Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

Recent Profile Visitors

6,934 profile views

beakmyn's Achievements


Newbie (1/14)

  1. I was thinking about something like that. I could put a fonera in line hosting a local copy of the ikat kiosk hacking website. I redirect all traffic internally, bypassing the need to go outside the firewall. Hmm. Right now IE blocks all file system access, got a couple other tricks to try.
  2. I wish it was that easy. He set up the policy so there is only Internet Explorer and custom program that doesn't allow user interaction. No Notepad, no paint, not even Microsoft help. The IP address trick doesn't work either.
  3. Came across a scenario that I'm testing out. I've set up a machine in my office to mimic a machine I came across in the wild. The machine is locked down with group policies. The user has access to Internet Explorer and a custom program. Trying to access the file system from IE is blocked. There is no run or anything else. Web surfing is possible but limited to a white list of sites. I've got a free dinner from a client if I can figure out a way to be able to a program. I can't reboot with live-CD though, that's cheating. Any ideas?
  4. CommView http://www.tamos.com/htmlhelp/commview/reconstruct.htm will do TCP reconstruction but it won't put it into video playback.
  5. beakmyn

    Old Nt Laptop

    Get a copy of the Plop Boot manager http://www.plop.at/en/bootmanager.html Put it on a floppy You'll then be able to select to boot USB Install Damn Small Linux or Puppy or similar, hope it finds the hardware.
  6. I just got this little RS dialer with a special red switch [/url] If you want to relive the old days grab phonal tonal for ipod/iphone
  7. All I can get is a 1994 Dodge Pedobear van
  8. Don't think you're the first one to come up with that idea. Pentesters do it all the time, talks have been given at Shmoocon on it. The human race is easiest way to break into a computer/network. There are 2 constants 1. Use the dock door it's always open 2. Ask the secretary, they know everything This attack was way beyond a switchblade. The switchblade is defeated by a simple guest account or turning auto-run off.
  9. If it's a linux box install lm_sensors and ssh to the machine and issue the command sensors
  10. The single port Openmesh routers are Accton, same company that makes the Fonera. Still haven't found anyone that re-sells Accton's 2-port model (Fonera+)
  11. Been there done that. @Digininja I showed it to you at Shmoocon. http://www.frontiernet.net/~beakmyn/Jasage...pt_Install.html
  12. Pretty but I still prefer Pfsense since it's got a larger support audience and a bit further along in development.
  13. Nothing exactly like it but might I suggest. The Conversation The Heist 3 Days of the Condor
  14. Gattaca The Heist Three days of the Condor Code Hunter - No really hacking is scrolling a word document in DOS and everyone knows Coolio is an uber.
  • Create New...