Fiend

Members
  • Content count

    103
  • Joined

  • Last visited

Community Reputation

0 Neutral

About Fiend

  • Rank
    elite
  • Birthday 02/14/1988

Contact Methods

  • AIM
    FiendKIP
  • Website URL
    http://www.fiendzlair.net
  • ICQ
    0

Profile Information

  • Interests
    Increasing my knowledge on technology. I enjoy playing Paint Ball, and 'HackySack' with friends. I also enjoy Poll Vaulting (track and field) for my highschool.
  1. Okay, nevermind... going back to slackware. I installed slackware and verified the Checksums are correct on both CD's I installed with. Then I configured my ethernet card using 'netconfig'. After I configured it with netconfig I verified that the information was correct using ifconfig -a eth0 Link encap:Ethernet HWaddr 00:50:FC:81:7F:0B inet addr:192.168.0.3 Bcast:192.168.0.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) Interrupt:5 Base address:0xd000 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:2 errors:0 dropped:0 overruns:0 frame:0 TX packets:2 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:168 (168.0 b) TX bytes:168 (168.0 b) I also set my name server to the one I always use (205.171.3.65). Then I try to ping google.com (doesn't work) I try pinging google's IP address (doesn't work) I try pinging my router (doesn't work). Then I try to use dhcpcd and it still doesn't work. Some people are telling me it's the Kernel. So how do I fix the problem then? How do I get a different kernel. I remember when I was installing Linux I could pick what kernel I wanted to install... but how do I know what one I am suppose to install?
  2. They said I was charged with using someones internet connection without permission. (stealing) I did not connect to anyones internet connection manually... windows connected to the first unsecured wireless access point without prompting me... (I knew I should have stayed in Linux.... I booted up windows after scanning with Kismet). ... They told me they are going to have a Fed scan my computer and dig around in my harddrive... ... what if I have software I don't legally own (not saying I do) but what if... (I might, I might not)... but would I be prosecuted and sent to jail if they find any software I don't legally own?
  3. About 1 hour ago... I was out Wardriving. I was scanning for Wireless Access Points on Linux using Kimset. I picked up several access points on my laptop some encrypted, others not. I didn't do anything else, just scanning for WiFi. Then, I boot up Windows (big mistake) and of course Windows automatically connects to the first Unencrypted WiFi it sees without consulting the user. I loaded up FireFox and the home page was set to Google.com so you could say I illegally used someones Internet Connection. Soon, a police car pulls up with their blinding lights and asks me what I was doing. I told them I was scanning for WiFi. And of course the police had no clue what the fuck that was. I did my best to explain what I did... and I did mention that the only illegal thing I have done was connected to google.com using their ISP, and that Windows connected to that automatically. He was arguing and saying your computer won't connect to it automatically blah blah blah, little does he know... I was also wearing a shirt that says "Hacker." from J!NX. And, the cop said, Well it's just like your shirt. And I replied, "Let me guess, you have the common misconception that hackers are bad people?" And he said, "Of course they are, you people break into peoples shit." !! Also, when they put me in the back of their squad car they asked me if they could look at my Laptop and I said, "yes" so they did... and they also looked in my bookbag (my laptop wasn't in my bookbag). So they searched by bookbag illegally. And now they won't give me back my laptop, I will probably get it back in about a month and I am leaving for college in about 7 days! This is so unfair, I didn't do anything unethically! Anyone want to help me out here, what should I do... I want my laptop back before I go to college... It's essential! They also took my bookbag which had 2 books, 2 2600 Magazines and some other stuff, a Deck of Cards, a Notepad and Pen... some stuff that's not even relevant to my laptop. Can they legally take my laptop away like this, and my bookbag? And also (to mention again) they illegaly searched my bookbag! !!! I AM SO OUTRAGED !!!
  4. I have gathered over 50,000 IV's on my Wireless AP (64-bit encryption) with airodump and then used aircrack on the captured file. When I use aircrack, it just says Not enough IV's. I read many articles on Aircrack and I don't understand why it's not even displaying anything. Perhaps someone knows how to fix my problem. Thank you. [edit] Err... I just figured it out... I mistyped the MAC address when I was filtering out the packets... It was a B not an 8... stupid me. [/edit]
  5. I have multiple AVI files that I would like to burn to a DVD and setup a Title Menu. I have been using DVDShrink to make backup copies of my DVD's but I guess it can't burn DVD's from AVI files. I have heard of some programs that can do this such as Adobe Encore, and Nero. I would like a recommendation before I purchase or start downloading software. Perferabley I would like the Software to be Freeware but if not that's fine too I guess. I have searched the forums before I posted this question, but it didn't help me too much.
  6. I too was a victim of the g00ns... they defaced my website once. I talked to zer0 (leader of the skiddie horde) on AIM, they like to recruit newbies and train them into powerful skiddies that use these hacking programs without much knowledge like whores...
