Jump to content

m1d63t

Active Members
  • Posts

    8
  • Joined

  • Last visited

Everything posted by m1d63t

  1. Sorry to bump an old post but I want to find a vulnerability in these devices just for the fact that they are just another tool to limit choice and efficiency whilst at school. It is now a personal vendetta...
  2. Has there been any new information on the bluesocket? Somehow devry is supposedly blocking Linux based computers from accessing the network. It also scans for things such as p2p apps and a lack of anti virus programs being installed. I would like to first switch my OS finger print and then also make it think that a windows anti virus program is not only installed but up to date on definitions. Has anybody tried to go this far to get around a bluesocket?
  3. For a while i have had the idea to modify the xml of my launch pad. What i intend to do is modify the code so that it has a button that will run the script to add a new admin. I have made a u3p install file previosly of the script compiled as utilman. it is hit or miss as to whether or not the prog will add an account that is a full admin. Logged on as admin it ads a user that is a member of both user and admin. Logged on as a restricted user sometimes it works adding a new restricted user. Today i am going to start trying to inject the script into the xml of my launch pad.... preferabel i would like to have a new version of the "u3accessgrant" compiled with the script tacked onto it. <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="U3LauncherInstallBase.exe" type="win32"/> <description>Installs the U3Launcher</description> <!-- Identify the application security requirements. --> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false"/> </requestedPrivileges> </security> </trustInfo> </assembly>
  4. A program that you might like is BlackWidow by Softbyte Labs. If I read your post right then it might help you out. http://softbytelabs.com/us/downloads.html
  5. m1d63t

    U3Dev

    I was wondering if anyone else has gone to the trouble of modding up your launch pad and embedding your scripts into it and if anyone has started using the provided u3 development toolkit to just turn some of the utilities into auto running exe's. I personally took all of the tools from the one of the switchblade payloads and made a u3 install file for them.
  6. I was thinking of making some sort of thing out of an old hard drive and making it uber blinky ,powered by usb ,and having a u3 hidden inside of it.
  7. m1d63t

    U3 sdk

    I've been reading up on the u3 stuff a little bit. I got to wondering if any of you guys are using any of the tools from the official u3 website or are you guys just compiling from nothing?
  8. I was thinking of a way that i might be able to give some one a trojan horse of a u3. The idea is to take some sort of usb toy pop it open and put in a simple 2 port usb splitter. You would chop the usb cable coming out of the device you are modding and hard wire it into one of the in ports of the usb splitter. You would plug the u3 into the other port and take the usb cable running out from the splitter and run it in place of the hacked devices original cable. The problem i was curious about is would you be able to keep windows from recognizing the splitter/hub as a new device yet still be able to operate it?
×
×
  • Create New...