Jump to content

DingleBerries

Dedicated Members
  • Posts

    1,291
  • Joined

  • Last visited

Everything posted by DingleBerries

  1. http://www.virustotal.com/analisis/b6498d9...0a463fc129e1191 http://www.virustotal.com/analisis/dff9db8...690c959407c18ea not bad, still needs a bit of work though
  2. all of the nircom products are detected.
  3. http://ettercap.darwinports.com/ you might also want to look in github, finkproject.com and a few other places that port this kind of stuff for easy use. And to answer your question: VIA
  4. Sure but just to make sure format it to ext3, that way if you have had to much to drink and decide to install you will know, "Hey I shouldnt over ride this NTFS partition, but look there is a ext3 one!"
  5. Just run netstat 1 and watch for it to find the targets ip.
  6. The AV wont be able to delete it, however it will not allow it to run. If you look at the haksaw you will see how it works and the reason its not all binded into 1 exe. inpage:"exe crypter"
  7. Is that taking in to consideration rainbow table and the newer line of processors or gpus?
  8. Most of those tools are labeled as "hacker tools" so they will be picked up by AV unless you find a crypter.
  9. I just did this but no all of it is correct. All my hardware works with the nerwer kernel but its not showing up after I submit it. Some of the hardware has a dash(-) in the "Works" section because its currently inactive or because I am using proprietary drivers, but my webcam works with stock drivers and still isnt picked up. Still great idea and a good way to inform developers what is needed.
  10. ITT: Butt hurt Hannah Montana fans.
  11. Write one. Autohot key is the easiest to do it in. Find the window, set the user name and then run it against a string of words in a list. In all honesty you should really google before you ask because there are tons out there, but this forum isnt about that kind of "hacking".
  12. I am a linux guy, but I have to go with server 08.
  13. Collect all the codes you can and try to see if they are being generated by a specific algorithm... think keygen.
  14. I came upon this project that my help immensely, it's called SSHsprinkler. Just read up on sending POST commands via python and there you have it.
  15. plug in via dailup card on pc use tftpd to give it an ip ???? Profit
  16. I am working on a netcat clone atm so maybe when its finished sablefoxx can include that. It doesnt have all the tools but most can bet included. Atm all it does is bind a cmd shell to a port.
  17. I mirror exactly what moonlit just stated. I thought the guys app was pretty awesome. All the putty without the bloat. Good job and thanks for sharing.
  18. Double click it and start typing. It will create the file in the same directory.
  19. FF Profile copy works when there are multiple profiles installed.
  20. No need to put it on the U3 partition, just call it from the autorun.ini and it can stay on the flash partition. None of these should be picked up by AntiVirus so there is no need to try and keep it from deleted the file. Ill work on all that later, there are just early betas.
  21. A voucher is not a gift card. Hacking a gift card would take alot more than just some keygen but these vouchers are given out online by many people. I can see voucher collisions in the near future though, but i doubt some one will buy a 200USD iTunes voucher.
  22. OK ive seen this, what he has is a regular laptop tv tuner. Her unscrews the plat from the coax box to access the cable unrestricted, there is a tuner in the room that limits what he can and cannot do. He plugs unscrews the cable from the bux and plugs it into his lappy with the tuner plugged in. From there he is able to go to channels >100 and look at all of the shit going on in the hotel, including free hbo. The reason he was able to access billing was because they hotel had an option for people to check there bills from their television by going to a certain channel. Yeah so all you need is a laptop, tv tuner and a hotel dumb enough to set there stuff up in this manner.
  23. New Tools added. If you have any problems let me know.
  24. Feds show up because of the possibility of CP, plus media attention. Other than that if the celebrity was older(legal) i have no problem with this type of thing. They make their money in front of a camera. If I find a facebook exploit to dump pictures of paris hilton... Im so doing it and selling them to the first tabloid.
×
×
  • Create New...