0x1e62
    042ebb1c 17011559 042ebb30 042ebb78 0a48671a jscript9!Js::InterpreterStackFrame::InterpreterThunk<1>+0x200
    042ebb28 0a48671a 25d4de60 10000003 1620e3c0 0x17011559
    042ebb78 0a48a394 10000003 042ec1f4 042ec100 jscript9!Js::JavascriptFunction::CallFunction<1>+0x91
    042ebe1c 0a50aa8f ba7ec13c 042ec100 02f3ee80 jscript9!Js::InterpreterStackFrame::Process+0x3a10
    042ebe54 0a50aaee 042ec0ec 1f33d6fa 02f3ee80 jscript9!Js::InterpreterStackFrame::OP_TryCatch+0x49
    042ec0f8 0a48d749 1f33d72e 25d4f120 1f33d680 jscript9!Js::InterpreterStackFrame::Process+0x49a8
    042ec26c 17011561 042ec280 042ec2bc 0a48671a jscript9!Js::InterpreterStackFrame::InterpreterThunk<1>+0x200
    042ec278 0a48671a 25d4de80 00000000 00000000 0x17011561
    042ec2bc 0a486d28 00000000 00000000 ba7ebc58 jscript9!Js::JavascriptFunction::CallFunction<1>+0x91
    042ec330 0a486c5d 14f10470 00000000 00000000 jscript9!Js::JavascriptFunction::CallRootFunction+0xb5
    042ec378 0a486bf0 042ec3a4 00000000 00000000 jscript9!ScriptSite::CallRootFunction+0x42
    042ec3c4 0a59207b 25d4de80 042ec408 00000000 jscript9!ScriptSite::Execute+0xd2
    042ec44c 0a591247 042ec6d8 042ec6f8 ba7ebb88 jscript9!ScriptEngine::ExecutePendingScripts+0x1c6
    042ec4e0 0a5928da 3d093a58 09f763b4 1611dd24 jscript9!ScriptEngine::ParseScriptTextCore+0x300
    042ec530 04a2f434 14f056c0 3d093a58 09f763b4 jscript9!ScriptEngine::ParseScriptText+0x5a
    042ec568 04568438 3d093a58 00000000 00000000 mshtml!CActiveScriptHolder::ParseScriptText+0x51
    042ec5c0 0499515b 3d093a58 00000000 00000000 mshtml!CJScript9Holder::ParseScriptText+0x5f
    042ec630 0456896e 00000000 14208a00 3c782200 mshtml!CScriptCollection::ParseScriptText+0x175
    042ec71c 04568fd9 00000000 00000000 00000000 mshtml!CScriptData::CommitCode+0x31e
    042ec798 04938751 049386f0 042ec7c8 05780000 mshtml!CScriptData::Execute+0x232
    042ec7b8 0437d2cb 1611dca4 00000000 00000001 mshtml!CScriptData::AsyncExecute+0x67
    042ec800 0437cbf4 b873d32c 00000000 0437bf20 mshtml!GlobalWndOnMethodCall+0x17b
    042ec854 759162fa 00080b9e 00008002 00000000 mshtml!GlobalWndProc+0x103
    042ec880 75916d3a 0437bf20 00080b9e 00008002 user32!InternalCallWinProc+0x23
    042ec8f8 759177d3 00000000 0437bf20 00080b9e user32!UserCallWinProcCheckWow+0x109
    042ec95c 7591789a 0437bf20 00000000 042efb3c user32!DispatchMessageWorker+0x3cb
    042ec96c 0f59a7ac 042ec9ac 02efe9b8 00614fe0 user32!DispatchMessageW+0xf
    042efb3c 0f5d3158 042efc08 0f5d2dd0 0024afc8 ieframe!CTabWindow::_TabWindowThreadProc+0x464
    042efbfc 7757ebec 02efe9b8 042efc20 0f621f00 ieframe!LCIETab_ThreadProc+0x3e7
    042efc14 60c13a31 0024afc8 00000000 00000000 iertutil!CMemBlockRegistrar::_LoadProcs+0x67
    042efc4c 75d8338a 005dc8c0 042efc98 77b99882 IEShims!NS_CreateThread::DesktopIE_ThreadProc+0x94
    042efc58 77b99882 005dc8c0 7295cad2 00000000 kernel32!BaseThreadInitThunk+0xe
    042efc98 77b99855 60c139a0 005dc8c0 00000000 ntdll!__RtlUserThreadStart+0x70
    042efcb0 00000000 60c139a0 005dc8c0 00000000 ntdll!_RtlUserThreadStart+0x1b
    
