• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About 0mega24

  • Rank
    DDP Fan club member

Profile Information

  • Location
    Where it's way to goddamn cold.
  1. I have tried all three of these on my EEE 1000HA and I would recomend EEEbuntu standard. Personally I can't stand the netbook remix interface, rather I just have the regular desktop with a top panel that I can minimize for screen estate. EasyPeasy turned out to be not easy at all. It had a very wierd configuration which made tweaking what I wanted a pain in the arse. EEEbuntu standard however gives you what you need to start out and nothing else. Wifi and the CPU throteling worked right out of the box and Ive been using it for the last few months with no problems (except for the ones I caused myself by messing around with the internals ). Consider getting gnome do or hotkeying a terminal. I personally can't stand touchpads so I opt to use them as little as possible. (I don't remember if the EEEbuntu standard comes with the remix interface or not. But you can get rid of it by going into your sessions dialogue and setting the remix application and maximus to not run on startup. I do not think it does tho. )
  2. Awesome! I'm glad you figured it out! Don't feel bad about not getting the P-1 Algorithm, I sat through 2 class periods on it and I still don't fully get it, factorization algorithms are sweet, but confusing as hell!
  3. Here is a general guide to the algorithms and mathematics you will need to crack this. Please pardon the crappy way I indented my pseudocode. I am trying to learn Latex and for some reason something as simple as indenting code gives me no end of hell. I also tacked on an interesting bit on the Diffie-Helmen key exchange, just because I think it's nifty. RSACrack.pdf
  4. Sweet! I did not know about the GMP library, thats pretty nifty, thanks for pointing me to it.
  5. Good. Ill hold of on the how-to then, good luck!
  6. Well I'm leaving tomorrow morning for a few days to go rock climbing, so if anyone's interested in trying this out, I'll give you guys a hint. RSA's strength relies on the extreme difficulty of factoring large numbers, if you can somehow get the two prime factors P and Q from n then the rest falls into place. Normally this would be very computationally expensive (as of yet noone has developed a factoring algorithm that works in polynomial time) however some numbers are vulnerable to certain factoring algorithms. If noone has figured it out when I get back I'll post a walk through of how to go about finding the decryption value D, and incidentally decrypting the cyphertext.
  7. This looks a little misleading d actually is the inverse of e modulo f(n) which in notation looks like d = e^(-1) mod f(n)
  8. Yes, RSA when properly implemented is pretty damn secure, however since I'm asking a bunch of "hobbyist hackers" to try and break it, it is reasonable to assume that this case is not properly implemented. I assure you that it is possible to discover the decryption key with the information I've given you, just do some reading on how the decryption key relates to the public key. Just keep an open mind and go for it. If you guys can't figure it out in a couple of days I'll post a how-to.
  9. For those of you who don't know, RSA is a public key encryption algorithm, known for its strength. What I have attached is a message I have encrypted in RSA along with it's public key (e,n). My challenge to you guys is to break the encryption. The rules are simple, 1. You may use anything you write yourself (an exception to this is a BigInteger library, which you will need ) 2. Posting hints and generalized help is ok, however any exact solutions are not ok, I want people to try and figure it out for themselves. FYI This is entirely possible, I'll leave it up to you guys to figure out how, Some hints, - Read up on how the RSA algorithm works - What information do you need to decrypt it, how does it relate to the information you have - These are very big numbers, I would suggest finding a good BigInteger class to work with them, I used one for C# that I got in my CS class, I can post it if you guys want. - The decrypted plaintext maps into a message by taking 2 digits and mapping them to characters like so 'A'-'Z' - 00-25 'a'-'z' - 26-51 '0'-'9' - 52-61 SPACE - 62 Have fun guys! RSAChallenge.txt
