Jump to content

DingleBerries

Dedicated Members
  • Posts

    1,291
  • Joined

  • Last visited

Everything posted by DingleBerries

  1. I am doing a personal survey. If you work in IT are you planning on moving to win7 when it comes out? If so in how long? If not what are your reasons.
  2. I enjoy all of this as much as the next person, but there are some flaws to this. After I enter my login creds is it going to connect to to Live and allow me to chat with others using the same gui as the original? If not is there a way to take those chars and open real like to log me in? Just like the Y! webcam code that made all buttons accept, cant find the sauce atm, you can place a window in front to the real app and just capture that. I came off a bit rude in my first post but if all it does is displays a gui and prints chars to a file then any one can do that.
  3. I have been playing with a few proxies here and there, and have found some that used to work but now do not. I have to put this project on the backburner for now but if any one decides to pick it up let me know and I will help any way i know how. Until then VM+Windows+ZigZagJoes application is the best.
  4. So there is some VB in there, but look at all the JAVA calls. Be aware that he has coded RATs in the past that are java based. It does look for a password dialog box and write a file so it may be legit.
  5. I have one now too. 5 dollars, thats 1/2 off his! Also his is a RAT written in JAVA, not VB.
  6. Can you also make a gui in vb to track my IP? Seems like you have a bad reputation in other forums as well http://www.blackhat-forums.com/index.php?showtopic=8720 Im not saying what you do is a bad thing, but this just isnt the place for this kind of tool. There are already 100000 skiddies here and this is just adding to them. If anything I would try hackforums or advertise better on youtube, and then again you can always torrent it.
  7. I cannot believe people really pay for this shit. Take a screen shot of the ap, MSNMSG, and code two input fields that dump the text to a file. If you are thinking about buying this, dont... its a waste of time.
  8. Also I would imagine that even if you encrypted some files and had a way to open them, the iphone takes screen shots all the time. All some one would have to do is find the screen shot and there would be no need in cracking a file. Until apple says, here ya go guys do what you will, you should just keep your phone in sight at all times. Plus sensitive information shouldnt be kept on a phone in the first place.
  9. Dont save CP or nudes of your wife on your phone, issue diverted. Also, 1sec in google = http://forums.whirlpool.net.au/forum-repli...fm/1035217.html about 10 apps to encrypt files for the iphone(not file system).
  10. The only issue I see with using an extra piece of hardware is shonen will be the one called out there to fix it when it breaks. With software is pretty easy to manage users who /may/ have no idea what they are doing.
  11. The second link is just a bandwidth shaping tool and I cannot give reviews on any of that, since i havent used it. I can try the third one, which imo is the easiest solution. Just give him the exe and a bat file. Have that bat file create 2 new bat files then add a cron job... is it cron in windows?
  12. No they are not. But I did sign you up for some lovely viagra pills.
  13. If its windows you can do all of that without extra hardware. This is a post on how to setup SquidProxy to do that; http://sukka.jct.ac.il/~yedidia/squid_limit/ http://www.softpedia.com/get/Network-Tools...l-Edition.shtml Or follow this step by step and set up a cron job to turn on and off the nic at certain times http://en.kioskea.net/faq/sujet-1886-enabl...he-command-line
  14. Learn bash scripting... It will save you loads of time.
  15. Unless your name is Codine and you are from the hakforums and you wrote that in 2007 then you didnt code that. PROOF Forum topic Posted by wohawsnng 01-14-08 Please give credit where credit is due.
  16. Not very mush by the looks of them, all they can do is travel in a straight line. Get a cheap rc car, lower the voltage, hot glue the front so it travels in a straight line, 10$ tween bot... then you hope no one steals it.
  17. I get to post twice because I am just that damn awesome!
  18. I can whip up a simple trojan for use on this episode if they want...
  19. Thank you ZigZagJoe and Xqtftqx. I think your way is alot easier Xqtftqx, so I will be doing that instead of a portable firefox. So now the plan is to copy songs from /tmp, grab xml data, use python xml phaser to add the meta data... wow that was made things 10x easier. So this is what I have so far. (Ubuntu 8.10) 1. Clear /tmp files 2. Copy /tmp files to ~/Desktop/PandoraRipper/Music #!/bin/bash while [ 1 ] do cp -p -b /tmp/Flash* ~/Desktop/PandoraRipper/Music done 3. Put this script in the Music directory #!/bin/bash rm Flash*~ for f in Flash*; do mv $f `basename $f `.m4a; done; This is just for now, until I can find away of not using a proxy with ff. Next step will be automating Picard(DIRECT DOWNLOAD) to tag the m4a files and using something like Prism to launch pandora.
  20. Not a problem. I didn't want to get to malicious with it, but there are alot of things that can be added; spreading, irc/icq commands, p2p, knocking out firefalls ect. It really is the base of a python bot net :P, but thats not my cup o' tea.
  21. Plausible deniability will not work if the court can prove that you had the know how, but neglected to take the proper actions to secure you access point. Also they will probably find this post in your history/log, or at least link you to this account, and say, "fuck off, you dled that child porno". Trust me, people use that excuse all the time.
  22. Does the Ipod allow syncing and playing at the same time?
  23. I havent really done much yet, just looking at how things work. I have a pretty good way of downloading all the songs via python... but finding the name and renaming the song is an issue atm. UPDATE: atm I am using Portable FireFox(For linux) and a nice python http monitoring server, httpMonitor. The reason I chose to use portable FireFox is because the connection settings have to be edited in order to use the httpMonitor proxy. Basically its just a bash script that runs ff, turns on the server and waits for a certain url. Until I can figure out naming of the songs I am a bit stuck. EDIT I am now using this: http://www.okisoft.co.jp/esc/python/proxy/ Its a local proxy that is really great for monitoring http headers. Pretty much I am going to grab anything that looks like http://audio-sjl-t*-*.pandora.com/access/?version=*&lid=*
×
×
  • Create New...