Jump to content

Kerberos

Active Members
  • Posts

    57
  • Joined

  • Last visited

Everything posted by Kerberos

  1. Nice! I'd try for it but I've never worked on anything so robust in a web-based environment before. I wouldn't have a clue what I'm doing.
  2. Kerberos

    Hack Wars

    Yes, but what isn't free if you're in the right 'circle'...
  3. So I just started messing around with extensions for Chrome and they're pretty awesome. They're really easy to make and you have quite a lot of control. I've already installed a few as well as made a few of my own. I didn't make anything that anybody else would get use out of, just some small things to make my browsing a little easier. Anyways, after getting the basics of extension creation down, I started thinking about what kinds of things you could make. I figured that it might be fun to ask the Hak5 community for some good ideas. If there's anywhere to get killer ideas for cool things to make it would be here. So...anybody have any good ideas? What kinds of extensions would you all like to see (assuming you use Chrome that is). What kinds of things would you make if you could?
  4. I always set the adapter type to "Intel PRO/1000 MT Desktop (8254OEM)" and have it set to "Bridged Adapter". It bridges with my wireless card flawlessly and the guest OS has a fully functioning wired connection (on eth0). As for what to try to get it working, A agree that you should try different adapter types. I think I've had to use one of the PCnet ones before on a different computer because the Intel one wouldn't work for some reason. I don't think I've ever had to change to NAT or any of the other options for "Attached to". Bridged Adapter should be fine. If that doesn't work, then I'm not sure. It's always sort of just...worked for me. Sorry, I guess that's not much help :(.
  5. Kerberos

    Hack Wars

    Which one? Hack Wars is a lot to get used to at first, but once you get into it it's quite fun. Uplink I found to be difficult at first because if you screw up you can ruin future missions and end up with nowhere to go. But as with Hack Wars, once you get into it it's not too hard. As for experience, Hack Wars is based around being able to actually write your own "scripts" to do things like attack other computers, so some programming knowledge definitely helps, but it's not necessary. Uplink doesn't really require any previous knowledge but can be difficult without some basic understanding of things like bouncing your connection and network topology. I'd say give either (or both) a try. If it's too much, oh well, if not, you'll have a great game (or two) to play. If you need help figuring out Hack Wars I don't mind giving pointers/help :).
  6. Kerberos

    Hack Wars

    Uplink is probably my favorite hacking sim of all time. Once you get some nice hardware going there's nothing you can't do. The network penetration is particularly enjoyable, especially with medium to large scale networks. I love the voice authentication too. Being able to get just far enough into the network to find a phone number, and then using the phone number to get a voice recording to synthesize the voice authentication is so cool. That, and the use of elliptic curve cryptography. Pretty good stuff :D
  7. That's exactly what I was trying to do :P The only way I can think of is brute force, unless there is a weakness that could be exploited. That's why I was asking if anybody knows of any weaknesses that would allow this to be done with more efficiency than a brute force attempt....
  8. I as well have a few invites left. I think with this many people with accounts we should have a virtually endless supply of invites since everyone who's invited gets invites. I think I might start putting my invites up for grabs on twitter :P. Let's keep the chain going though. Anybody looking for invites let us know here! :D
  9. It's interesting how apparently everybody decided to start their multipass at the exact same time as me :P. I've seen like 5 different threads about multipasses in the last few days. Anyways, Corsair would be my first suggestion. Their known for speed and quality. I've got an 8GB Corsair Voyager coming in the mail (that only cost me $20 too :D). There are other big names like Kingston to consider as well. For a multipass I wouldn't think you would need more than 8GB, but depending on what you plan on doing you could always go for more. Never hurts to have a little spare room ;).
  10. Well this is going pretty well :D. Now all we need is to get a Google Voice invite thread going and we'll be set. From what I've seen they're hard to come by though. Nobody seems to have any... :(
  11. Good to see somebody agrees :). My bad, I never actually bothered to look into how DeepFreeze actually works. It's been many, many years since their computers even ran Windows and I just remembered the name of the program from when they did. They're all linux now :P. And I could've sworn that the at command thing worked (sometimes) if you aren't admin. Oh well, my memory is getting pretty bad :P.
  12. Finally _I_ get to invite someone! lol invite sent :D Enjoy!
  13. So nobody else has thought of/done BT4 on a multipass-type setup with persistent changes? Nobody???
  14. Might as well go with the flow. In invite would be pretty wicked :D -> fear.neverending@gmail.com <-
  15. That's what it does right now, but I want persistent changes. I don't want to have to update 60 different pieces of software every time I boot into it. Also, I don't always have an internet connection to do so, so sometimes I can't even update anything.
  16. Kerberos