  10. Hi Guys! Recently I've been working through "Hacking the Art of Exploitation 2nd Ed.", an awesome book I would recommend it to anyone interested in learning the nuts and bolts of hacking. I've been working on learning stack based buffer overflows, which for those who are not familiar is when you find a buffer which does not check its bounds and write to it data much larger than itself, the goal being to overwrite either a function pointer or the EIP register with an address to some shellcode stored in the environment variable. I still have a lot of work and practice to do, but when trying it in my Ubuntu installation on my eee I learned a couple sad things. First gcc now by default implements stack protection in all of its compiled programs, it does this by inserting a "canary" value into the stack and if it gets overwritten the program complains and terminates. If there was some way to figure out what this value was in advance and its location I could just overwrite it with its own value and everything would be hunky-dory. But even after researching it, I still have no idea on how to do that. Also I guess the new Linux kernels randomize the address space upon executing the program, which I admit is a goddamn clever idea, but it obviously presents some difficulties if you want to overflow that particular program. I also have no idea how to circumvent this, I suspect its much easier on 32 bit systems than 64 but even then, still have no clue what to do with that. So guys any suggestions on reading for these subjects?
  11. It depends on what I'm doing... If I'm idly playing around its Catch22, Streetlight Manifesto, Billy Joel and the Dropkick Murphys. If I really need to concentrate then Its the Om Lounge by Thievery Corporation. Zandi- If your interested in Ska, might I suggest Streetlight Manifesto, Catch22, Mad Caddies, Save Ferris, Less Than Jake or Reel Big Fish. Streetlight Manifesto's Every Thing Goes Numb album is fantastic as well as Catch22's Keasby Nights. The song Leavin by Mad Caddies is my new favorite.
  12. To the extent of my knowlege there is no way to just view the code that was used to compile it. You can however use a debugger to trace the assembly calls the program makes to figure out what the program does at any given point. Good ones ive heard of are SoftICE or OllyDbg.
  13. I'm curious about how you plan on having executable code behave like an image file? The only way I can think of to do this is find a weakness in a program that displays the image from the file, exploit it so that it runs the arbitrary code hidden within the image file, all the while keeping said arbitrary code hidden within the image. This will require you to have extensive knowlege of image file formats, stenographic techniques, and most likely assembly language to start. Also given your target, Windows, you would need to take a collection of the most popular image viewing software, and reverse engineer them to find out HOW to format your image file to exploit a found weakness. This needless to say will be very very hard. Its not something you can find in a tutorial, or have someone answer for you on a forum, it will take a great deal of creativity, insight, and most importantly EXTENSIVE background knowlege. Also know that if you find a weakness in one particular program, it most likely will not work in the others. To be perfectly honest with you, from the wording of your posts my guess would be you don't have nearly enough experience or knowlege to approach this project. Start smaller, read a book about computer archetecture. A good one I've read is Computer Organization and Design. This will teach you how computers are organized and how processors work, using the MIPS processor as a basis. Note that this is different than a x86 processor that common PC's use. Once you've read that and understand it, code a MIPS simulator in Java. Have it have several objects representing the different components of the processor (ALU, MUX, etc) and have them transfer information like the actual processor. In addition have it take some mips commands in a text file as input and output the result. Once you have done that in Java, take it a step further and do it in C++. Now to become a "hacker" you don't specifically have to do that exact problem. But you do have to do some serious studing and many, many, many problems with that level of difficulty and hopefully eventually harder. The fun part is finding problems that interest you personally and working out creative ways to solve them. This is so much more satisfying than the cheap thrill of infecting peoples machines and getting their info, and it affords more personal growth as well. So to sum it all up, study more, start small, practice, study even more, play, and have fun. ->Colonel Panic: Thats pretty awesome! Were you able to figure out a way into the IRC channel? Whoo now that was a long one... Sorry about the spelling guys, despite my best efforts I am useless without spellcheck.
  14. Well what I would like to do is to get into the operating system of the phone and see what I can do, Stuff as simple as modding the menu's to maybe figuring out what processor its running on, writing my own apps for it and installing them. I've read the owners manual back to front but it;s just a basic howto guide to the software already on it. Where would I look to find the technical specs and details on how to really get in the guts of the phone?
  15. I have a Samsung Juke through Verizon. I can hook it up to my computer to transfer mp3 files to it. What would I need to lookup / learn to mod it?