Jump to content


Dedicated Members
  • Content Count

  • Joined

  • Last visited

  • Days Won



About haze1434

  • Rank
    Hak5 Ninja

Profile Information

  • Gender

Recent Profile Visitors

4,422 profile views
  1. 00000100 is a disk I/O error code. It's picking up a disk/partition, but can't read it. I've had similar issues in the past where 1 disk/partition actually shows as 2; one OK and one corrupt/unreadable. Try unplugging all USB related items first and check if it disappears after one of them is unplugged. Then, try disconnecting your Hard Drive temporarily (just unplug it internally, but leave in situ) and booting from an external OS. See if the errored disk shows up then. You could even make the external OS a Linux one and use something like GParted to see if there are any unread
  2. Hi all, Creating some monitoring scripts for a HP-UX environment, however I don't actually have direct access to the HP-UX environments to test the syntax. Does anyone know of a POSIX compliant Korn Shell distro, similar to HP-UX, that I can throw in to a VM and use for testing syntax? Thanks
  3. This is regards a HP-UX box. I have the following; #!/bin/bash # Exit script if program fails or an unset variable is used set -eu server="BLABLA" port="443" graceperiod_days="30" # Get expiry date of SSL certificate, in format 'Jan 31 11:59:00 2018 GMT' enddate="$(openssl s_client -connect "$server:$port" 2>/dev/null | openssl x509 -noout -enddate | sed -e 's#notAfter=##')" # Get today's date in format DD-MM-YYYY todaysdate="$(date "+%d-%m-%Y")" echo "Today's date is $todaysdate" # Convert $enddate to format DD-MM-YYYY enddate_formatted=$
  4. https://paleoflourish.com/recipe-copyright/ "The general test for copyright protection is originality, and the original and creative portions of the work must be able to be separated from the utilitarian/functional aspects of the work." "Likewise, courts have generally ruled that recipes are functional and therefore not able to be copyrighted." "“[The] recipes’ directions for preparing the assorted dishes fall squarely within the class of subject matter specifically excluded from copyright protection by 17 U.S.C. § 102(b)."" etc. If it's your fair, then fair eno
  5. Agreed, however I said generally. Of course us techies know you can use things like macchanger to spoof your MAC, but I believe the OP was looking at 'normal' users, rather than unscrupulous individuals Apple phones, for example, do iterate through spoofed MACs when out in the wild, to stop access points in monitoring mode from tracing them, however when they actually connect to an access point, their real MAC address shows. I can confirm this via personal testing.
  6. Also, here's a nice text-only list of which companies own which OUIs: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob_plain;f=manuf
  7. Generally they are only spoofed on most devices when they are not connected to an AP. As soon as they connect, they show their true MAC. Wikipedia actually covers quite a lot on this page; https://en.wikipedia.org/wiki/MAC_address
  8. Thanks all, I've ordered a Float Switch :) Hopefully be with me soon and then I'll start rigging her up.
  9. Hi all, I'm working on a project to track the water levels in a water butt in my garden. I plan on installing a DIY irrigation system, which will consist of a pump sitting in the water butt. As I don't want the pump to switch on when the water level is too low, to save it running dry, I wish to monitor the level of the water inside the water butt. I've researched around for the best method, but it's very difficult to judge which will work best and is most cost effective! So far, I've considered doing one of the following with a Raspberry Pi; A reed switch/sensor, with a ma
  10. As Rkiver states, unfortunately you won't get much here. Pentesting over the internet, and not LAN/WAN is pretty much guaranteed to be nefarious. If you were pentesting for a company, with signed consent, you'd either be on their LAN/WAN or already have the details of how to attack from externally. Therefore, it's assumed you're trying to pentest someone you shouldn't. So no chicken dinner, sorry.
  11. haze1434

    GSM hacking

  12. We'll need more information. Searching online, there's quite a few things 'netman' could be. Link? Also, please advise what you are looking for; are you getting an issue with it? Are you looking for advice on how to do something in particular? Are you looking for resources to learn how to use it?
  13. Completely forgot GSM. Woods from the trees n' all that. This would be a very good idea also, yes. I guess my above post could work in the wilderness where there was no GSM available.
  14. Wi-Fi Camera > RPi set up to forward all traffic, using MACChanger to spoof it's MAC > Your Wi-Fi AP As long as the software thinks the RPi is actually your camera, this should work. You'll have to scan the camera for all the ports that it uses and make sure that all of these are open on the RPi and being forwarded.
  15. I've been toying with this idea for a while, but have yet to buy a Sonnet and so am uncertain if it would work (note the arrow directions)... Attack Box > Wi-Fi connection > Sonnet > > > > > Sonnet < Wi-Fi Connection < RPi > Wi-Fi Connection > Target AP In theory, if the Sonnet allows this correctly, you could connect over a long distance, however the throughput would be pretty slow. OK for terminal though.
  • Create New...