hacktactic@gmail.com

Members
  • Content count

    101
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by hacktactic@gmail.com

  1. Decided to take the plunge from Ubuntu to OpenSolaris, just to see how it is. I'll be letting you guys know in a couple days. Wish me luck.
  2. There's still more people in the CryptIRC channel. EVERYONE BE A GOOD SPORT AND GTFO OF CRYPTIRC! lol :]
  3. Haha, and apparently he's got the hotz for you. lol, just kidding. I can't believe that topic you started is pretty much dead man. Guess we're the only ones that are Binrev fans lol

  4. Haha, and apparently he's got the hotz for you. lol, just kidding. I can't believe that topic you started is pretty much dead man. Guess we're the only ones that are Binrev fans lol

  5. Hah, dude, trust me, I know dinscurge is an idiot, we burned his ass last time for it

  6. In the topic about outside interests? No, I was referring to the avatar of the post above mine.

  7. Hye R4p1d, haven't talked to you in a while, you're never on irc! lol

  8. Yeah, there's a lot of variation, really depends on who's running the damn thing hah :] LA2600 is pretty mellow, just sit around at Philipes and eat some good food, the listen to the talk and mess around. Pretty cool, missed the last one though :/
  9. Oh man, that seriously sucks :cry: milw0rm was one of the best places to look for exploits, like a search engine for vulnerabilities. It will be missed.
  10. Dammit, I want one of these :/ Kinda too expensive for me right now though.
  11. Good to be back guys, had to go to rehab. Anyway, I dont know about the survival of phrack, but this issue has some pretty good articles and they usually do come out with some good stuff.
  12. Is this happening to anyone as well? I pinged it and 100% packet loss.
  13. Ok, well I'm sure most of you know how insecure wireless networks can be. Most WEP encrypted networks can be cracked in under 10 minutes. There are tools publicly available to do this all over the net. But most people don't know just how bad it can be. Once someone is on the local network, they are inside the firewall. This is where the badness starts. This goes two ways: To home users, and to business users. Most people these days (whether they know or not) have wireless access points. They come with most routers. Home users tend to be a bit more ignorant about their security, that its just from not having the knowledge of what could happen to their network. On the other hand, most businesses know about those insecurities. (Don't get me wrong. Some big companies I know of still have their internal network connected to the wireless one, using WEP.) The threat for business users is more imminent. I will give an example on the insecurity of a home user's network. Lets breeze right on past the whole WEP cracking part of this attack, considering that's a basic step. So, most people think: "If someone is on my network, they can get right onto my computer and see all my files and pictures." While this can happen, as we will be seeing soon, its not the norm. Some that are a bit more tech savvy, and I mean just a bit, know it doesn't really work like that. If a port is open, their is some form of authentication. Usually. So they don't worry too much about securing themselves any better. The problem lies in the router itself. This only applies in certain routers, and in commercial ones, those like the ones that are offered by AT&T and the like, that act as a firewall, as well as a router. I specifically did this to my router, a 2wire 2701-HG. So, with these routers (and I'm sure many others as well), anyone on the local network can get to the router configuration by entering 192.168.1.254 in their browser. Since the router also acts as a firewall, the configuration for the firewall is there too. If you wanted to configure something, it would ask for a password. Now, here is the biggest insecurity in these things, at least the one I tested. In this kind of router, the default WEP key is the serial number, which can't be found without physical access to the router itself. So, taking into account that we cracked the WEP key, we also have the S/N. The S/N is ALL that is needed to reset the router's password to access configuration. Some routers even have default passwords to the config. The real danger obviously starts from here. An attacker basically controls the network's protection system, and can open up all ports on a computer, like the most common for home users: msrcp, netbios, miscrosoft-ssn, and it goes on from there. For the business sector, I can't really say too much, as I have not tested this on an actual business network Yet... So, if anyone has any comments, questions, or concerns, please speak up.
  14. Just thought I'd say sup, just since I haven't seen you around here lately :)

  15. I suppose this was just to share some info with those who might have not know. I just used "my" AP as an example. I'm sure many of you already know about this. Maybe I shoulda put this in the Newb section. Oh well, I was just bored, and I'm writing a paper on wireless client side attacks. Anyway, I was bored too. I don't know, just thinking I would share
  16. ^^ Same here mate. Need any help, you can ask here too.
  17. In my opinion. their is really no gray area. I'm sure anybody who has ever been infected and ha had to go through some massive data recovery or data loss can agree with me. These "coders" spend their time finding out how to get into your computer, and hijack it to do their dirty work. That's kinda of like if someone was stealing your power from you're house to power theirs. Those who do code viruses, although generally very smart, have fuc*ed the game up. Who wants a damn virus? This is one of those things that serves no purpose but to fuck people's things up. Excuse my language everyone, but I remember when I used to use Windows, it was horrible. Does anyone seriously disagree?
  18. Well, as for his actual question about Cisco, I know just a bit. I know that Cisco IOS has had some major security problems in the past. I recently stumbled across a subnet that was full of Cisco IOS boxes. Sure enough, the subnet was owned by a communications company. Some of the IOS boxes even have telnet open. That's about all I really know for now, but I do agree that they are pretty interesting.
  19. As a rule of thumb, anything that looks like that, and thats being given on a "hacking" forum probably doesn't work that well, or doesn't do anything at all. I could be wrong. In some cases, they might work, but they usually don't. That looks like its directed towards the noobs, which makes it a bit more suspicious. Did you read everyone's posts on that page? Also, please, just for clarity and as a courtesy, please try to spell a bit better. I'm sure thats not how you write in real life. Grammar helps here too.
  20. You ph33ring buddy?
  21. Ok, great! I'll be ordering on in the next week
  22. Yeah, I'm still not sure if I can make it, it blows. You mean it blows that you're not sure? Or you mean the con?
  23. YESSS!!! That was what I was going to suggest, but sometimes I think I sound like a Linux Evangelist, and any kind of Evangelist is annoying. But, since the ice is broken, for lack of better analogy, I will go ahead and say it too: LINUX! I currently have a LAMP server and an FTP/apache/Linux/IMAP/DNS server in my bedroom, both using (duh) Linux.