Leaderboard


Popular Content

Showing content with the highest reputation on 08/31/2012 in all areas

  1. 1 point
    First piece of advice I can offer is, learn how to build things before you start trying to figure out how to take them down. Understanding how systems operate is the most important thing, then understanding how and why they fail is the next (but almost equally) important thing. Here are a few ideas on how to get started: Get yourself a few cheap, old, hand-me-down computers, reformat the hard drives and install some different operating systems (both proprietary and open source) on them, then network them together. Experiment with various flavors of Linux. Start with some real nonthreatening and pared-down distro like Xubuntu. Install it and be diligent about making sure you get all features of the system working. That is how you learn. Try it out, familiarize yourself with the various applications and how they work. Learn how to do everything in Linux that you used to do in Windows or Mac OS. Try out various environments, window managers, and workflows. Memorize all the most useful shell commands and keyboard shortcuts. Take the initiative to mess around and do things the low-level, "hard" way instead of the high-level, "user-friendly" way. Familiarize yourself with the command line interface and maybe delve into some shell scripting. Get to know the various configuration files, what they do, and learn how to modify them to make your system work how you want it to. Once you have your OS installed and working, try compiling and installing some new programs from raw source code instead of just using a package manager to grab them off the repos. Install and run a Linux Backtrack distro on a laptop, and learn to use the penetration-testing tools, including Metasploit. Try out various attacks against your own systems, investigate the root problems that caused the vulnerabilities, and research how to close those security holes. Learn how to conduct a variety of different attacks against various kinds of systems, by setting up your own systems in various configurations, running various vulnerable programs and services, and then attacking them using your Backtrack laptop. Get a wireless router and install DD-WRT on it. Explore the various awesome features and functionalities of that alternate firmware. Use your Backtrack laptop to investigate wireless vulnerabilities of various services on your DD-WRT router. Learn how to set up a firewall and lock down your router to repel such attacks. Pick up a high-level, object-oriented programming language like Java, Visual Basic or C++, and put some effort into working with it. Learn how to code simple functions, organize those functions together into discrete classes, then how to structure classes together into more complex applications. Think of a simple problem, figure out a way to use programming to solve that problem, then move on to a more difficult problem. Don't be put off by failures. Analyze your failures and try different approaches until you find something that works. Use online resources like Stack Overflow, Ycombinator, Coding Forums, TopCoder, etc. to find others who may have faced the same problem as yours, or a similar one. Learn to adapt solutions to new applications. If all else fails, don't be afraid to ask for help, but never resort to asking for help until you've thoroughly explored all the avenues you can think of. After you've achieved a familiarity with object-oriented programming, try investigating a lower-level, procedural language like C or even Assembly. This kind of programming is certainly not for everyone, but the rewards can be great if you can master it. While you're learning to program, and once you've achieved a comfort level of familiarity with an easy "beginner's distro," start working your way toward more "hands-on" distros like Debian, SUSE, Sabayon, and Arch. Each step you take along the road to more and more "challenging" distros will force you to make more important, low-level decisions about your computer that require more fundamental understanding of how the machine works. At some point, you should set a goal to achieve the successful installation and configuration of an extremely "techy" distro like Slackware or Gentoo. Successfully installing and configuring Gentoo for the first time will undoubtedly be a nightmare, but perseverance will reward you with a level of insight and familiarity into Linux that you probably cannot achieve in any other way. Plus you'll have a totally custom, personalized, screamingly fast Linux system tailored specifically for the hardware it runs on, that you built yourself from scratch and compiled package by package. That's something you can really take pride in. After you've become intimately familiar with Linux, move on to a more generic UNIX variant like OpenBSD. If you've been through the Gentoo trial-by-fire, OpenBSD installation will be a snap. Learn to set up a file server, Web server, proxy server, and firewall on your BSD box. Learn how to secure your BSD box, then try using your Backtrack machine to test vulnerabilities and close security holes in your BSD system. Explore all avenues of