.solo

Members
  • Content count

    80
  • Joined

  • Last visited

Everything posted by .solo

  1. You are looking for tshark (http://www.wireshark.org/docs/man-pages/tshark.html).
  2. Arch FTW. Although, it is high time I work in some BSD.
  3. "The maximum file size for ext2/ext3 is actually dependent on the choice of blocksize and hardware architecture" Why are the maximum file size and file system size dependent on the block size? It appears that 4KB is the standard block size in x86; however, ext4 supports larger files and larger file systems with the same block size of 4KB. Does anyone know the origin of this limitation in ext2/ext3 and/or how they overcame it in ext4?
  4. I second livinded. Competent web designers/developers agree the best practice is to separate your presentation from your content completely. Use external CSS, please.
  5. Ohm, you obviously get off on policing binrev. Seriously, I've seen you crush countless topics with your sense of superior morality. The only thing that impresses me about you is that you always find some way to condescend. You've got a real talent.
  6. I second this. Despite what mirrorshades said, there are fundamental/core material that any self respecting computer geek will know. You don't have to be an expert, but I recommend looking at these five. They are certainly among the most consequential on the web for now. Only learning what you want to learn, or what you are interested in is a pretty sad way to go about it. Learn everything you can.
  7. i work atttt burggaa kinngg... too good.
  8. lol "kill all the .." was really promising.
  9. I recently updated a system that hadn't been administered for quite some time and apache stopped working properly. After 600+ megabytes and over 400 updates the server started pointing virtual host traffic to https, which the server wasn't using. I checked the config and the virtual hosts was setup as: NameVirtualHost * <VirtualHost *> #... </VirtualHost> After trying the alternative *:80, I fixed the problem by specifying the IP addresses and port instead of using the catch all asterisk wildcard; however, I had to write a search and replace script to fix around 50 virtual host configuration files in a directory. I am plagued by curiosity as to why the configuration stopped working after months and months of proper operation, and need a more concrete answer for my boss. I am leaning towards the deprecation of that method, but even that seems improbable. I have googled (yeah it is a verb) the hell out of it, to no avail. It doesn't help that whoever configured it didn't to do a very clean upgrade to apache2 as per config migration. I realize this is a very specific problem, but if anyone has any ideas or even a better google search, I would be much obliged.
  10. The hosts file should have been resolving it, there was a valid entry matching that of the ServerName directive in the apache configuration.
  11. if you know python already you should check out django, its a python web development framework. http://www.djangoproject.com http://www.djangobook.com If you are going to do any type of web development, even dynamic content, you need to learn html and css. They are the bread and butter, and they aren't difficult to pick up. http://www.tizag.com
  12. Everyone seems to be forgetting about the sudoers file. Try looking at the visudo command, which is essential a specialized editor for the sudoers config file. sudo visudo Here is an excerpt that may clarify: # User privilege specification root ALL=(ALL) ALL # Members of the admin group may gain root privileges %admin ALL=(ALL) ALL As you can see this is what governs a users ability to sudo, if you want a user to have full sudo power like the initial user in Ubuntu you can add a line such as 'username ALL=(ALL) ALL' or, if you want to customize what sudoing power a user has, the documentation should be show you how.
  13. hydra -l {USERNAME} -P {WORDLIST} -e ns -f -s -vV {ROUTER IP ADDRESS} http-get / this usually works for me, with a good word list.
  14. I was really getting fed up with wireless connectivity issues in backtrack and I think I've found the problem. After I change my mac address with macchanger or ifconfig I can't connect to any access points. I have a Atheros chipset card and a RT73 usb NIC, neither work after I change the mac address. Does anyone else have this problem, or even heard of it?
  15. Keep in mind that FAT32 can't store files larger than 4GB, which might not be a problem for you, but if you have high quality movies you'll be out of luck.
  16. I am still young yet, which I suppose makes me that much more hopeful for an affluent future. My question is for the older members of the forum. Where is the money in a computer science career?
