stacksmasher

Members
  • Content count

    213
  • Joined

  • Last visited

Community Reputation

0 Neutral

About stacksmasher

  • Rank
    Mack Daddy 31337

Profile Information

  • Interests
    I have the life every kid with a computer dreams of. I hack for a large corporation for a living. They fly me all over the world to meet other hackers on our own private jet. I have a hot blond girlfriend who sucks my dick all night long. Then I wake up and can’t wait to get to work so I can do exploit research all day and listen to www.phreakphactor.net. You can also have the life you dream of, but first you have to do what you love and everything else will fall into place.

Contact Methods

  • Website URL
    http://lsd-pl.net/
  • ICQ
    0
  1. How are we going to be notified? I have been waiting for this to come back for 4 years and I don't want to miss it!!!! Hell I even offered to put up some cash for the hassle....
  2. Dude the article7.org site is haxored with a scripting worm. you have a link in your sig to it. Please remove this link until the site is cleaned up.

  3. I'm not sure who would take care of this but a member has a .gif that is a virus in there sig line. Thanks
  4. myrice.com was my first site.... I also used to scan for open Sub7 servers and tell people their system was infected when I was a kid. Lots of fun and very helpful.
  5. The best way to get as many ivs as possible is to "feed" the access point with a bunch of traffic. Remember hearing about people who can crack WEP in 2mins? They are using fake traffic and requests to make the access point spew ivs. I use 2 laptops for wireless pen testing, one has "several" USB 802.11 adapters. Cracking WEP is sooooo 1999! All the cool kids have moved on to 802.11X
  6. 248

    MotorcityHacker here.
  7. This is horribly simple. You record or otherwise capture keyboard sounds, and feed them into a computer. That’s what the researchers did, taking snippets of ten minutes of audio of people typing away, and feeding the audio into a computer program which detected the slight differences between each keystroke. Once you know the language in which the typist is typing, the differences in key stroke become predictable. Couple that with knowing what the most common letters and combinations of letters in a given language are, and it’s pretty easy for a computer to turn those audible key clicks into the actual letters. We can do it with 97% accuracy.
  8. I don't want to go near stuff like this, these types of things are run by people who are observing the actions of the players and using them to commit fraud. I used to think the NSA and FBI & CIA would use stuff like WarGames to recruit fresh meat but these days they cant pay people enough to work for them. Time to stop spending billions on stealth bombers that rot away in the desert and start paying people to protect our infrastructure.
  9. I will also be landing about 8:00pm tonight.
  10. Yes, This is correct and some of the stuff that comes out of those endpoints is nasty...... to say the least....
  11. yep, a skybox would be great as they are usually under utilized. I like to hang out above the capture the flag room so I can watch videos and listen to the jams. We need to figure out a way for all of us to communicate when we get there. Maybe a "Special Binrev Hamachi network?"
  12. Hushmail is dirty, they work with all 3 letter agencies. Stay away.
  13. I would not use any new share environment not hosted in Holland. http://en.utrace.de/?query=www.talkgeek.org This one is in Vegas.
  14. Don't waste your time. These days if you get infected its better to format and re-install as even if you install software most nasty stuff today will kill the process before it can disinfect. Or you can scan the drive on a known clean host. Just be careful not to infect the host by using the drive for anything other than the scan.
  15. PM for a free evaluation. I am always willing to look at someones work to see what I can break. I am trustworthy and wont root you without permission.