Jump to content

icarus255

Active Members
  • Content Count

    68
  • Joined

  • Last visited

  • Days Won

    4

2 Followers

About icarus255

  • Rank
    Hak5 Fan ++

Recent Profile Visitors

285 profile views
  1. How much you need bro? I know you said you're broke and all but you sound like you're good for it. How much you need? ๐Ÿ˜‰ Also tell me how much interest you want to pay because I'm kind of fresh at this whole loan shark thing too...
  2. I remember there were some codes that worked in a game that I used to play. Anyway the codes should still work because the silly developers just reuse the same codes through all the games. Let me know if these work ๐Ÿ˜‰ IDKFA IDDQD
  3. OK I might just have to look into this again. I'll order some readers/writers and let you know how I go ๐Ÿ˜‰
  4. This is not just an old people thing. A lot of ISPs (at least here in Australia anyway) use phone numbers as default wifi passes for the 3G and 4G modems (and many others). And yes I agree, this is a great way to start your brute forcing. You don't need to pipe this through crunch though. You can use hashcat's mask generator ๐Ÿ˜‰ hash64.bin -a 3 -m 2500 TelstraA84A9F.hccapx 253?d?d?d?d?d?d?d (this will generate 7 random numbers following "253" which presumably you know). A lot of the netgear modem/routers use a combination of adjective+noun+XXX (where xxx is 3 random digits) e.g. "luckybanana437". I had a list specific to netgear's factory passes somewhere so let me know if you want me to find it and I will upload it somewhere. Netgear Arlo base stations used this for their camera systems as well ๐Ÿ˜„ 10 random hex chars is another favourite default pass but that can become unmanageable unless you have multiple GPUs or some really neat rules to minimise the cracking time. I guess it's worth mentioning that rockyou.txt gets a few hits every once in a while as well. Most people never change their default passes so bottom line: doing a bit of research at the start will save you a LOT of brute forcing time down the track ๐Ÿ˜‰
  5. It depends what software, hardware is being using in the security system/network. I looked into my own Arlo security/video system a while back and sure enough being a wifi system, it suffered from the same vulnerabilities that all wifi devices do but that's where the similarities end i.e. you can bruteforce the wpa2 password being used by the security system but joining the network doesn't mean you could see all the videos/images being transmitted by the cameras because the video traffic was encrypted by Arlo. Not all systems use encryption like this so like WPA2 said, get onto the network first and then fire up wireshark to see what is being transmitted. The other vulnerability that wifi systems are prone to is jamming so try to see if deauthing the cameras through aircrack will do anything.
  6. I looked into this a while back as well but never got motivated enough to do it or to order a card cloner. I am talking about access cards that is. Even if I was motivated enough, it's not as simple as just scanning a card and then having its digital fingerprint to use whenever you want. The cards are encrypted and I can't remember how the actual authentication works but the fact that you can't clone modern MIFARE cards suggests that the encryption is not some simple one way hash. Sure there were some MIFARE encryption vulnerabilities discovered a few years back but not sure how easy it was to exploit them. I thought this was an interesting article. The guy has no sources to back himself up or even quotes any facts but some of what he says makes sense. https://www.csoonline.com/article/3199009/why-you-dont-need-an-rfid-blocking-wallet.html Anyway let us know how you go because I'd be interested to see if there some real-world application.
  7. 0day? Dude that article was written in May 2017 after the vuln was patched in April... And what did you upload to virus total? A rar file? Where's the doc file?
  8. I would host a blog about breeding cats but I'm terrible at writing and I know nothing about cats. My other idea would be to host a darkweb marketplace like alphabay sort of thing. Shouldn't be too difficult and good for the coin ๐Ÿ˜‰
  9. icarus255

    C

    Unless you bought a Ferrari on your iphone, chances are no one will even bother investigating it but don't take that as gospel.
  10. Ah please, I scan from my home all day, every day. If he can hack my computer from a scan, I'll give him 10 points. I'll even leave the pc running a little while longer. It's no different to him just picking a random IP address and giving it a go.
  11. Yep, my thoughts exactly ๐Ÿ˜‚
  12. And port 21 is open as well. You can connect to a lot of these ports but the server won't accept input so I'm not really sure if it's configured like that or if this all just some bs...
  13. And: 5222/tcp open xmpp-client? But I am not sure what you are going to be doing with these open ports. Just because they are open doesn't mean they vulnerable but anyway keep us posted with this journey. I hope you get your income back, bro ๐Ÿ˜‰
  14. icarus255

    Blunder Bug

    I don't know why but this made me lol pretty hard. Blunder Bug does have a certain ring to it... ๐Ÿ˜‚
  15. Ah you're using Windows nmap. I've never used it so I can't comment but look it looks like you're using it incorrectly. It shouldn't be trying to resolve "nmap" or "192.99.0.33รฏยปยฟรฏยปยฟรฏยปยฟ". It should just be trying to resolve "192.99.0.33" Anyway you can do a port scan online: https://pentest-tools.com/network-vulnerability-scanning/tcp-port-scanner-online-nmap Just use the "light" scan because it's free and paste the ip address into the text box. That gave me similar results to doing a full scan with my nmap anyway. I would post the results here but I'm sure that would be against some sort of policy. What's so important about this server anyway? There's not even a webpage on there. Is this some CTF or personal challenge?
×
×
  • Create New...