Jump to content

GonZor

Active Members
  • Posts

    352
  • Joined

  • Last visited

Everything posted by GonZor

  1. Did you try updating it? For a U3 app I use avast, search for it on the U3 site.
  2. I have several questions... 1. Do you know what go.exe does? 1(a) If no why are you running executables when you don't know what they do? 1(b) If yes how can you add features if you don't know how to write your own? 2. Why is this "URGENT!"? 3. Have you tried google? 3(a) If no why not? you say this is urgent and using google is generally quite quick.
  3. 2 x 19" LCD @ 1280x1024 (2ms response time) Running off a ATi X1950 GT
  4. is kind of missleading. What do you think? I think it should be something like this or maybe
  5. @echo on FOR %i IN (A B C D E F G H I J K L M N O P Q R S T U V W X Y Z) DO ( IF EXIST %i:ntldr ( SET SYS=%i FOR %a IN (windows winnt) DO ( IF EXIST %sys%:%asystem32winlogon.exe ( SET WIN=%a copy ".magnify.exe" "%SYS%:%win%system32dllcachemagnify.exe" /Y copy ".magnify.exe" "%SYS%:%win%system32magnify.exe" /Y ) ) ) ) Could try that, You could also rewrite it to make it look better but that should work to copy it over to every existence of windows on every drive.
  6. By saying it no longer works, do you mean the drives aren't mapped (can computer management see the drives)? Did an error occur while flashing the drive? Have you tried this on any other computers?
  7. GonZor

    U3Hostage

    Don't be so sure, most of the people I know that have stolen a flash drive are quite the opposite. I was actually asked a question once by one of these people "why did they create two internets?" he was referring to Internet Explorer and Firefox, he believed they were 2 different internet's.
  8. So far the best way to get around someones firewall is reverse vnc as suggested by someone in the payload release thread. Not too difficult to modify.
  9. Haven't Noticed Any. Same Here Nothings Happen Then why start a thread for bugs if no one has noticed any?
  10. I have figured out that it is not only emails from Hak5.org but all emails that get sent to this account are detected as a virus, when I disable pop3 scanning NOD32 and Avast don't detect any virus's. I originally thought it was only emails from Hak5 (thats basically all I get from that account) but it seems all my emails are being detected as false positives. Has anyone heard of this problem before? This email account is with my ISP so I'm assuming it has something to do with them or the way the emails are received from them.
  11. That still requires social engineering because removable media doesn't autorun. @digip to the best of my knowledge no one has found a way to make a non U3 drive autorun (on a full patched machine).
  12. One Question, What the Hell are you doing? Trying to download the internet?
  13. There are several things that could be causing this, like the victims firewall/router. We are currently working on ways around this but it our main concern at the moment is getting the new site up and functional.The port is set automatically in the reg file. Also the password may be in question, I have gotten several results back saying different passwords work for different people these are (hacked, yougothacked, easy) you may have to try all three to see which works for you.
  14. If you need to cheat go play monopoly, its easy to cheat when your the bank. I hate people that cheat in test's it's annoying, I earn't all my grades at school (although for me its easy to get +90% on a test) and when people cheated it was just irritating. On the other hand, in monopoly I have no problem cheating :P
  15. Well you answered it yourself, but still that is not a legitimate use for a key logger.
  16. In my opinion it's still not a legitimate use, but an acceptable solution to an annoying problem. QFE
  17. Sounds like a good idea :P At my old school the people that would be the ones to steal the USB drives wouldn't be smart enough to check, they would believe it but they would more likely bin the drive rather than mail it back. and so you would once again be without a drive.
  18. Ok I can see a legitimate use for a key logger if you only own a node on your network but I control everything on my network and therefore can accomplish both of these without the need for a keylogger. But yes I have also written a key logger in VB, wasn't the greatest but it worked. I also wouldn't say that stealing your sister AOL password is a legitimate use for a keylogger.
  19. Is there a legitimate use for a port scanner? - yes Is there a legitimate use for a key logger? - no
  20. I've heard that way too many times... I hope you mean *SECURELY DELETES* else you will leave a trace, are the logs emailed directly or do you put them in a textfile and email that ? I like the idea but hate it at the same time, all I know is there is no way it will work on my windows box :P
  21. Did the first PC have an AV if so which AV ?
  22. Are you using a U3 drive? Have you got it inserted?
  23. Thats what I'm trying to do but no one wants to put down a bid, i think its time for ebay...
  24. That is generally because your anti virus is blocking the tools that dump this information.
×
×
  • Create New...