tekio

Binrev Financier
  • Content count

    1,525
  • Joined

  • Last visited

  • Days Won

    80

Everything posted by tekio

  1. Anyone here play C.S. or Technology on Quizup? Add/challenge me: Chuck U. Farley.

  2. "Buhahaha!" I love Despicable Me. That dude rocks!

  3. Really liking Ruby. :-)

    1. tekio

      tekio

      Didn't she finally overdose doing PHP with her sister, Perl?

    2. tekio

      tekio

      I heard she got hooked in C. That's some hard shit.

    3. tekio

      tekio

      fatal error : Cannot open include file: 'rehab.h': No such file or directory getClean.c :: Then she started again. With a cup of Java in the morning and worked up to C++, again. Once she got on the OO, there was no turning back.

  4. Up all night learning Ruby. Top 5 reasons I dumped Python and Perl for Ruby: 1 - Knowing one language well is better than being literate in two 2 - Perl sucks on Windows. Ruby does not, and Windows is still used in the work place more than any other O/S 3 - Great OOP implimentation in Ruby 4 - Python is great for having standard libraries in a default install. But the implemnation sucks! (DO I want to learn Python 2.X or Python 3.x? Should I use httplib? urllib? or urllib2) 5 - Perl is pr...

  5. Really loved the Sony Xperia Z3 Compact. However it did not fair well in the drop test: hard case, and screen totally shattered digitizer ruined (guessing it was fused into the screen). Simple 3 foot fall my old Galaxy survived unscathed over a dozen times. :-(

  6. Unplugged for about one week. That sucked,,,, gf's cat thought the AC adapter looked good to eat. Next time, hope he tries eating the end that plugs into the wall... Kidding.... (kind of) ;-/

  7. Late might re-play of the GOP debate. I enjoy a great comedy very now then...... :-)

  8. Major Windows update and minor Android update in once night. Maybe I'll try hitting for the cycle and install the latest 4.X kernel on my Ubuntu Server Box.

    1. tekio

      tekio

      Not sure, I've seen some pretty large companies use IIS, and NT domains, supporting thousands of office users.

    2. tekio

      tekio

      With that said, I do miss the good days, of spending a Saturday afternoon tweaking my operating system, or dialing in Fluxbox. :-)

    3. tekio

      tekio

      Windows Admin: but you're just killing X process (kill -HUP) and shutting all needed applications using X down anyway?

      Linux admin: but my >uptim,e says four months!

    4. Show next comments  30 more
  9. Haha! You don't have Comcast. I wait for up to 2hrs to sign up, or transfer service, etc.... That's why I bitch about Comcast a lot. They have the attitude of: "we're the only one offering high-seed internet in your area. Screw off or wait, and screw-off like this or wait this long....". At least in my area they are like that.... But now, my HOA is contracted with Comcast where I get free Basic (standard definition) Xfinity and 105Mbps for about 35/per month with their modem. So guess I cannot complain too much... At least for the next 12 months, while the price is locked in. Honestly, I don't think a Comcast tech would know what bridging is, let alone how to do it.
  10. Again, all my stuff has been through Comcast. I pretty sure they are specially made for Comcast, vs. a true OEM device. I might try getting a Motorola Surf Board that has not been branded for Comccast.. My Qwest modem could be bridged as well....
  11. Not the ones from Comcast. I guess we might be getting bridging confused, but the way explained in the original message is causing my confusion Comcast bridging with Motorola Surfboard: comcast network -> Motorola Modem (Submnet of 192.168.100.1 cannot be changed and Mac is associated with DHCP or BootP) -> home router So... that actually acts as a seperate sub-net from and needs to be NATed. True bridging: bridged device (no network level associations) -> router/ap with subnet and DHCP for the subnet, connecting to WAN link
  12. Even with my old Motorola Surfboard Modem, I could not bridge it. The manual for the model I have, states there should be a bridging option, as does Comcast's tech site for the modem... The screenshots were for a Comcast SMC device. It really pisses my off, too. I don't want to use their crappy wifi (for several reasons). And.... I don't want to double NAT two subnets.... Maybe I'll into buying a 3rd party modem,that will work. Still.. really, really interested into gaining access to the SNMP service running on it....
  13. Composing and escape plan.....