computing that you find interesting. Learn to build hardware systems from scratch (it's not difficult). Build a home network, set it up and make it do all the awesome things you can dream of, like: serve movies and games to your TV, play music in any room of your house, monitor your environment with security cams, stream the camera feeds and other media on the Internet. Read lots of books on computing, code, cryptography, the history of computing, the history of technological innovations, the history of warfare and strategy. Read books on various sciences and how different kinds of businesses operate. Broaden your mind as much as possible by reading. Read about psychology, and read books about the exploits of ingenious hackers, phreakers, scientists, politicians, businessmen, con-men, spies, and thieves. Learn how the criminal mind operates, but don't ever lose a grip on your own personal sense of ethics and morality. Set a code of conduct for yourself based on the standards of behavior you'd expect from other people whom you trust and respect, and dedicate your life to living up to that standard. Read lots of fiction as well as nonfiction: novels, short stories, comic books, whatever. Especially, seek out books that challenge your understanding and personal conceptions about the world. It's important to have a balanced life, and a balanced mind. Inspiration often arises from the most unexpected of places, so don't deny yourself the indulgences of the heart and imagination. They certainly pay tremendous dividends in the life of the mind. Don't take anything for granted. Question everything. Learn to use logic and critical thinking to differentiate evidenced truth from unevidenced hearsay and bullshit. Be social within your community. Join users groups, attend conferences, join a hackerspace and attend Maker Fairs. Meet people with similar interests. Share ideas and collaborate. Make friends and be happy. Help your friends excel in their projects, and in most cases they'll return the favor for you. Have respect for others. No matter how much you think you know, you can always learn more and you're not always right about what you think you know. Even people whose intellect you don't respect can surprise you and teach you something you never realized before. So just be cool and don't be a dick. There are far too many assholes in this world as it is. That's all I can think of at the moment. I'll post again if and when I think of more.
  2. 0 points
    Hello, i'm a radio enthusiast, as well as a phone phreak, and was wondering if anyone in this board still fires up his/her receiver searching for curious and interesting transmissions from phone links. From time to tiem, there could be heard still in hf some phone links, but not many as were several years ago. Of course, if there is anyone trying other bands and satellite, would be interesting to chat here. Cheers!!!
  3. -1 points
    There are a metric asston of "wholesale" pay-as-you go providers. Just deposit USD 20 or so and they provide you a connection. Most are SIP, however. But unless you are behind a restrictive firewall SIP vs IAX won't be a problem.
  4. -1 points
    Thank you for your answer, but I need Voip provider which allows custom caller ID functionality. To spoof numbers. Such providers are very rare, voipjet and nufone are one of them, but I can not register accounts there . I know that there are a lot of voip providers even cheap, but i need that one that support any caller id setting.
  5. -1 points
    Good time of day to all. I'd found this forum in search engine and was pleasured that there are a huge amount of phreakers (I was trying to find good phreaker phorum in former Soviet Union countries but it is impossible). So, let me ask one question, as I see that there are people who know. What IAX VoIP providers can be used as channel to make CID Spoofing? As I know VoipJet, nuphone and some else supports it, but there are some troubles, most of such providers needs letter of intention (VoipJET), some needs first payment by credit card... Does anybody know VoIP provider which can be used for asterisk phone spoofing and it has open registration and have some trial money on account (10-20 cents). Of if somebody has the voipjet account with small ballance, I can by it or rent to make some small testing. Thank you in advance, my contacts Skype: swap3r ICQ 8-33*5*5-2
  6. -1 points
    go here: ANAC numbers list. Thought it may be helpful. --p0d
  7. -2 points
    I have the app. I can send it to you if you want.
  8. -2 points
    I have an HP DV4000 laptop with a Power-On password activated, but no password. The HP manual details how to reset CMOS, pointing to a program on their website called UNLOCK6.EXE, which is no longer available (Thanks, HP!). Anyway, I have tried unplugging the CMOS battery, looked for a jumper or switch, etc. but no luck. It seems like the only way is to find this UNLOCK6 program to run the override password (05260) that was given to me on this laptop, so that UNLOCK6 can generate a backdoor password. If anyone can help with a copy of this program or by generating the password and passing it along to me, it would be appreciated. Thanks!