• Content count

  • Joined

  • Last visited

Community Reputation

1 Neutral

About M0ralGray

  • Rank
  • Birthday 02/17/1982

Contact Methods

  • ICQ

Profile Information

  • Location
    The Street
  1. While this is an option and I won't directly condone workplace probing, if you carefully probe what protocols can slip by the firewall, there is a high chance you can tunnel said vpn through that service. This was a common method used for people who had data signal to their home by their ISP but did not have actual service. They would get the typical "Your service has not been setup yet.. please contact us at 1800 ******" but truth be told other common protocols could make it and thus the tunnels became useful tools. Zapperlink's solution is the correct one if you are trying to bypass the firewall. Although the connection would have to be a reverse connection unless your internal IP address at work has had some ports natted in the firewall to the external IP of your work. An easy way to get a simple reverse connection is to use netcat on a port that is open outbound at work and not blocked by your ISP at home. All in all this seems to be making things overly complicated though. If you control the endpoint router/firewall on both ends then why can't you just change some of the settings? If you could it wouldn't be too hard to setup something like a PPTP or IPSec VPN server.
  2. If that is all you need to do then Knoppix (www.knoppix.net) or any other Linux Live CD with NTFS-3G support would work. Just boot the CD, mount the hard drive as writable, and make the changes.
  3. Ophcrack's LM tables have always worked well for me and since you're forcing Vista to use the LM hash they should work for you . They're not that big either. The smaller set is 380MB unzipped and the larger set is 703 unzipped. You can find them here... http://ophcrack.sourceforge.net/tables.php
  4. Based on this part of a sentence alone i wouldn't recommend you try and make anything explosive. If you don't understand the basic chemistry behind what makes things go boom you'll just end up hurting yourself. Unless of course you're determined to win a Darwin Award Remember..."the tree of life is self pruning"
  5. It appears this network has been setup fairly well. I control network access within my company about the same way. Even the cheapest Sonicwalls can detect and drop IP spoofs and port scans so trying either of those will with no doubt send up a red flag. Also some are set to cache ARP requests and detect changes. The model listed in your diagram is capable of doing this. If you're dead set on getting around the proxy tunneling might be the only option. That is provided unused ports aren't blocked at the gateway. Edit for clairity on proxy routing: "Accessing the internet" is kinda vague here. Are you sure that all requests from all ports are going through the proxy? Or just http(port 80)? It's likely that the network admin set the Sonicwall or Layer 3 Switch to pass only http requests from the proxy server's IP address. All other requests for http would be directed to the proxy server, which would then filter/log/whatever the requests and then send them back to the switch(which will allow them to pass through since they are coming from the proxy's IP address) and then out to the internet. If the proxy server goes down the all http requests are "lost" which would stop your internet access.
  6. Ladyada also known as "limor" is indeed awesome. She is nothing short of a wizard with regards to electronics. For those not familiar with her you should check out her site at http://www.ladyada.net/. Under the make section there are some amazing and challenging projects.
  7. I received one of the cold heat soldering irons as a gift once and I would like to reiterate they they are pretty much worthless. Small jewelry repair is the only thing they are good for. I've never had any success whatsoever with it in terms of electronics. The commercial always cracked me up though. Sadly, I was never able to solder a connection and then seconds later make ice cubes for my drink...
  8. If you're looking for something for Linux i recommend Kivio http://www.koffice.org/kivio/ While it is not anything near Microsoft Visio, it isn't bad considering it's free. On the other hand if there are any newer computers at your workplace with MS Office 2007, you can easily make flowcharts in Word. Just go to the insert tab on click the shapes icon on the ribbon.
  9. I think your options are kinda limited here. If you don't want to disable caching of the thumbnails the only other options I can think of are: 1. Select do not show hidden files and folders under tools->folder options->view 2. Select hide protected system operating files also under tools->folder options->view 3. Upgrade to Vista *dodges rotten tomatoes* as it caches all thumbnails in one place There may be another option and if you find it please enlighten us because I've never heard of it.
  10. I don't use SuSE so I don't know if this is what you are looking for, but there are several aircrack-ng RPM downloads with working links at http://rpmfind.net/linux/RPM/Applications_System.html Bah nevermind it looks like those are for Fedora...
  11. Biometric fingerprint readers are inherently flawed in that you leave your private key on just about everything you touch. Retinal scanners are more secure, but I've always shied away from anything that requires a body part i wouldn't want to lose just to gain convenient access.
  12. Yes if you want to edit the registry you could either use the command i gave previously and type "regedit" from the administrator command prompt or runas /user:domain\domainadminusername regedit I completely agree with mirrorshades though. A Linux live CD might be the best way to get around restrictions without doing any harm. If you mess up the registry the admins will find out about it and probably will have no trouble tracing it back to you. Don't jeopardize your future for something trivial.
  13. What passes do you have exactly? If you have either the local admin or domain admin you could always run programs on the machine as those. Do you have access to the command prompt or the run menu? If not you could try making a shortcut or batch file to start c:\windows\system32\cmd.exe or c:\windows\system32\command.com On the run menu or limited command prompt... runas /user:adminname cmd.exe for local admin or runas /user:domainname\domainadmin cmd.exe gives you access under the domain admin. From this administrative command prompt you could start or restart any program you like. To kill and restart Windows Explorer. tskill explorer explorer.exe There are other solutions to this problem in a domain such as the "netdom" or "net" command but unless you are familiar with active directory I wouldn't suggest trying anything with it. As the previous poster said. Please don't get expelled from school or fired from work for using this info. Login attempts can be audited in both domains and on local machines. *Edited for code clarity*
  14. Wow... Those IP's are from all over the world. I would first try scanning all of your computers for spyware/trojans. Chances are you may have picked up a trojan from one of your torrent downloads. If any of your systems are infected and has become a zombie those might be requests from a botnet that are getting blocked. If you want to determine what those connections are trying to do you could always... 1. Set up a honeypot/tarpit (Irongeek has a video on his site). Setup the honeypot in a virtual machine and do a full NAT from the router to that VM. This will pass all those connection attemps to that VM. You can probably collect some info doing that. You could have the Host system running Wireshark to see if anything is spilling over into your local network. 2. Setup a firewall with a good IDS, like IPCop running Snort, and do a full NAT from the router to that firewall. This would also give you info about what the connections are trying to do. 3. I don't know about yours, but my ISP has the DHCP lease time set to an hour. So unplugging your cable modem from the wall for a day would probably cause you to get a new IP address. This wouldn't solve the problem just make it someone else's(whoever got your current IP) problem. This also won't work if you have a static IP or a trojan on one of your comps, as the trojan will just signal the IP change and the problem will continue. 4. You could always call your ISP, battle through the tier 1 support *shudder*, and give a supervisor a copy of the log files. Just some ideas
  15. On Windows 'ipconfig' will show you your internal LAN address. Visit www.ipchicken.com to find the external(WAN) IP of your router.