    1. tekio

      tekio

      Mine goes more like, "slip out the back jack. Make a new plan stan...."

  14. Some also go by the MAC address of the modem/gateway provided by them (as nyphonejacks was leading on to). I know Comcast (in my area does). That I know of, there is no way release without SNMP write access. I've tried getting SNMP access to a comcast device before, but failed. Actually had the harddrive on my laptop crash about 24 hours into an SNMP brute-force attack on SNMP to the modem. I think that's what they use to load /manage updates, etc.. for their modems/gateways. Cneturylink will release the IP address and get a new one, each time the gateway device is rebooted (at least in my area). EDIT: nyphonejacks? Can I bridge a Comcast gateway/router? Can you explain how? EDIT2: Ok. Just googled and mine has bridging disababled. In the manual it quotes as having a bridging option. But it is not there. I'm guessing this has been disabled by Comcast. :-(
  15. Just got offered a position working working between developers and top-tier technical support for a rather large technology company: feeling on cloud 9, at the moment. :-)

    1. TheFunk

      TheFunk

      Congratulations!

  16. Just watched some movie about African Americans in the film industry. Not too sure having Bill Cosby preach about inequality for anything was a winning point. :-$

  17. Does it have a GUI? :-P
  18. As phr34kc0der mentioned, not sure X-Box allows that like Skype. However, CAIN is the incorrect tool. You want Wireshark. ARP-Poisoning streaming traffic on the same collision-domain, on a WiFi link was not the forwarding thinking behind ARP based MITM attacks. I'd find a way to use promiscuous mode traffic monitoring, rather that ARP spoofing. You could temporarily put the Xbox and analyzing host on a WIFi link with no encryption (or WEP) then go into promiscuous mode, and look at the traffic.
  19. Just found a huge bug in the Synaptics driver for my XPS 13, 9343. Apparently it will crash, not detecting the gesture when dragging with one finger and putting another on the touchpad - to continue dragging. At first the cusor will act really flaky - then finally X will crash within 15 - 20 minutes.... The fix is pretty quick and dirty. BUT it works! :-) I guess with Linux there is always a way (no matter how ugly): #!/bin/bashFILE=":0.log"# =Path to Xorg.logFILE_PATH="/var/log/mdm/"FULL_FILE_PATH=$FILE_PATH$FILEDATE=`date +%b-%d-%y:%T`#########################if [[ -e "$FULL_FILE_PATH" ]] then if [ $(grep -c "\(EE\)" $FULL_FILE_PATH) -gt 0 ] then if modprobe -r "i2c_hid" && modprobe -i "i2c_hid" then sleep 4 #sleep 4 seconds to make sure logs are update after re-inserting i2c module rm $FILE_PATH/* && touch $FULL_FILE_PATH && chmod 700 $FULL_FILE_PATH echo "$DATE :: version 2 :: i2c-hid module successfuly reinserted!" >> /var/log/i2c-revive.log else echo $FULL_FILE_PATH echo "$DATE :: version 2 :: error problem wih module load/unload." >> /var/log/i2c-revive.log fi else echo "$DATE :: version 2 :: no error in Xorg file" >> /var/log/i2c-revive.log fielse echo "$DATE :: version 2 :: error $FILE not found or not a regular file." >> /var/log/i2c-revive.logfi#!/bin/bash# =Name of most recent Xorg.logFILE="Xorg.0.log"# =Path to Xorg.logFILE_PATH="/var/log/"FULL_FILE_PATH=$FILE_PATH$FILEDATE=`date +%b-%d-%y:%T`#TMP_LOG=""#########################if [[ -e "$FULL_FILE_PATH" && -f "$FULL_FILE_PATH" ]] then #:DEBUG echo "the file is there and a regular file!" if [ $(egrep -c "\(EE\)" $FULL_FILE_PATH) -gt 0 ] then TMP_LOG="$(grep -v "\(EE\)" $FULL_FILE_PATH)" if modprobe -r "i2c_hid" && modprobe -i "i2c_hid" then sleep 4 #sleep 4 seconds to make sure logs are update after re-inserting i2c module rm $FULL_FILE_PATH echo "$TMP_LOG" > $FULL_FILE_PATH && chmod 700 $FULL_FILE_PATH #Modified echo "$DATE :: i2c-hid module successfuly reinserted!" >> /var/log/i2c-revive.log else echo "$DATE :: error problem wih module load/unload." >> /var/log/i2c-revive.log fi else echo "$DATE :: no error in Xorg file" >> /var/log/i2c-revive.log fielse echo "$DATE :: error $FILE not found or not a regular file." >> /var/log/i2c-revive.logfi EDIT: looking over that, the logs should probably not be executable. LOL Long night......
  20. Anyone know of an HTTP testing/debugging app for Linux? I know Wireshark can be used.... But I'm looking for something like Fiddler on Windows that can be used to send HTTP requests easily, and quickly. Easily copy/paste responses, scripting would be awesome, etc... Free would nice, or affordable would be acceptable. Maybe a "plugin" for Wireshark? An add-on for Chrome or Firefox? A stand alone application? Native Linux would be my first choice, but anything that will get the job done would work.... Thanks...
  21. I'll check that out. Thanks!
  22. You just need good proxies. OR even a VPN account that can let you log into different VPN servers. Use TOR browser or even Chrome with a different user profile, running ghostery, in a private tab. TOR is slow, but uses the TOR network and does stuff help hide its client-side profile. Using a different profile in Chrome for each account, in a private tab (maybe don't even need a private tab), with the Ghostery plugin, and no other plugins or extensions, with a different window size - will help make it difficult to create a client-side profile to track. That is easily do-able and possible without a good VPN service. However, difficulty depends on how good they check for proxies. Finding good proxies can be hit or miss these days. There are blacklist service that check IP addresses against TOR nodes and known proxies. As well as forensics to check for a proxy or TOR use. But usaully they use a blacklisting service. So... finding unlisted, elite proxies should work. The link below is a tutorial I made a few years ago on how to find anonymous proxies. The proxy checker I used has been discontinued. Though mine was registered and paid for, they came out with a freeware version Let me know if you'd like me to upload it.... http://www.screencast.com/t/j4RcS5LiTBAq
  23. Computer lab is 100% penguin powered, now. Running Linux Mint on Dell XPS 9343 and main server is running Ubuntu Server.