  17. I have quite a few computers running on my network doing various tasks, but a few computers are idle most of the time. I am very interested in some sort of distributed computing solution that will allow me to use the spare processing power from my main desktop. I have done some googling but I can't seem to find anything. I know their are tons of research projects out there doing this with simple applications you download to share your spare processing power when your computer is idle, but I can't seem to find a solution for personal use. I don't want to run clusterknoppix or any other live OS I would like it to run on the existing linux OS. Any ideas?
  18. I'm well aware taping two ninjas together doesn't make one giant ninja. My question is on splitting tasks from a central computer. I am also well aware there are hardware and software limitations. Have you seen the OpenMosix and ClusterKnoppix projects? With all due respect, shut them off and get rid of them is a pathetic response mate.
  19. You address one of my main concerns. Web development has never been very interesting to me, but it is my most requested service. Should I brush up?
  20. Syslog uses UDP for a very good reason. Since UDP requires no handshakes or ACKs, your syslog server can be silent and hidden. It can have no services open apart from the syslog daemon. It can be as impenetrable as you could imagine. I've even heard of people cutting the RX wires on the ethernet cable so it's not possible for the syslog server to say anything at all. Of course to examine logs you have to actually go to the server and examine them, but there's nothing more secure. I have a centralized logging server and I wanted squid to log to it, however when I researched squid configurations I found this. http://www.squid-cache.org/mail-archive/sq...00503/0041.html I haven't fully configured my logging server to cross check every line of my logs on both servers but udp by definition is less reliable. I would be less concerned with my syslog server being hidden because as you said it can be very heavily secured, and if a box that logged to the server was compromised then simply viewing the syslog.conf file will tell you the hostname/ip of the syslog server. What is more important to me is reliability.
  21. mirroshades, I cannot count the number of times someone has asked an ethically trivial question and you respond with a reprimand that completely undermines the central purpose of a hacking forum, education. With all due respect, please stop preaching. I have good reason to understand, study, and even implement malicious methods of hacking. It is my prerogative to be ethical, and not your place to assume I'm not. If I decide to rootkit my own box and set it up as a honeypot, I have the right to. Before this becomes a flame war I want to assure you I understand where you are coming from, but I am tired of arguing about the semantics of a questions in these forums. I only say this because your last two posts are both reprimands. It is counter productive, and it is bad for the forum. It just makes you seem self-righteous.
  22. unfortunately, regular syslog uses udp and is fairly unreliable. syslog-ng uses tcp but requires much more configuration. As for which files to target, every distro I've used has its own naming scheme for logs with the exception of a few such as /var/log/kernel and /var/log/messages. My suggestion is to learn a bit about syslog and syslog-ng. Then, check the /etc/syslog.conf or /etc/syslog-ng.conf and see how logs are being separated. Check there to see if the logs are being sent to a remote server as well. If you have root I would write a script to scour every log file specified in /etc/syslog.conf or /etc/syslog-ng.conf and remove any line with your IP. I've seen alot of them with varying levels of success usually because logging conventions are different across distros and good admins will have their own preferences. I think the real answer to your question is that you need to write and customize your own solutions. There are alot of rootkits, but you are gonna have to write/customize one and you'll need C. I would suggest checking out the book Rootkits: Subverting the Windows Kernel. I really don't think anyone at binrev is gonna give you a rootkit.
  23. I would be happy to run some hashes against my newly acquired rainbow tables. I'm interested to see what kind of success rates I get because I certainly haven't had any luck with this hash.
  24. I've tried with two different Atheros chipset mini-pci cards and the RT73 usb NIC. None of them work. I will definitely try to capture the traffic.
  25. I have a hash that has withstood 39 days of john and counting, 4.5 gigs of wordlists, 90+ gigs or lm rainbowtables, plain-text.info's database, and offensive-security's database. What now!?