Jump to content


Dedicated Members
  • Posts

  • Joined

  • Last visited

  • Days Won



Profile Information

  • Gender

Recent Profile Visitors

5,068 profile views

haze1434's Achievements


Newbie (1/14)

  1. 00000100 is a disk I/O error code. It's picking up a disk/partition, but can't read it. I've had similar issues in the past where 1 disk/partition actually shows as 2; one OK and one corrupt/unreadable. Try unplugging all USB related items first and check if it disappears after one of them is unplugged. Then, try disconnecting your Hard Drive temporarily (just unplug it internally, but leave in situ) and booting from an external OS. See if the errored disk shows up then. You could even make the external OS a Linux one and use something like GParted to see if there are any unreadable partitions anywhere. Lastly, if it's not too much of a pain, try backing up your system, formatting your HDD and reinstalling everything. Sounds like a pain, but usually only 1-2 hours work nowadays.
  2. Hi all, Creating some monitoring scripts for a HP-UX environment, however I don't actually have direct access to the HP-UX environments to test the syntax. Does anyone know of a POSIX compliant Korn Shell distro, similar to HP-UX, that I can throw in to a VM and use for testing syntax? Thanks
  3. This is regards a HP-UX box. I have the following; #!/bin/bash # Exit script if program fails or an unset variable is used set -eu server="BLABLA" port="443" graceperiod_days="30" # Get expiry date of SSL certificate, in format 'Jan 31 11:59:00 2018 GMT' enddate="$(openssl s_client -connect "$server:$port" 2>/dev/null | openssl x509 -noout -enddate | sed -e 's#notAfter=##')" # Get today's date in format DD-MM-YYYY todaysdate="$(date "+%d-%m-%Y")" echo "Today's date is $todaysdate" # Convert $enddate to format DD-MM-YYYY enddate_formatted=$(printf '%s\n' "$enddate" | awk '{printf "%02d-%02d-%04d\n",$2,(index("JanFebMarAprMayJunJulAugSepOctNovDec",$1)+2)/3,$4}') echo "Certificate expiry date is $enddate_formatted" # Compare expiry date with today's date if "$todaysdate" -ge "$("$enddate_formatted" - "$graceperiod_days")" then echo "$todaysdate is greater than $enddate_formatted. SSL certificate has expired!" elif "$todaysdate" -lt "$("$enddate_formatted" - "$graceperiod_days")" then echo "$todaysdate is before $enddate_formatted. Everything is OK!" else echo "ERROR"; fi As far as I can tell, this should work, however the output is; Today's date is 29-08-2018 Certificate expiry date is 21-07-2018 ./test[22]: 21-07-2018: not found. ./test[22]: 29-08-2018: not found. ./test[24]: 21-07-2018: not found. ./test[24]: 29-08-2018: not found. ERROR What's going wrong?
  4. https://paleoflourish.com/recipe-copyright/ "The general test for copyright protection is originality, and the original and creative portions of the work must be able to be separated from the utilitarian/functional aspects of the work." "Likewise, courts have generally ruled that recipes are functional and therefore not able to be copyrighted." "“[The] recipes’ directions for preparing the assorted dishes fall squarely within the class of subject matter specifically excluded from copyright protection by 17 U.S.C. § 102(b)."" etc. If it's your fair, then fair enough, you can stop people from using phones etc. But legally, generally, food recipes are not covered by Copyright and therefore any competitors have the right to attempt to make their own version. Besides, what's to stop someone taking a sample and analysing it easily anyway? You'd only have to look at a food sample under a microscope for a short while to work out all of it's ingredients. Or, what about people with really good memories? Are you going to ban them, in case they remember the recipe? A bit of logic is required here. Generally, food based companies rely on customer service, competitive pricing, location, advertising, cooking techniques, hiring really good chefs etc. to beat the competition, it's not possible to just blanket ban other companies from making the same food as you. Think about Pizza, Burgers, Fries; all the same concept.
  5. Agreed, however I said generally. Of course us techies know you can use things like macchanger to spoof your MAC, but I believe the OP was looking at 'normal' users, rather than unscrupulous individuals Apple phones, for example, do iterate through spoofed MACs when out in the wild, to stop access points in monitoring mode from tracing them, however when they actually connect to an access point, their real MAC address shows. I can confirm this via personal testing.
  6. Also, here's a nice text-only list of which companies own which OUIs: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob_plain;f=manuf
  7. Generally they are only spoofed on most devices when they are not connected to an AP. As soon as they connect, they show their true MAC. Wikipedia actually covers quite a lot on this page; https://en.wikipedia.org/wiki/MAC_address
  8. Thanks all, I've ordered a Float Switch :) Hopefully be with me soon and then I'll start rigging her up.
  9. Hi all, I'm working on a project to track the water levels in a water butt in my garden. I plan on installing a DIY irrigation system, which will consist of a pump sitting in the water butt. As I don't want the pump to switch on when the water level is too low, to save it running dry, I wish to monitor the level of the water inside the water butt. I've researched around for the best method, but it's very difficult to judge which will work best and is most cost effective! So far, I've considered doing one of the following with a Raspberry Pi; A reed switch/sensor, with a magnet floating on the top of the water, inside a tube, in the water butt. When the magnet reaches a low point within the tube, the reed switch picks it up and trips. An ultrasonic sensor on the underside of the lid on the water butt 2 long metal rods, with current, sitting down to near the bottom of the water butt. When the current running between the rods drops, when the water goes lower than the tips of them, then a script will kick in. Any thoughts on these? Has anyone done anything similar or have any ideas? Thank you
  10. As Rkiver states, unfortunately you won't get much here. Pentesting over the internet, and not LAN/WAN is pretty much guaranteed to be nefarious. If you were pentesting for a company, with signed consent, you'd either be on their LAN/WAN or already have the details of how to attack from externally. Therefore, it's assumed you're trying to pentest someone you shouldn't. So no chicken dinner, sorry.
  11. haze1434

    GSM hacking

  12. We'll need more information. Searching online, there's quite a few things 'netman' could be. Link? Also, please advise what you are looking for; are you getting an issue with it? Are you looking for advice on how to do something in particular? Are you looking for resources to learn how to use it?
  13. Completely forgot GSM. Woods from the trees n' all that. This would be a very good idea also, yes. I guess my above post could work in the wilderness where there was no GSM available.
  14. Wi-Fi Camera > RPi set up to forward all traffic, using MACChanger to spoof it's MAC > Your Wi-Fi AP As long as the software thinks the RPi is actually your camera, this should work. You'll have to scan the camera for all the ports that it uses and make sure that all of these are open on the RPi and being forwarded.
  15. I've been toying with this idea for a while, but have yet to buy a Sonnet and so am uncertain if it would work (note the arrow directions)... Attack Box > Wi-Fi connection > Sonnet > > > > > Sonnet < Wi-Fi Connection < RPi > Wi-Fi Connection > Target AP In theory, if the Sonnet allows this correctly, you could connect over a long distance, however the throughput would be pretty slow. OK for terminal though.
  • Create New...