    
    
    
    STACK_COMMAND:  ~6s; .ecxr ; kb
    
    
    SYMBOL_STACK_INDEX:  0
    
    
    SYMBOL_NAME:  jscript9!NativeCodeGenerator::IsNativeFunctionAddr+c
    
    
    FOLLOWUP_NAME:  MachineOwner
    
    
    MODULE_NAME: jscript9
    
    
    IMAGE_NAME:  jscript9.dll
    
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  566c54b7
    
    
    FAILURE_BUCKET_ID:  INVALID_POINTER_READ_c0000005_jscript9.dll!NativeCodeGenerator::IsNativeFunctionAddr
    
    
    BUCKET_ID:  APPLICATION_FAULT_INVALID_POINTER_READ_jscript9!NativeCodeGenerator::IsNativeFunctionAddr+c
    
    
    ANALYSIS_SOURCE:  UM
    
    
    FAILURE_ID_HASH_STRING:  um:invalid_pointer_read_c0000005_jscript9.dll!nativecodegenerator::isnativefunctionaddr
    
    
    FAILURE_ID_HASH:  {f79b47ef-ea32-0b27-5ba9-8a665e65198e}
    
    
    Followup: MachineOwner
  5. I know right I love this detective stuff. Too bad Management took the PC and turned it over to an outside vendor before I could complete the decryption process and use bootable tools. :( However they did tell me that they're going to pay for my OSCP to get more of this going on in house. OSCP is a good start....

    Scanning didn't show anything, and carbon black was ineffective too. the only way we knew the box was compromised was from insider threat software setting off an alarm from a time when the user was out of the office. I scanned that PC with a bunch of free tools and didn't find anything.

  6. long story short: I had a box at work get compromised at and I pulled it off the network then initiated a forensic investigation. When the vendor came back with the report one section showed a memory dump of all the accounts on the box. All except one account showed their passwords encrypted, that last account showed the password in clear text in memory. What can I start looking up to understand how or why this would happen? I figured this would be a good place to ask this question. The PC is windows 7 and the account that had it's PW in clear text in the memory dump was domain admin.

  7. Not sure what's up, Maybe it is my post count. I just tried replacing the avatar in IE and Chrome to no avail. I'm fairly familiar IP.boards so I'm not sure the issue. My first pic was 960x960 pixels then I busted it down to 250x250 once I click ok the arrows spin but the change is never made.

  8. NO ONE TRUSTS YOU MICROSOFT!!!!

    I'm not sure if it's that Bill is a Eugenicist (and owns a controlling share of Monsanto) or that the company has a horrible privacy record. Maybe it's both!

    Anyone remember Enron, AIG, or the Lehman Brothers? It's very common for any size business to fail after radical changes to how they make their income. After 30 years of charging large amounts of money for their OS Windows 10 being somewhat free is right in there with radical changes. To me this "Winux" distro shows they're in distress.

    Periphrases Linux "The operating system of tomorrow" may be the operating system of today sooner than we all think. Last time I checked there are officially more mobile devices than regular PC's - and last time I checked they all ran a flavor of Linux.

    So I take that back, Linux is the OS of today.

    The only two things I see keeping them in the game for longer is AD, and Office. Recently I heard that France and Switzerland (or Sweden, please correct me if I'm wrong) have passed laws to only use and accept ODF formatted word documents. MS is on the way out sooner than we all think. Even Xbox has been losing them money since the start. I see them trying to be like google and try to be an information company like those jack asses who record and sell your perchance information from costumer loyalty cards. Gaming is the only thing saving them right now.

