Jump to content

Struthian

Active Members
  • Posts

    111
  • Joined

  • Last visited

Posts posted by Struthian

  1. I was an original subscriber.  Back in the day, there was useful information there.  Of course that was a day without an internet and so getting a hack out to general readers in a month or so was a great thing.   There was also a magazine called '73' which was mainly for Radio Hams but went beyond the boy scout follow the rules articles in other sources.  Radar Trap hacking was a topic I remember from then.  One especially interesting one used passive modulation to trick a radar trap into indicating a false speed.  

     

  2. In some cases Hak5 Sells cases, especially the EDC for Tetra.   My suggestion is that you sell field kit cases and especially to persons who already bought most of what was already in it and through Hak5.  So, the Hak5 elite case would be available who have ordered most or all of the Hak5 Elite kit.  Some of us just don't plan ahead.  Note even a week ahead ... :-)

  3. Everything you report suggests the site is not on the up and up.  I would report it to the FBI, no harm in it. They can figure out what is going on.  ISP's and government agencies do not necessarily respond with what they are doing in response.   It doesn't hurt to tell more people.   Without probing and doing things that might be considered illegal - i doubt there is much of a way to determine specifically what is going on behind the scenes. However, the FBI has those means and can get that authority.

  4. I suggest that you look at entry level books for the different languages. The one that looks most interesting and fun is the right one for you to start. Ultimately, you should know them all.  You should also learn BASH.    As you spread out, look for common ideas present in them all.  Understand similarities and differences.  It's this which makes one more or less suitable for a particular task.

  5. While fooling around with Bash Bunny PasswordGrabber and Lazagna, I was testing it on a variety of computers in my home.  I deleted the passwords.txt files (of course) and then realized something - what about freespace recovery?   Indeed, all those deleted password files for basically every password I have or ever had - was on my bunny.   If your bunny is hacked and those files recovered - could be a big problem.  This could also happen forensically if some agency gets a hold of it

    One solution is to use the DOS CMD to run Cipher /W:bunnydrivename .  This will wipe the free space of your bunny drive.  Faster (and good enough?) cipher  /w:bunnydrive\loot  

    A cool tool to include would encrypt files or a directory and, wipe the files content at one go.  Any ideas?

     

  6. Even shards of a smashed platter can yield data in an advanced lab.    Services that destroy drives shred them on site and then take the shreddings and  burn them or destroy them chemically.   If you want to dIY, burning is necessary to completely obliterate the data.  In shredding, the smaller the shards, the less likely the recovery.   Obviously the more the shards are mixed from other shreddings the more deterred the data recovery specialists will be.

    You can also obliterate the data and keep the drive by using the appropriate software.  That will rewrite the drive many times with random patterns.  Repeated random rewrites are crucial if the drive data is to be not recoverable in a suitable lab.

  7. Frankwilly - Develop your spoken and written language skills, learn to write computer programs.  Then you will make enough money so the credit card companies will find you.  If you want to risk prison, you will have the skills to answer your own question.  I don't really know what you seek but if you wish help committing a crime, do the time and make the effort. Then, if you screw up, you can do it in jail.

  8. I've been a computer systems designer from circuitry to software through several generations of technology for 45 years.  I use the word "hacking" more broadly than hack5.  It means "finding and creating ways to do things that are novel and not really what was expected by the original designer (of hardware, software, chip, part or just a thing)".    Obviously to do that you need to be really lucky and stumble into something or know a lot and/or learn more.

    The mindset of hacking can be used to do bad things to people and systems.  It can also be used to prevent others from doing bad things by 'heading them off at the pass'.

    To broaden the thinking, here is an example:  Many hardware systems use a bus protocol called I2C.   I2C is used by motherboards to communicate with their flash memories. If there is a motherboard password, it's stored in that part, in clear text actually.  Similarly, it may use I2C to communicate with the keyboard interface.   Using a device sold by "Dangerous Prototypes" not Hak5, one can manipulate I2C, intercept communications with the flash memory and gain access to the BIOS that was not intended (or someone forgot the password). All this requires some soldering of course, to create the connections to the Bus Pirate.  

    There are also ways of using transistors, diodes, etc that really are not in their specs but, by pushing the specs can be used in special ways.  This too is hacking to me.

    Bending a coat hanger into a tool to snag something, pull a wire through or whatever - that too is hacking the coat hanger.  Making a rocket out of PCB pipe for fuel - that's also hacking.

    There are as many types of hacking as there are hackers that are truly creative and knowledgeable.   The range for a hacker is more than operating and computer systems. It's physics.

    The more you learn, the more intuition you will have.  Have fun.  Don't hurt nice people, help them (or not)

×
×
  • Create New...