Jump to content

0phoi5

Dedicated Members
  • Posts

    702
  • Joined

  • Last visited

  • Days Won

    20

Everything posted by 0phoi5

  1. Haven't heard of it before. Found this though; TIOCGSERIAL: called to get a bunch of serial line information from your device all at once. A pointer to a struct serial_struct is passed to this call, which your driver should fill up with the proper values. Some programs (like setserial and dip) call this function to make sure that the baud rate was set properly and to get general information on what type of device your tty is. (http://www.linuxjournal.com/article/6226) Doesn't mean much to me, apart from the 'get general information on what type of device your tty is', which may be your issue (not finding the correct type for your phone as a tty, or vice versa). Someone else here may be able to advise.
  2. No worries. I'm at a loose end to be honest, I'll do some more thinking and get back to you if I think of anything.
  3. A few questions first; Have you attempted to use the standard recovery for the email login (clicked 'forgot password', answered security questions, etc. as appropriate) If no luck, have you contacted the suppliers of the email domain and asked them to assist? What was the outcome? Do you have any easier methods of recovery available to you? Such as your internet browser saving the password, it being written down somewhere, etc.? Sorry to ask basic questions, but at first glance it sounds like this isn't your email.
  4. Seems OK, rfcomm is indeed using /dev/rfcomm0 as expected, as it created it. Try this: https://ubuntuforums.org/showthread.php?t=2138993
  5. Try sudo lsof | grep rfcomm0 Let us know the output if no luck.
  6. Have you run the following? gpsd /dev/rfcomm0 (to ask gpsd to use the data from /dev/rfcomm0) *edit* I'm guessing so, based on 'ERROR: /dev/rfcomm0: device activation failed.' Hmm... you can tell which device/resource is using rfcomm0 by running; sudo lsof | grep rfcomm0 and then kill it off? Can't test at the moment as I'm on a Windows machine
  7. Nice! I'm jealous
  8. Elaboration would help greatly; What is/who are DoD? Screenshot? Paste of traceroute? Does this DoD have an internal IP?
  9. True that. I personally feel that pentesting 'out in the field' should be a grab-n-go type endeavour. Usually it's best to do some recon using some scripts that implement tshark/whatever you require and then go back to the lab and use this info to create some more scripts. Then all one has to do is turn up, run a script or 2 in a few seconds/minutes and then make like a banana. No one is going to suspect that the guy that just walked past is a pentester, compared with the guy that's sitting nearby with a little laptop, typing away frantically.
  10. Why do people always insist on using devices that allow GUIs? Never understood that, it's skiddie stuff. Take the time to set up scripts on a device like an RPi and simply call them from a mobile phone via SSH. Or use an SSH app on your phone if you require a command to be sent that isn't scripted. GUIs are lovely in the lab, I wouldn't bother on the go. Besides, which fits in your pocket and can be used un-noticed; an RPi or a laptop?
  11. This. And 'profit' was a meme joke.
  12. Fire. Really hot fire, for a few hours. After using drill and hammer.
  13. Sounds like you got hacked back. Whoops! I would; Change all passwords for all accounts. Wipe your PC using Boot N' Nuke, and reinstall. Change your external IP address. Profit.
  14. Line-of-sight, about 1km. No blockage. From personal experience. Yes, they will decrease the signal significantly. From up to 1km to less than 100m if there are a few buildings. If there's old building with thick walls, or earth/trees in the way, that could go down to 50m.
  15. The link is now broken. Can anyone provide a new link to the firmware? Thanks.
  16. Does it have to be C++? Personally, I'd use a scripting language like PowerShell or BASH for this, rather than programming.
  17. In the words of the late, great George Carlin; "What about a man with really big hands?"
  18. Or https://nmap.org/soc/NmapDiag.html
  19. Use nmap to capture. Then use https://www.dca.ufrn.br/~joaomedeiros/radialnet/
  20. nmap hoover.pl wireshark kismet aircrack-ng When you say you need to 'map' the network and produce documents, do you mean like a nice 'flowchart' type view?
  21. Which would break you companies group policy. You'd be better talking to them rather than trying to circumvent settings your employers have chosen to put in place. Unfortunately, that's all I can really say. Employers can sometimes set up annoying barriers, but getting around them without permission is always a bad idea.
  22. Why? If blocked by your employers, nothing you can do, as it's set by Group Policy. And if there was, you'd probably be breaking said Policy anyway. You'd be better going to them and getting this setting unblocked for yourself.
  23. http://www.ucl.ac.uk/isd/how-to/email-calendar/outlook-web-app/accounts-settings/set-forwarding-owa https://www.lifewire.com/forward-outlook-mail-1170648
×
×
  • Create New...