    Time will tell.

    I'd say a bigger concern is why the hell IBM is still using computers in medicine. Didn't they learn that was a bad idea when they partnered with the Nazis? I guess not.

  9. Um... You want to build your own cell phone tower that basically proxies on to the actual tower?

    Yes and Checkoff would like to know where all the Nuclear Wessles are

    Probably highly illegal unless you live in Serbia.

    I think with software defined radio and dect it could be done. I hear cell phone encryption takes a lot of compute power to crack. I think the reason law enforcement or ABC company is able to monitor cell phone communications is because they can easily obtain the encryption keys from the the cellular carriers. Most telephone traffic is encrypted these days. Also I'm pretty sure cell carriers just straight up monitor your transmissions these days anyhow.

    An attacker would probably be more likely to succeed at exploiting the phone and recording transmissions that way.

    Yes highly illegal, even for the police to use! however your assumption of how it works isn't correct - When a stingray is present it forces all phones that have "WCDMA preferred " set (and older phones) onto an unencrypted 2G network and they capture the data in clear text for the most part.
    How do I know? I live and work in DC/NoVA - Stingrays are frikking everywhere man!
    Once I figured out how to know when they're being used it's easy to detect without anything special. I was messing with the IMSI catcher detector I got off the EFF website. After 6 months of zero notifications I finally got a RED hit after going out to buy beer. and contacted the developers for further info. After much back and forth with them I came to realized how the app worked. A stingray is detected when your cell phone is forced onto an unencrypted network along with a few other events to verify that you are being spied on. For me I happened to be at a 7-11 buying beer and my best guess is that apartment building nearby was being monitors for drug related crime. Plus that area is a Highway choke-point and one sting ray strategically placed there would easily records the comings and goings of hundreds of thousands of commuters. The way the software worked to detect if an IMSI catcher was operational in your area is by referencing the access point name off an open source database and if your phone was forced on to the pre-3g unencrypted network it would notify you.
    I started noticing that I would go to some metro stations and have good signal one day, but on other days I would get forced on the edge network. Those were the days that I also got notifications from the IMSI catcher detector. Plus on those same days an excessive number of "Anti-terror" cops would be standing around the metro station in a gaggle.
    As an example - my train pulls into Chinatown station, normally my phone would connect to the H+ (HSPAP) network and I'd have full signal. but on several occasions I would only get the Edge network. at the same time that station would be crawling with cops. From talking with the developers of the IMSI catcher and screwing with the WiFi pineapple I figured there was a rogue cell station with an aggressive broadcast setting. I found a way to force my phone on the H+ network by typing in a code and changing my phone from "WCDMA preferred" to "WCDMA only" - I noticed that if you are on the EDGE network then make this change you will all the sudden get the high speed network. To me this confirms that there is a rogue cell tower or a stingray present. However, if you are in an area and the cell repeater is old tech then you will get zero bars. Plane and simple, no need for an IMSI catcher detector when you can just do this manually. No all cell phones allow you to make this change and not all cell phone will allow you to switch from the H+ to an unencrypted network.
    My phone is a Nexus 4 - here is the code. Have fun hunting Stingrays.
    *#*#4636#*#* -> SEND - Choose "phone information" - half way down the page you will see " WCDMA preferred"
  10. Except that the FCC is telling the makers of the devices you buy that they should make that impossible.

    It's got a lot to do with people no longer seeing themselves as customers, but as consumers or licensees. That was a big slippery slope, and we're just picking up speed.

    Or Salves!

  11. Why pay that much?, you can just pay to sit the exams and save yourself 4k. All the materials are available online.

    Int he words of Jello Biafra of the Dead Kennedys "Give me Convenience or give me death!" Not only are they down the street, but I hear-tell Cyber command has used them in the past.

    You Rock! Thank you for sharing that super in depth review!

