Jump to content

sc0rpi0

Active Members
  • Posts

    138
  • Joined

  • Last visited

Everything posted by sc0rpi0

  1. Please accept my sincere apologies. I generally post all my stuff in the usb hacks forum. After posting, I noticed that this doesn't really go under the category of usb drive hacks, so I posted it in "Hacks and Mods" which I thought was a better place to put it. Sorry again if this caused any inconvenience.
  2. Uses hosts files to display one website when another is accessed. Kind of a simple concept...here it is anyway. For example, using this tool, I could make it so that when I go to www.yahoo.com, I am given the page www.msn.com Not really hacking...but interesting nevertheless. http://www.mediafire.com/?9u91xnjypgz
  3. Kind of a simple concept...here it is anyway. It's a batch file which replaces a site for another on a computer. For example, using this tool, I could make it so that when I go to www.yahoo.com, I am given the page www.msn.com Not really hacking...but interesting nevertheless. http://www.mediafire.com/?9u91xnjypgz
  4. sc0rpi0

    Netcat -e

    I like it! Keep up the good work.
  5. sc0rpi0

    Netcat -e

    Thanks so much for your help.
  6. sc0rpi0

    PCGuard

    Are PCGuard encrypted executables typically detected by av? Thanks.
  7. sc0rpi0

    Netcat -e

    I guess I should know what those are. I don't. Could you enlighten me? Thanks.
  8. sc0rpi0

    Netcat -e

    I have never used netcat before...and do not intend doing so on my own computer. Recently, I've found several sources saying that the default netcat does not have the "-e" option automatically compiled. In other words, unless netcat is separately compiled, it cannot function as a backdoor/remote access tool. I download netcat from here: http://www.vulnwatch.org/netcat/ Much appreciated.
  9. If it's not too much trouble, would you mind posting the files in something like a zip? With MediaFire, the file can be hosted in a matter of seconds. Thanks very much.
  10. Actually *MOST* firewalls allow any outgoing traffic (even Smoothwall until recently by default allowed any outgoing traffic), And most people only use windows built in firewall. Thanks for the information. Most people I know use either Mcafee or Norton. I believe that both block outbound until permission is granted. Although this can be easily fixed by "netstop security center," the security center stops the ftp.
  11. Yes, this is a noob question. What configurations do I have to make to the hacksaw to make it work?
  12. Sure, just one problem. USB drives put the information on the USB drive. Since cd's cannot be written to, the logs must be ftpd or email off. Chances are, if your target is not your grandma, then the target's firewall will block the email leaving you with nothing. :( Great idea though.
  13. 2 questions... 1. What happens if I connect to an expired ip? 2. What is the $admin share
  14. sc0rpi0

    VB vs VBS

    I know this may be a dumb question, but, what's the difference? Much appreciated.
  15. I recently purchased a 2 GB version of the Sandisk Cruzer. Is this compatible with the U3 Hacker? http://wiki.hak5.org/wiki//Universal_U3_LaunchPad_Hacker Thanks very much.
  16. I just checked my taskmanager and there are 8 incidents of svchost.exe. Does this probably mean I have a virus?
  17. Sounds good! Please tell me how it goes. Thanks.
  18. So you're saying to delete the program files? Just a suggestion, but wouldn't it be best to kill the processes, make a zipped copy of the program files, delete them, run the otherwise-detected stuff, and finally replace the program files and rerun the processes? Kind of complicated but maybe I'll create a special batch file package for just Norton and Mcafee. I have Mcafee but most people I've talked to have Norton. Neither are pausible or completely killable.
  19. Great idea! These anti-av tricks don't really work that well with mcafee. Even with all of its processes killed, whenever a directory is accessed or a file run, the processes start again... :-( Any idea?
  20. Is there a method of making a registry change so that a certain process can be prevented from being launched at startup? Much appreciated.
  21. If I enable remote desktop with this: reg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal Server" /v fDenyTSConnections /t reg_dword /d 0 /f does this mean that I can remotely login to my computer from anywhere? Do I need to make any more configs such as making firewall exceptions? Please assume that I have configured my 3rd party firewall. Is this a security hazard if I do not have a login password? Meaning, could anyone connect? Much appreciated.
  22. The reason why you had to tell windows to show the hidden and system files to see the hacksaw stuff is because the hacksaw stuff was initially hidden to avoid being seen. To make windows consider a file hidden and a system file, do this: attrib "file location" +s +h +s is what makes the file a "system file" +h is what makes the file a "hidden file" Hope this helps.
  23. I was curious concerning two common switchblade commands. What does the ">nul" do in this command: if not exist ....Documentslogfiles md ....Documentslogfiles >nul What does the"2>&1" do in the command: ipconfig /all >> ....Documentslogfiles%computername%.log 2>&1 Thanks very much.
  24. Does anyone know of a way to make a batch file run completely invisible? For some time now, I have been using nircmd, but a dos window pops up for a millisecond beforehand. Much appreciated.
×
×
  • Create New...