  7. It's an exploit for the Stealthbot created by Stealth which is a bot for the Battle.net gaming server, which happens to be the largest gaming network in the world. Anyway... I reported the bug to Stealth and he made me a betta tester, and added me to the development team. So far I found 11 bugs, 2 are run-time errors (ugly ones). It's pretty fun to be a beta tester... but wow... stealth is a shitty programmer.
  8. Actually it's not old news... you don't even know what service this is for because I didn't tell you... but yes, there where other exploits like this, but not for this program. It's a 'bot' that connects to a gaming server that allows you to read files if you have enough access to that command. And by default the client's directory is C:\Program Files\*********\ So... .readfile /../../ would get you root and you can read any files from there. I'm not telling you what program this is, or what gaming server it's for... but I bet a lot of you can guess, because it's the largest gameing server, and the most commonly used bot (basically the only bot made for that gaming server). That's all I'm going to say. Don't let word spread to quickly if you figure out what program I'm talking about.
  9. I'm not telling the details or what the exploit is for... I have to be really vague on what it's for because I don't want it realeased to the public because it will be patched. However, with a command I can read a file but it will only let you read the file in the current directory. If I type in /../somefile.txt as the paramers I can read a file out of the directory. Now there is this file called config.ini that is in the current directory... so you could read it by just having the parameter be config.ini, however... the program blocks the phrase "config" and won't let you read it... even if you do this /../../WINDOWS/System32/Config/somefile.txt it has the word config so it will return an error. Now is there a way to substiture characters with a code so I could read a config. Also... are there any good files on a Windows machine that could get me some passwords?
  10. That has never happend to me before... Maybe it's a problem on the hardware end. Take a look at your CD-Rom drive and set it to DataLink with a jumper if it's not already. Otherwise, I don't know what to tell you.
  11. For those of you who don't know what Stealthbot is, it's a client that connects to B.net's gaming server. Stealthbot was made in Visual Basic and uses the Winsock API controll. I installed WINE and WineTools. I then downloaded and installed the VB6 Runtime files. I can run the Stealthbot setup (installation exe) but can't run the program. [root@ben StealthBot]# wine StealthBot* fixme:ole:CoRegisterMessageFilter stub fixme:ole:OleLoadPictureEx (0x45c12c5c,7366,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=0,y=0,f=0,0x406afaf0), partially implemented. fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=37,y=23,f=0,0x403ac3b0), partially implemented. fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=37,y=23,f=0,0x403acd18), partially implemented. fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=37,y=23,f=0,0x403acd90), partially implemented. fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=37,y=23,f=0,0x403ace08), partially implemented. fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=37,y=23,f=0,0x403ace80), partially implemented. fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=37,y=23,f=0,0x403acef8), partially implemented. fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=37,y=23,f=0,0x403acf70), partially implemented. fixme:richedit:RichEditANSIWndProc EM_GETOLEINTERFACE 0x403b9f70: stub fixme:richedit:RichEditANSIWndProc EM_EXLIMITTEXT: stub fixme:richedit:RichEditANSIWndProc EM_SETTARGETDEVICE: stub fixme:richedit:RichEditANSIWndProc WM_SETFONT: stub fixme:richedit:RichEditANSIWndProc WM_STYLECHANGING: stub fixme:richedit:RichEditANSIWndProc WM_STYLECHANGED: stub fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=28,y=18,f=0,0x403c43d8), partially implemented. ... followed by a lot more of: fixme:ole:OleLoadPictureEx (0x45c12c5c,0,0,{7bf80980-bf32-101a-8bbb-00aa00300cab},x=28,y=18,f=0,0x403c43d8), partially implemented. ... and then near the bottom ... fixme:richedit:RichEditANSIWndProc EM_GETOLEINTERFACE 0x4042f280: stub fixme:richedit:RichEditANSIWndProc EM_EXLIMITTEXT: stub fixme:richedit:RichEditANSIWndProc EM_SETTARGETDEVICE: stub fixme:richedit:RichEditANSIWndProc WM_SETFONT: stub fixme:richedit:RichEditANSIWndProc WM_STYLECHANGING: stub fixme:richedit:RichEditANSIWndProc WM_STYLECHANGED: stub fixme:ole:OLEPictureImpl_SaveAsFile (0x40392030)->(0x40432358, 0, (nil)), hacked stub. wine: Unhandled page fault on write access to 0x00000000 at address 0x40391a34 (thread 000e), starting debugger... Usage: winedbg [--command cmd|--file file|--auto] [--gdb [--no-start] [--with-xterm]] cmdline Please help.
  12. I'm on Mandrake Linux and I can't hear any sound on one of IronGeeks Flash Video tutorials. I checked to see if there was sound by launching Windows XP and viewing the flash video file, and yes there is sound. I couldn't hear sound at first on XP, until I updated my drivers for my sound card and then it worked. However, I don't know how to update my sound card driver on Linux. I tried google searching and I'm finding nothing.
  13. Yes, that is exactly what I mean... I was just confused when I consantly hear people talking about "hacking" with Nessus. I was starting to wonder if Nessus had a remote host vulnerability scanner feature. Thank you.
  14. This has been confusing me for a while now... I hear all this talk about people hacking with Nessus, but the Nessus Daemon does the scanning, it's not a remove vulnerability scanner. Sure you could hack with Nessus if the target host has NessusD running on his/her computer... but other than that it's just a good security tool to keep your server secure.