• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About freeman

  • Rank
  • Birthday 03/13/1989

Profile Information

  • Interests
    Hacking, programming, and playing computer games.
  • Location
    The Matrix

Contact Methods

  • Website URL
  • ICQ
  1. Thanks, and w0w gcc is really complicated! Yeah, I'm going to stay away from libc calls now when learning assembly. I searched google, and now I'm going to read On that webpage is a hello world program in assembly: .data # section declaration msg: .ascii "Hello, world!\n" # our dear string len = . - msg # length of our dear string .text # section declaration # we must export the entry point to the ELF linker or .global _start # loader. They conventionally recognize _start as their # entry point. Use ld -e foo to override the default. _start: # write our string to stdout movl $len,%edx # third argument: message length movl $msg,%ecx # second argument: pointer to message to write movl $1,%ebx # first argument: file handle (stdout) movl $4,%eax # system call number (sys_write) int $0x80 # call kernel # and exit movl $0,%ebx # first argument: exit code movl $1,%eax # system call number (sys_exit) int $0x80 # call kernel Which works: freeman@4[asm]$ as -o hello.o hello.s freeman@4[asm]$ ld -s -o hello hello.o freeman@4[asm]$ ./hello Hello, world! freeman@4[asm]$
  2. Well, this isn't really hacking related, I'm just trying to compile some code. This is probably the best board because although I can program some c code, I am a complete nubie at getting this asm code to work.
  3. I don't know if this belongs in the newbie or the general code board. Here's what I'm trying to do: I have a simple hello world program in C called hello_world.c, which works when I compile it. When I use the -S flag, I get the assembly code. When I use as to compile that assembly code, it compiles without warnings, but when I try to run it, it says "cannot execute binary file". I have a feeling this might have to do with some linker or something, but I don't know what exactly. So how would I make the program from this assembly code work? Also, can someone explain why nasm shows all these error when I try to compile the assembly code: Thanks.
  4. Yeah, when I play a 3d game, like gta:sa or far cry, i have to prop it up a bit so that the fan has enough ventilation, or else it gets over heated and shuts down like that. Sometimes when that happens I just ditch windows and boot into linux and play something like gltron, and resume listening to whatever hacker radio show I was listening to. Maybe windows doesn't like you anymore, and shuting down randomly may be it's way of saying "switch to linux" . Or it may just be time to reinstall windows; I have to do it every few months. The easiest way to find out if it is spyware is to get SpyBot - Search & Destroy, and Adware, run them, and see what they turn up. To check for virii, I use VirusScan.
  5. "social engineernig" umm, getting a free pizza (which I heard wasn't actually free, it was staged), isn't exactly social engineering. I like "The Art of Deception" by Kevin Mitnick when it comes to social engineering. I don't know of any /good/ videos of social engineering. If you want to see some cool stuff, like p2p wireless hacking, wep cracking, light sabers, sky diving etc, is a cool show.
  6. Oh usually on most wireless routers there is a tiny reset button for when things like that happen. Then you'd just search the web for the factory defaults to get in.
  7. Yeah, wireless is the wave of the future! And I don't know about the linksys wireless routers, but my netgear wireless router also has 4 wired ethernet plugs, so since you probably don't have wireless cards for every computer you own, you can still connect the computers directly to it with ethernet cables like the wired router. Also, unless you live a mile away from civilization, it's a good idea to changed the default password on the router, and WEP or WPA protect it and have it not broadcast the ssid, unless you want to have it open for the neighbors to use. I just moved, and my new neighbors don't have a password on their USR wireless router, and I got in and I *could* totally pwn it, but didn't actually do any harm, just erased the logs of my MAC address being connected to it.
  8. I did a quick search on CPAN, there are many modules that appear when I search for "ARP": When I searched for RARP, it returned NetPacket-0.04:
  9. I just made a binary/decimal converter like 10 minutes ago. A couple minutes ago I posted it here: . As for reversing the bits, in perl it's easy to reverse a string. For complementing bits, you could loop through the characters in the string and if the char is 1, make it 0, else make it 1. Something like this would work: #!/usr/bin/perl print "Enter the binary number: "; chomp($binary=<STDIN>); while (1) { #menu: print "(1) complement the number (2) reverse the number (3) convert the number to decimal Choice:"; chomp($choice=<STDIN>); if ($choice == 1) #if the user wants to complement the number: { $result=""; @chars=split(//,$binary); foreach $char (@chars) #go through each character, and if it's 0, make it 1, or if it's 1, make it 0. { if ($char==0) {$char=1;} else {$char=0;} $result .= $char; } $binary=$result; print "$binary\n"; } if ($choice == 2) #if the user wants to reverse the number: { $binary=reverse($binary); print "$binary\n"; } if ($choice ==3) #if the user wants to convert the number to decimal: { $result=bin2dec($binary); print "$result\n"; } } sub bin2dec { return unpack("N", pack("B32", substr("0" x 32 . shift, -32))); } You enter, or paste, the binary number you want to use. You then can complement it, reverse it, and/or convert it to decimal.
  10. HAHahaha windows is a computer joke.
  11. I like it. Even though Stank was a good, experienced show host, I got tired of it being Stank and <cohost> every week, so I like the change. I hope you go into topics that you are more experienced in and Stank didn't talk much about, like Phone Phreaking. It would also be cool if you went into social engineering and physical security/lock picking, which Stank also never want into much. Even though BR and SC are more phone phreaks than computer hackers, It'd still be cool to have an episode about exploits. No need to get into to many techincal details (like assembly and shell code), just explain the underlying concepts, why / when they usually happen (copying user input into a buffer without checking lengths, etc). how they can be used to gain access. And what you can do to protect your own code from overflows. Also if that doesn't take up a whole show you could get into SQL exploits or rootkits something, how they work (without too many technical details), and how to protect against most of them. I hope we'll someday here from Stank again and it's not old yeller good-bye permanently, even if he doesn't become the show host again. In the meant time I look forward to listening to what BR and SC have to say.
  12. Lol. HOPE has downloadable speeches here: . From there you can stream the speeches or download the mp3s of them. You can also listen to defcon speeches, but those cost money as far as I know.
  13. Hahaha, just read the comments here. lol lol huh?
  14. LOL. From the link, project looking glass looks pretty cool. No other operating system has info on the back of the screen, so I wouldn't find it very intuitive. Doesn't sound better than kedit. Also, why would a normal person put actual sticky notes on the screen? I prefer having a folder for each band, and naming each song band_name - album_name - track_number - track_name. What would be cool though, is when you play one song, you can see what other songs are like that song, and suggest what might be good to listen to next. Sort of like the way recommend other products, but instead of products/whole albums, it's be songs. Though I guess if someone did that, they'd be infringing on amazon's patent. I like to listen to songs of completely different genre/tone/additude back to back anyway.
  15. On slashdot it looks like there won't be a shell/command prompt because people have already made virii for it: You couldn't do much from the command prompt in XP (no su, top, whois, cat, grep, awk, chown, chmod, etc. and things like md5sum have to be downloaded.) and now there won't be a command prompt in Vista? Or will they just throw in old XP command prompt? Makes me wonder how many more virii will be developed before Vista even becomes mainstream and preinstalled on new computers. I also pheer all the new junk that will most likely come preinstalled, preconfigured, and ready to be exploited. LPUA will only be good if it's done right, like linux. If you need root priv. to run something, it asks for the root pass, instead of denying access completely. Also a command like su is also a must, if there ends up being any command prompt.