Jump to content


Dedicated Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Everything posted by haze1434

  1. 00000100 is a disk I/O error code. It's picking up a disk/partition, but can't read it. I've had similar issues in the past where 1 disk/partition actually shows as 2; one OK and one corrupt/unreadable. Try unplugging all USB related items first and check if it disappears after one of them is unplugged. Then, try disconnecting your Hard Drive temporarily (just unplug it internally, but leave in situ) and booting from an external OS. See if the errored disk shows up then. You could even make the external OS a Linux one and use something like GParted to see if there are any unreadable partitions anywhere. Lastly, if it's not too much of a pain, try backing up your system, formatting your HDD and reinstalling everything. Sounds like a pain, but usually only 1-2 hours work nowadays.
  2. Hi all, Creating some monitoring scripts for a HP-UX environment, however I don't actually have direct access to the HP-UX environments to test the syntax. Does anyone know of a POSIX compliant Korn Shell distro, similar to HP-UX, that I can throw in to a VM and use for testing syntax? Thanks
  3. This is regards a HP-UX box. I have the following; #!/bin/bash # Exit script if program fails or an unset variable is used set -eu server="BLABLA" port="443" graceperiod_days="30" # Get expiry date of SSL certificate, in format 'Jan 31 11:59:00 2018 GMT' enddate="$(openssl s_client -connect "$server:$port" 2>/dev/null | openssl x509 -noout -enddate | sed -e 's#notAfter=##')" # Get today's date in format DD-MM-YYYY todaysdate="$(date "+%d-%m-%Y")" echo "Today's date is $todaysdate" # Convert $enddate to format DD-MM-YYYY enddate_formatted=$(printf '%s\n' "$enddate" | awk '{printf "%02d-%02d-%04d\n",$2,(index("JanFebMarAprMayJunJulAugSepOctNovDec",$1)+2)/3,$4}') echo "Certificate expiry date is $enddate_formatted" # Compare expiry date with today's date if "$todaysdate" -ge "$("$enddate_formatted" - "$graceperiod_days")" then echo "$todaysdate is greater than $enddate_formatted. SSL certificate has expired!" elif "$todaysdate" -lt "$("$enddate_formatted" - "$graceperiod_days")" then echo "$todaysdate is before $enddate_formatted. Everything is OK!" else echo "ERROR"; fi As far as I can tell, this should work, however the output is; Today's date is 29-08-2018 Certificate expiry date is 21-07-2018 ./test[22]: 21-07-2018: not found. ./test[22]: 29-08-2018: not found. ./test[24]: 21-07-2018: not found. ./test[24]: 29-08-2018: not found. ERROR What's going wrong?
  4. https://paleoflourish.com/recipe-copyright/ "The general test for copyright protection is originality, and the original and creative portions of the work must be able to be separated from the utilitarian/functional aspects of the work." "Likewise, courts have generally ruled that recipes are functional and therefore not able to be copyrighted." "“[The] recipes’ directions for preparing the assorted dishes fall squarely within the class of subject matter specifically excluded from copyright protection by 17 U.S.C. § 102(b)."" etc. If it's your fair, then fair enough, you can stop people from using phones etc. But legally, generally, food recipes are not covered by Copyright and therefore any competitors have the right to attempt to make their own version. Besides, what's to stop someone taking a sample and analysing it easily anyway? You'd only have to look at a food sample under a microscope for a short while to work out all of it's ingredients. Or, what about people with really good memories? Are you going to ban them, in case they remember the recipe? A bit of logic is required here. Generally, food based companies rely on customer service, competitive pricing, location, advertising, cooking techniques, hiring really good chefs etc. to beat the competition, it's not possible to just blanket ban other companies from making the same food as you. Think about Pizza, Burgers, Fries; all the same concept.
  5. Agreed, however I said generally. Of course us techies know you can use things like macchanger to spoof your MAC, but I believe the OP was looking at 'normal' users, rather than unscrupulous individuals Apple phones, for example, do iterate through spoofed MACs when out in the wild, to stop access points in monitoring mode from tracing them, however when they actually connect to an access point, their real MAC address shows. I can confirm this via personal testing.
  6. Also, here's a nice text-only list of which companies own which OUIs: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob_plain;f=manuf
  7. Generally they are only spoofed on most devices when they are not connected to an AP. As soon as they connect, they show their true MAC. Wikipedia actually covers quite a lot on this page; https://en.wikipedia.org/wiki/MAC_address
  8. Thanks all, I've ordered a Float Switch :) Hopefully be with me soon and then I'll start rigging her up.
  9. Hi all, I'm working on a project to track the water levels in a water butt in my garden. I plan on installing a DIY irrigation system, which will consist of a pump sitting in the water butt. As I don't want the pump to switch on when the water level is too low, to save it running dry, I wish to monitor the level of the water inside the water butt. I've researched around for the best method, but it's very difficult to judge which will work best and is most cost effective! So far, I've considered doing one of the following with a Raspberry Pi; A reed switch/sensor, with a magnet floating on the top of the water, inside a tube, in the water butt. When the magnet reaches a low point within the tube, the reed switch picks it up and trips. An ultrasonic sensor on the underside of the lid on the water butt 2 long metal rods, with current, sitting down to near the bottom of the water butt. When the current running between the rods drops, when the water goes lower than the tips of them, then a script will kick in. Any thoughts on these? Has anyone done anything similar or have any ideas? Thank you
  10. As Rkiver states, unfortunately you won't get much here. Pentesting over the internet, and not LAN/WAN is pretty much guaranteed to be nefarious. If you were pentesting for a company, with signed consent, you'd either be on their LAN/WAN or already have the details of how to attack from externally. Therefore, it's assumed you're trying to pentest someone you shouldn't. So no chicken dinner, sorry.
  11. haze1434

