phr34kc0der

Members
  • Content count

    487
  • Joined

  • Last visited

  • Days Won

    10

Everything posted by phr34kc0der

  1. Good luck with that...
  2. If you have physical access then resetting the password is trivial however I have to agree with the guys above me. Request the password. I dont understand why they wont give it to you if you pay them. If that is the case I would change who manage my server. Saying that it could be the case they know best. You could make a change that screws everything up.
  3. Because its obviously a story he made up so he can ask for help without getting flamed.
  4. I guess the choice would be up to you although I think c# would be more beneficial. I'm only slightly aware of how .net works but I think they would use the same framework. I still think it would be best to attack directly. You would probably be able to do more attacks per second by using simultaneous connections as opposed to the one by following the mouse (although I do think it sounds like a cool project).
  5. I have no idea how to do that but I cant imagine it being too difficult. The easiest way would probably be to go with .net and look at the win32 api (my guess would be something in user32.dll but I dont do Windows so I wouldnt know). I think the easiest way would be to do things at a bit of a lower level. Interface with the application directly and not through Windows. What are you trying to brute force?
  6. Hey, had any more luck with that c++ string replace program?

  7. +10 points for now only knowing who Wordburglar is but for actually knowing him. That is awesome.
  8. Very true, especially a lot the the smaller/less well known apps, but hey, it's open source. Its always possible to make a new GUI. I hope that as more people move to open source more designers will be prepared to put in a little time to make things look pretty. Despite what I tell myself it is important. Things that look finished feel like they work better. It's already happening with Gnome/KDE et al but certain applications (OOo comes to mind) need a little tweaking. I guess the problem is that as multiple WM exist it's hard to have a unified look.
  9. Really? I think the newest version looks very polished as did most of the previous versions. I keep hearing good things about mint Linux but if its the Desktop Environments you dont like then just find the Linux distro most suited to you and install new Desktop Environments until you find what you want. The Enlightenment window manager has always looked quite nice, and when I tried E17 it seemed to be quite full featured (although I used it a while ago im sure it's improved by now) but I think, like with Windows, it'll take it a little tweaking to get any Desktop Environment to work well. Some just do better than others out of the box than other (looking at you BlackBox). What didnt you like about the look?
  10. I'm not sure how much RAM bt4 uses when booting but live CDs use a "RAM disk" for temporary storage, obviously limited by the amount of RAM you have. I'm not sure what your doing to use it though. How much storage do you have before you start (i assume) airodump? Are you using the -w flag to write the captured packets to disk? I seem to recall using this guide for my BT4 flash drive. There is also the option of installing BT or another Linux disto on your machine and running aircrack-ng like that or, if you have a USB wifi adapter, installing in a virtual machine where you will not be limited by a small ram drive. If it is because of the -w option in airodump you can put the files it generates on an external drive by specifying the path e.g. airodump mon0 -c 5 -w /path/to/usb/capture. Maybe not loading Xorg (dont use startx) will also help with ram usage, but im not too sure about that.
  11. Thanks for contributing such useful insight to this conversation... He does have a point
  12. As long as they are on the same network as you lots of fun can be had With ettercap you can view data but also modify it. http://www.irongeek.com/i.php?page=security/ettercapfilter Irongeek wrote a nice tutorial on it a while ago. What are you looking to do?
  13. I dont think you'll find anyone here who will offer you a Windows 7 code but I can give you your options. Find a key/crack elsewhere but keep in mind you'll be using an illegal OS. Reinstall a previous version of Windows, assuming you still have a licence and install disks from your previous install. Buy Windows 7 If you're comfortable with computers you could install Linux (I would suggest Ubuntu). It's a free Operating System (I use it myself) and will work until you decide whether you want to keep using it or try and get hold of a Windows licence. If you dont mind formatting your computer then Ubuntu is pretty easy to install else you could create a partition and install in that.
  14. Do you mean COCOT (customer-owned coin-operated telephones)? Basically its a payphone (correct me if i'm wrong) owned by private companies. For example if I found a payphone not by BT in the UK it would be a cocot. Not sure about America but if you've seen a non standard pay phone it would most likely be a colcot. I cant help too much, my phreaking skills suck. Just know what i've managed to pick up from the early episodes of off the hook
  15. From what I understand tor is incredibly anonymous. The only thing to be aware of is that eventually your data is gonna pass though an "exit node" where the data will be unencrypted. It has to else the web server wouldnt understand your request. Someone who owns an exit node could easily set up a sniffer to capture all the data sent through. As all data is anonymous (they could see what you do, not who you are) it isnt too much of a problem unless you do things like send email, google your name and other things that leaks your identity. Also an exit node operator could run SSLStrip to strip all your ssl data so unless your sure (check for https) dont do things like Internet shopping and the like over tor.
  16. Look into backtrack http://www.backtrack-linux.org/. It's a security orientated Linux distro containing all the tools you'll ever need (well, nearly). Depending on what you hoped to achieve the basic idea would be port scan -> exploit nmap is an excellent port scanner and Nessus (not on backtrack, have to be installed separately) is a pretty good vulnerability scanner. If you come up with a list of vulnerabilities you can then use either metasploit (prefered way) or look for code online to exploit the vulnerabilities. Of course, depending on what you wanted to do there are other ways to go about it. Ettercap is always fun.
  17. If the packet is from another network then things get difficult.
  18. Sniff packets from where? If its from your own machine then wireshark is the tool you want. Just start it up and watch the packets fly. If you want the packets from other machines on the network you may need to do something to trick the packets to come to your computer first. It's pretty easy to do arp poisoning with Ettercap.
  19. Are you getting any POST beeps on startup? If not then i've had that problem a few times. Have you tried jiggling things? Seems to work for me. As PurpleJesus suggested plug in into the network and see if it picks up an IP address (check the router logs, do a ping sweep of the network or just check for blinking lights).
  20. i am thinking something like autorun for the drive is turned on... so the ISO file is being run as soon as the drive is connected, and since the file is incomplete it is crashing everything.. if there is a way for you to turn off autorun for this drive before connecting it i would try that .. From what I remember holding down the shift key will temporarily disable autorun when a disk is loaded but as I understand it autorun only works on optical disks unless its emulated.
  21. First welcome to binrev Second, are you sure it's a software issue. I cant imagine a repair shop charging $200 to reinstall Windows (maybe if you had to buy a new licence). I think most of the common ideas have been mentioned but i'll just add that I only use two desktops. One fileserver and the other is my main computer. All my other machines (can spot 4 desktops and 2 HP servers from where i'm sitting but there are more around the flat) have been superseded by virtual machines, except for those projects which require actual hardware. Even then I prefer laptops as they are quieter and use less power. Let use know what you decide to do with it
  22. Have you tried formatting it? Possibly via Linux?
  23. Man, your rep is crazy high

  24. Dont really use web proxies so I cant really recommend any but i'm sure if you look around you'll find some. Failing that you could try some free vpn services (i've had luck with ultravpn but if you look around you'll find more). Tor could also be an option but I have to warn you that tor is incredibly slow.