unregistered

Members
  • Content count

    23
  • Joined

  • Last visited

Community Reputation

0 Neutral

About unregistered

  • Rank
    SCRiPT KiDDie
  1. and still get it to process/work?
  2. ok it says here for vpn http://searchsecurity.techtarget.com/sDefi...213324,00.html# 1) so how would the routers know where to route the data if its encrypted? and how would i go about implementing that? 2) what's the difference between a proxy and bouncer? 3) btw, is ssh tunnelling an implementation of vpn? 4) another question i have would be that for ssh tunnelling, it works at the transport layer onwards so only applications which are designed to use the port would go through the tunnel and be encrypted right, other apps would not go through the tunnel. On the contrary, IPsec works on the network layer so all information above the network layer whether they use UDP or TCP or whatever ports for TCP would go through the tunnel and be encrypted. Are the above statements correct?
  3. if you're tunnelling web traffic don't forget to disable java,javascript too.
  4. dlink dwl-g650 dlink dwl-520 (i think) intel ipw3945
  5. it only works with 802.11b, imho, orinoco is old skool, the best wifi card currently (pcmcia, pci-e, whatever) by far would be in the ubiquiti brand range. The senao cards are not too bad too and i heard they can match up to ubiquiti src but both are way to ex and beyond my budget.
  6. windows can do injection? that's something new to me
  7. oh i forgot to say, linux software
  8. the only difference between this and airodump-ng is the virtual interface? but the key thing is will it be able to capture every packet that comes from the ap since when i monitored with airodump-ng, it only gave me incomplete fragmented packets?
  9. hi what softwares are available to sniff a particular wireless network, would simply using airodump-ng and air-decap to decrypt the packets work? the problem here is that i can only seem to capture only incomplete fragmented packets, what can i do to ensure that i capture full packets other than going on the network itself and do some arp spoofing? btw is there a wireless equivalent of wireshark?
  10. i also want that
  11. i know nothing but im just curious poking around
  12. so the only way to obfuscate my position somewhat is to create noise as in wifi transmission on the same channel, etc as my transmitting machine correct?
  13. what if my wifi nic is shouting with a directional antenna, would it make it any more difficult to pinpoint my location?
  14. how about not using DHCP at all.. if you guess the networks ip range which should be pretty simple just give yourself a static IP address. This way your computer will not apear in the dhcp list. well yes but it would appear in the rotuer's static ip page, the key here is to not make your node show up on any of the router's admin pages and perhaps not even on the ping sweep by getting your computer to drop the icmp packets or something like that. anyone knows how to do it? i'm not sure what the router static ip page is.. its probably an arp cache.. the way to clear it out could be to arp flood.. generate fake arp replies until the "page" is cleared. As for the ping sweep, you just need a firewall software that has stealth mode.. which basically ignores all icmp and other requests. the "static ip page" is the place in the router configuration where you have to put in your computer MAC and the ip you want otherwise you wouldn't have a static ip.
  15. Wimax really isnt going to have any thing to do with him connecting locally to a wireless router. The reason I mentioned WiMAX was because the extended propogation distance facilitates triangulation evasion because of the wider hypotenuse. ** temporary thread hijack ** Triangulation is a very poor method of discovering the source of emissions. Why limit yourself to three sample points? It works in theory because such calculations typically assume an empty environment, devoid of matter that could in any way obstruct the emissions. A much better way is to use many more sample points, and then use interpolation methods. That's how I did it for instance to discover the position of routers in a city environment, full of obstructive buildings. It's not hard to do, all you need is some GIS software to import that latitude/longitude/signal-strength data into. Getting that data is as easy as using Netstumbler + GPS. Using such a method, you could accurately be pinpointed. ** end hijack ** what's GIS software?; but anyway im more curious as to how to bypass this technique.