  24. I'm looking for something like this: https://luckymarmot.com/paw Not really a security testing application/proxy. But an "http debugger". Meaning a client that can quickly send HTTP requests and see responses with headers in an easily copy and pasted format. Curl could work. But I really need a GUI. These are common on OSX for web developers. Basically to test HTTP responses and requests quickly for developing HTTP applications with stuff like Curl. Right now I'm using Fiddler in a Windows V.M. I've tried Mono Fiddler, but Mono is quite hit and miss with results ranging from awkward to use because the widgets are small - to just crashing. LoL
  25. There was an app called log zapper, or something that worked pre-windows 2000. However, it would not work on Server 2000, and never tried it in years. So I'm not sure if it's been updated... Not even sure of the name anymore. The problem is the logs are in binary, and not text like a Linux/Unix logs. If you cleat the even logs, it will leave a timestamp of deletion in the logs. The best way I found was to open the binary log files directly in a hex editor. Then start randomly deleting shit.... It will leave them unreadable and corrupted. The usefulness varies depending on the sophistication of person looking at them: an average user would just think it was Windows acting up again. A somewhat skilled admin would look at time stamps and wonder, WTF? A seasoned security expert would know, but may not be able to reconstruct data. A national forensic lab would be able to reconstruct data easily... Also, I believe event logs can be searched? I know there are some tools in MS Resource kits for working with event logs remotely, and other 3rd party tools. I'd really reading Hacking Windows Exposed. That is great book that covers all of this in much more detail than I can remember.