  12. Well aware, but it's a matter of getting the VA to pay for it rather than out of pocket.

    Like wise - I have my bennies from doing 8 years in the service too. Plus my current employer is going to pay for it. I just want a good place to learn and participate, I have a kid and a woman that don't leave me alone. It would be nice to have pure focus in a learning environment away from people with no work ethics. chances are small but I hope I get a hot teacher! LOL

    Getting anything from the VA is like squeezing water from a stone. You're better off just paying for out of pocket. Your time is worth more than dealing with it. Unless you are %100 disabled or something like that.

    Any infosec course is better than no course.

    No kidding! I was one of the first people "wait listed" before it was a thing (back in 2006) because no one wanted to give me the diagnosis of chronic multi symptom illness (that's code for gulf war syndrome, because no one wants to admit the current Iraqi war vets get it too. The percentage of people returning with GWS is the same as it was from the first war.) I avoid anything federal after my exp in the last 15 years working for the feds. A good rule to have if you like your health, sanity, and living in general is to get a private sector job. The pay is better and you can smoke pot. <I live in DC>
  13. Hi All, I was looking for some place to get to pen testing classes - I specifically want to get my CEH but I came across a place called infosec institute (link below) and they have a 10-day pen testings boot camp. They claim they train you up to 5 certs (I only see 4 listed - CEH, CPT, CEPT, and ECSA) that's still a lot regardless. The Test Vouchers are all included as well. That's a large promise, and I'm only able to find reviews from their own site. We all know that can be faked. Has anyone ever heard of them? Are they any good?

    I talked to one of the instructors and was told that since I've done some CD key cracking (ollydbg, ida, reading machine language, etc) and built my own linux from scratch I should be good. I've been taking the time to learn as may of the tools in Kali as I can and even setup a xenserver lab and am following along with a syngress book on the basics of pen testing.

    Here's the link to the 10 day pen test boot camp -

    http://www.infosecinstitute.com/courses/10day_penetration_testing_training.html

    Also you the HAk5 crew - I'm in DC and would LOVE to come out to one of your Pen-testing with hak5, but the notification time is too short to get a flight, lodging, and tiem off work (the last is the main issue since I'm in an understaffed HD) - any chance I could get a heads up on when the next one after September will be>? a rough guess is good.

  14. Wow this conversation went off the reservation..... Let's not forget Ted Stevens and his "The internet is a bunch of tubes." comment.


    The issue these folks have with the pineapple is not that it's being sold. The issue is that there aren't any hurdles in the way of someone installing something like SSLstrip. I have to admit I was in the same boat as this senator was until I got my own pineapple and found out how useful they are when you get past the cafe SSL senario. In point of fact the WiFi pineapple did what it was intended and made people aware of a major security issues with ssl and how wifi clients work. I chalk up the negative attention towards the pineapple as Darren just being a good showman. He did such a good job in his debut demo of the pineapple that he scared someone. Next time pretent to break a sweat, and make it look a little harder bro.


    Just remember the opening of the declaration of independence blames King George for sending an army of Bureaucrats to eat out our substance. Sounds all to familiar today.


    We really need an age limit on congress. If you're so old you can't drive a car you should not be allowed to drive a whole nation!


    More strict language to reign in the courts is also needed. I'm all for a 5 year limit to all government positions unless you progress. And gov pensions should be no more than beer money because it's service to the public not to thy self. I've see too many worthless people that milk the system and I find it disgusting. Most people read the Constitution and stop after the first two articles, but if you pay attention to the size and scope of the first two Articles vs Article III - Article 3 basically says NOTHING! It amounts to something like "Judges have to be good boys and girls or they can't be a judge anymore and you can't dock them any pay." It also talks about Treason, but seriously glazes over the fact there is no control over the courts.... A POLICE state ensues as the result of a court system that has run a muck.. There is nothing in Article III saying Judges even need to side with the Constitution or Congress, or even need to keep the checks and balances. We have the secret courts to prove that fact.


    All of your end points are belong to me :ph34r:

×
×
  • Create New...