    Hack Wars

    Not sure how many people here are into hacking sims, but I would assume at least a few, if not a decent number. There's one that's been around for a while that's actually kind of fun once you get into it. It's online so you play against other players, and the focus is on programming. You write scripts to do stuff and as you level up and increase your skill levels you gain access to more advanced script API functions/subroutines. One of the types of programs/scripts you can write is a mini-HTTP server that other players can connect to and view a website if you feel like designing one. It's not very realistic, except for the programming aspect, but it's still kind of cool (and slightly addicting at times). The "programming" (or more "scripting") language is basically stripped down C with a game-specific, custom API. It's made in java and pops out of your browser window. It's still a little buggy, but it's being actively developed and is coming along pretty well. Check it out if it sounds interesting: Hack Wars.
  17. My old school couldn't give a crap less what anyone thinks. They're too lazy to change anything. There's no way they'd even listen. I'm all for "don't break the rules" and such when it's not really a big deal, but on the other hand, I don't see any harm in simply trying to use a different browser. Before launching into any crazy stuff, I'd have to agree (at least partially) with lain. Asking definitely doesn't hurt. If you end up in my situation and nobody even listens, then you can start trying things. The first thing I'll say, though, is be careful what you do because some schools can be fairly tough with their rules as far as what they consider you messing around too much. Luckily for me my old school's staff was carefree enough to not even notice when I poked around, but a lot of schools are a different story. You can catch a lot of heat for doing some pretty harmless stuff. Anyways, by the sounds of it you're going to have to go around the OS altogether or at least get some elevated privileges or else you won't be able to do much. The simplest solution, which requires the computers have an optical drive, would be to just boot into a linux live CD (or possibly even a bootable USB key with something similar on it if that's possible) and work from there. This, of course, fails to take into account any programs or network resources you may require to get school work done. But it's still an example of a partial solution. If you need access to Windows or anything within it, then a linux live CD could still be used to access the hard drive of the computer to copy over any required programs (although installation is still not possible at this point, so you'd be stuck with portable, no-install applications). This approach would be thwarted if the computers have state-restoration software such as DeepFreeze on them because the hard drive will simply reset to it's stored state upon reboot. This can also be disabled from within linux, but that would be very obvious, fairly permanent, and would not be smiled upon by anyone having to clean up the mess. I would advise against doing that. Another possible alternative would be attempting to gain higher privileges in Windows through various means. You could try using the "at" command privilege escalation exploit to get system, but I've found it doesn't work on most school computers. Privilege escalation is most definitely considered hacking and exploitation and I can almost guarantee is against the rules. If you're careful you might get away with it a few times, but if you have to do it every time you want to use your browser I'd say it's too risky, even if you're only doing it so you can run something and not to install or modify anything. Keep in mind that the things I've suggested are not for breaking into school networks/computers or doing anything highly illegal. I definitely would not suggest doing anything too drastic on school computers as I know a few people who got expelled for modifying grades and helping others access blocked websites (I'm sure you can guess what kind -.-' ). Moral is: be careful and don't do anything more than is necessary. If you want to hack a system from one end to the other throw up a virtual machine and have at it. Just keep it at home :D Or at least somewhere where it's harder to figure out that it's you (like...Darren's favorite coffee shop or the airport ;) ).
  18. I finally got around to making my own USB Multipass. It's pretty awesome, I must admit. The only thing I would like to have that I can't quite figure out is a persistent Backtrack 4. From what I understand (which could quite easily be very wrong), Backtrack 4 needs to be "installed" to the drive (in this case the USB key/flash drive) in order for changes to be persistent. This "installation" requires (from what I've read) partitioning of the destination drive. But would that very partitioning not mess up the rest of the USB Multipass? Is it possible to have everything coexist together? If I'm correct about the installation and partitioning, would it not be possible to do a normal installation of Backtrack 4 onto the USB key/flash drive as per any of the various tutorials floating around, and then add the rest of the Multipass files and simply modify the grub that's installed by Backtrack 4? Or is the version it uses not going to work too well for loading the rest of the Multipass' systems/utilities? If I'm completely missing something or am wrong about something, please let me know. I'd really like to get this working. Any suggestions or advice would be helpful :) Thanks!
  19. I recently decided to give the whole "vpn" thing a try since I take my laptop everywhere with me (as is it's purpose) and often connect to public wireless networks. I figured before setting up anything too fancy I'd just try to get a basic setup working. I remembered that Windows XP actually has a VPN server built in (sorry if it's not technically a "server", but it accepts VPN connections so that's what I would assume would be the best term to use). So I set up my desktop at home with a VPN connection, forwarded all of the ports that I figured I'd need, and gave it a test. I couldn't connect from my laptop. So I went looking around and found a few tips for which ports to forward. So far I've tried 500,50,51,1701,1723 TCP and UDP. I also have PPTP Passthrough, L2TP Passthrough, and IPSEC Passthrough enabled on my router. However I still can't get through. The reason that I know it's my port forwarding causing the problem is that I was able to connect when I DMZ'd my desktop. So it has to be the port forwarding (at least I can't think of any other logical problem). So my question is: Can anybody tell me what I'm doing wrong and which ports I should be forwarding?
  20. Wow...pretty harsh stuff. You're not alone ssmithisme, I also like the series. I think some people are falling into a bit of a paradox though. The act of beating the bloody hell out of anything Twilight-related has become just as popular and annoying as the 13 year old psychotic Twilight fans themselves. It's quite the vicious cycle. But that's just my opinion. There are definitely also people who just didn't like the series, and there's nothing wrong with that.
  21. This is slowly turning into my source of grey hair. I think I've tried almost everything I can possibly try. So now I turn to the gurus in various areas of the Hak5 community, or maybe even the Hak5 members themselves. Someone must have sufficient multimedia (audio/video) mastery to be of aid. Here is my question: I have a video file. It is in a Windows Media container (.wmv), has VC-1 encoded video (which is fine), and has WMAP encoded audio in 6 channels (which is not fine). Now, from what I understand, my problem is the 6 channels in the audio stream. If it helps at all, I need to play this video file on my PS3, which apparently doesn't support more than 2 channels of audio. So for the last week, I've been trying to figure out how to fix this since I no longer have the source from which I got it. I've tried completely re-encoding the audio and just copying the video stream into both the same container format as well as multiple different container formats. I've tried removing 4 of the 6 channels without having to completely re-encode everything. I've tried demuxing the audio and video, re-encoding the audio, and remuxing them both back together. I'm running out of ideas. I really don't want to put a few days or a week into re-encoding the video, but I will if I have to. But before I do that, can anyone suggest a way of either re-encoding JUST the audio with only 2 channels without having to re-encode the video, or remove 4 of the 6 channels? Actually, any suggestions would be great. This is driving me insane :( . Thanks for the help ::Edit: So 3 minutes after I posted this I found the Windows Media Stream Editor.... Don't you just love when that happens? Anyways, I got it working -.-' ~Kerberos
  22. Kerberos

