unsupported

Members
  • Content count

    143
  • Joined

  • Last visited

Community Reputation

0 Neutral

About unsupported

  • Rank
    mad 1337

Profile Information

  • Interests
    Information Security, cigars, schtuff
  • Location
    407

Contact Methods

  • Website URL
    http://
  • ICQ
    0
  • Yahoo
    unsupported

Recent Profile Visitors

961 profile views
  1. Start > Run > ipconfig /renew <enter>
  2. Try tracking them down through their ISP, http://samspade.org/.
  3. There are a lot of options available to you. Sounds like you may be looking for ethical hacking, white hat, or penetration testing (pen testing). Which is using a hacker methodolgy and tools to test the defenses of computer systems, with permission. http://en.wikipedia.org/wiki/Ethical_hacking There is also intrusion analyst, who studies Intrusion Detection Systems, and monitors networks for specific paterns in network traffic. http://en.wikipedia.org/wiki/Intrusion_detection If you like programming, then maybe a reverse engineer or malware analysis is better, http://en.wikipedia.org/wiki/Reverse_engineer Heck, you can even get into computer forensics, http://en.wikipedia.org/wiki/Computer_forensics If you want specific recommendations for websites, or additional reading, let us know! -un
  4. Wellenriter would discover a cloaked SSID. It is a passive sniffer that reads the packets to decode the SSID, rather than Netstumbler which sends beacon packets out looking for responses, aka "CAN YOU HEAR ME NOW? CAN YOU HEAR ME NOW? CAN YOU HEAR ME NOW?...". Hope this helps.
  5. Good work on the rest of the details in your post, but I just wanted to clarify the 14 character password. Having a password greater than 14 characters just forces the LANMAN hash not to be created. You will still have the NTLM hash, which is crackable.. with time because Windows does not salt the passwords line Linux/UNIX can. Also, someone could very well sniff the network, drop a bot, create a buffer overflow and escalate their privlidges. But running syskey on the machine will prevent an attack directly against the SAM database. Although, the other methods glossed over are still available. A lot of the password dump utilities do not even touch the SAM database, they hook into the running processes and DLLs to grab the info. -un
  6. Stenography in pictures is relatively easy to detect. Since it takes the color space and alters it slightly, the deviation will show up in the color table of the image. Stenography is also available in executibles without changing the size. To hide data you just need is a binary pattern, 1s and 0s. Looking in an executible there are a lot of ADDs and SUBTRACT functions. How do you alter these? You can make an ADD from a SUBTRACT and by subtracting two negatives, etc. Then you line up all the 1s and 0s to be your hidden data. Viola! In addition to stenography, you can also research hidding data using alternate data streams in Windows on NFTS. It is practical and easy to peform the trick. -un
  7. It passed the senate, but it was killed in the house. Carry on, there is nothing to see here. -un
  8. At first glance, Altiris Client Service is a remote desktop control software, and I love the fact that it appears that wireless is running. Like it was suggested if you want to know about a target, do research. Search for all the service names. See if anything is interesting, and non-default Windows. -Un
  9. How about good old dumpster diving? A wi-fi audit? -un
  10. I looked into that as well, but didn't have too much time to track down all the different "net tools" I found online. Bah, anyway, it is fake-o. -un
  11. How come nobody has made mention of the WIRELESS NETWORKING icon? Come on, a "sooper secrit 'puter" would not have wireless, let alone be available on a network connected to the intarwebz. Edit - Also, the local area connection appears to be disconnected. Lastly, anyone know what kind of firewall that is being used? The blue wall icon with the red balls bouncing off? Whatever it is, I'm sure it is not standard CIA issue. Edit - Also, from a quick check online there is no clearance A1, B3, etc. for people, A1 refers to the security level of a system, not of a person. Also, the wording of Clearance A1 does not sound kosher, I would believe they refer to clearances as 'A1 Clearance'. Edit - One last thing, although the work of the CIA is done at the direction of the President, why would they have the presidential shield on their wallpaper? -un
  12. IronGeek should watch his back, there is a new playa in town and his name is Timg455 OHOES NOES, HE KNOWS ABOUT BATCH FILES! EVERYONE FOR THEMSELVES! WOMEN AND CHILDREN FIRST! I couldn't bear to watch the other 12 videos he posted... -un
  13. If you are into digital forensics I would highly recommend the blog, A Day in the Life of an Information Security Investigator. It is a well written, often updated blog about an investigator who shares his own experience with digital forensics. It is a very good and informative read. -un
  14. Therapist: "Show me on the doll where Stankdawg pretended to touch you." -un
  15. Not so much suprised, just excited because I've been waiting for it to return. I still have one of my first copies of Phrack from back in the day, that printed out on a dot matrix, stuffed in a drawer. -un