    GSM hacking

  12. We'll need more information. Searching online, there's quite a few things 'netman' could be. Link? Also, please advise what you are looking for; are you getting an issue with it? Are you looking for advice on how to do something in particular? Are you looking for resources to learn how to use it?
  13. Completely forgot GSM. Woods from the trees n' all that. This would be a very good idea also, yes. I guess my above post could work in the wilderness where there was no GSM available.
  14. Wi-Fi Camera > RPi set up to forward all traffic, using MACChanger to spoof it's MAC > Your Wi-Fi AP As long as the software thinks the RPi is actually your camera, this should work. You'll have to scan the camera for all the ports that it uses and make sure that all of these are open on the RPi and being forwarded.
  15. I've been toying with this idea for a while, but have yet to buy a Sonnet and so am uncertain if it would work (note the arrow directions)... Attack Box > Wi-Fi connection > Sonnet > > > > > Sonnet < Wi-Fi Connection < RPi > Wi-Fi Connection > Target AP In theory, if the Sonnet allows this correctly, you could connect over a long distance, however the throughput would be pretty slow. OK for terminal though.
  16. Just had to mention hackthebox.eu An excellent website for practicing pentesting; real-time, hackable machines of various skill levels and types. You can sign up for a free account, or pay £10 a month for an upgrade. Well worth it. The free account gives you access to almost everything, the upgrade is just to improve server availability and the hardware you are hacking against, speeds up the process a bit, but you don't have to pay if you don't wish. As a side note; to sign up, you have to hack your way in! (hackthebox.eu/invite)
  17. Very circumstantial, based on how large the buildings are and the materials the walls/windows etc. are made from. You're likely to be able to penetrate 2-3 of these building, but certainly not 10. You defiantly need to either; Get higher, so the signal travels over these buildings Use a much lower frequency for the signal than Wi-Fi (LoRa, mobile network etc.) Get closer.
  18. Is it line-of-sight, or through objects? If through buildings/trees etc, could you give us an indication of how much is between you and the Wi-Fi?
  19. The maximum distance I personally have managed with a simple Yagi antenna (like this) was 1 mile (1.3km). Wi-Fi isn't really designed for the distances you are thinking about, unless you are willing to go the DIY route. You could probably get 1-3 miles with this, I doubt any further. And I'm talking line-of-sight here, not through multiple buildings. Through buildings, you'd get a few hundred yards, not miles. This can only be mitigated by sending the signal above the buildings. People who manage further are pretty much guaranteed to be hobbyists that have DIY'd their own Wi-Fi rigs. It's all about frequency; Wi-Fi is too high of a frequency to travel long distances, hence suggesting using around the 800mhz range above and converting the signal on either end with an RPi / Arduino / etc connected to shorter distance Wi-Fi antennas. The ProxyHam is an exact example of this.
  20. You're going to struggle to get that in a city environment with Wi-Fi wave lengths, unless you're on top of a tall building. You're probably best off researching a way to use a much lower frequency signal, such as the 800mhz range, and use something on either end of that to convert back in to Wi-Fi. Research ProxyHam, LoRa and Sonnet.
  21. Does Kismet have the ability to create a 'heatmap' of Wi-Fi signal strength, or is there any applications that Kismet data can be imported to, in order to create a visual heatmap?
  22. haze1434

    Wpa2 crack

    Most of the time, you'll want to go for a Mask Attack. Using Windows CMD, this would be something like; oclHashCat.exe -m 2500 HASHES.txt -a 3 -1 ?l?d?u ?1?1?1?1?1?1?1?1 (run Hashcat) (hash type is WPA/WPA2) (use HASHES.txt for the hashes to be cracked) (mode Brute-Force) (create '1' as meaning lowercase, uppercase and numbers) (set password as 8 characters in length, so 1 repeated 8 times) The above will (I think, I'd need to double check the syntax) crack a WPA2 password that is up to 8 characters in length and contains uppercase, lowercase and numbers. You should research the default passwords for the router being pentested; the above mask should be amended to match initially. For example, if you knew the password was 5 letters and 4 numbers, you could use; -1 ?l?u -2 ?d ?1?1?1?1?1?2?2?2?2 Note the above is a brute-force example, you should exhaust your password files first, such as rockyou, via a dictionary attack; oclHashCat.exe –m 2500 HASHES.txt DICTIONARY.txt I go in this order; Dictionary attacks, using the smallest/quickest dictionary first and the slowest last Mask attack using likely default password layout Mask attack using incremental lowercase letters, uppercase letters and numbers, up to 12 digits Anything past this usually takes too long, so if the above fails, I tend to stop there and admit defeat. You can judge this based on your rig.
  23. haze1434

    Wpa2 crack

    Ha no worries. I'll have to have another play this weekend
  24. I use AWUS036H's myself, but as others have pointed out previously, this only works on 2.4ghz APs, not 5ghz. Not a major issue at the moment, but going forwards in time, it may be that more APs are 5ghz. Maybe not.
  25. If you have about £400 / $550 dollars available, you can do this; https://www.evilsocket.net/2016/03/31/how-to-build-your-own-rogue-gsm-bts-for-fun-and-profit/ Pentesting platform for GSM, as well as a proxy for a real GSM if that's what you want it for.
  • Create New...