    Old RAM

    I have a bunch of sticks of really old RAM. Like...really old. Can anyone think of any possible uses for them? Anything at all? They're Siemens HYB514400BJ-70 RAM sticks. Any ideas?
  23. I guess it would be nice to explain what I'm trying to do first. My bad. I had an interesting, albeit most likely pointless idea for cracking LM hashes. Since there are obvious restrictions on the key used to encrypt the constant string and generate the final hash (or more accurately, half of the final hash), I thought that there might be a usable Known Plaintext Attack on DES that could be used to crack the key (or in the case of LM, the plaintext of the one half of the LM hash since it is used as the key) since the plaintext is a known constant. I realize that rainbow tables are probably more effective, but I was just curious as to whether or not this approach might yield a cracking time that might make it a nice mid-level method sitting between the memory requirements of rainbow tables and the time requirements of pure brute force cracking. So now that that's out of the way, something popped up today on google, but the information is a little technical for the amount of time that I've spent trying to understand it so far. Maybe with a little more effort I can make something out of it. It's located here: Known Plaintext Attack on DES {PDF}. The only strange thing that I noticed is that it lists different approaches to attacking 1-round DES, 2-round DES, 3-round DES, etc. Does DES not employ 16 rounds? If so, then I guess this isn't of as much help as I thought. Although it is still possible (I think) to use a weakness in something like 5 rounds to attack a higher number of rounds, I'm not exactly an expert in cryptanalysis. Besides, if someone figured it out I'm sure we would hear of it eventually. Maybe it's just a matter of time. So...any thoughts? Oh, and as for the plain and simple cracking of the key, I'm going to go do some digging for efficient methods, but if anyone has any pointers that might help me out I'd love to hear them. As I said above, there are obvious restrictions on the key that is used so it would be trivial to narrow the range of possibilities quite dramatically. The uppercase restriction automatically cuts a huge chunk of possibilities out.
  24. I've been trying to find anything about a Known Plaintext Attack on DES for recovering a key, but all I've been able to find is one for Tripple DES. Does anyone know if DES is weak against a Known Plaintext Attack, and if so, can you point me to some info about how to do it? :)
×
×
  • Create New...