chaostic

Members
  • Content count

    724
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by chaostic

  1. Awesome. BR should implement that. Also, htf does shit like that get discovered? Did the hacker announce or blog about it? Or do some people go around and randomly type in the Konomi Code on every page the go to? Lol.
  2. Isn't Backtrack 4 Unbuntu-based now? Use that. Or ask around on forums.eeeuser.com And check out the hardware mod forum. It's electronic pron. Hmm barebone usb hub internal mods...
  3. Locked to which company? T-Mobile? Cingular/ATT? And about those cables you have, are they usb cables with a small bulky box midway between the connectors?
  4. Because they won't cut the power and you'll have plenty of time to grab the drives, disconnect them, throw them in this thing and power it up to let it do its thing. Also, when the cops, most likely filming, come in and see you actively destroying evidence, will pee themselves in glee in how easy it just become to convict you.
  5. First try sending a note to one of their media relations contacts http://www.lexmark.com/lexmark/sequentiale...76_0_en,00.html Then if they don't positively respond, ask them for the name and address of their legal process server in your state. That will be the most direct route that you can reach Lexmark's Legal department. As for the drivers, they could have a binary driver that Marvell provides under nda, so even if you do get the source, it would not be included. (Same thing happened with the zipit wireless communicators. Linux core, binary wifi driver)
  6. Good try, but I fear that it won't get you any where.... unfortunately. Regaring the hardware, the Marvelll 88W8638 (i believe) is an ARM SOC, probably the Liberates series but their partnumbers are so screwed up.... On the wireless module the FCC ID is not readable, you can find out a whole load of stuff from the FCC search site. I have a IOMEGA NAS which runs Linux and IOMEGA claims they are not required to release source, their customer support department also says it does not support linux even though Linux is mentioned on the box as a supported OS. Fuckwitts! Mungewell That Marvell chip shouldn't be a SOC. Three reasons being that, a) it is on a periphery card, b ) is on a wireless card, c) having two SoCs in a consumer product that does not directly call for it means an increased manufacturing (and development) cost, compared to using a dedicated network/wifi chip. Also, Marvell produces wifi chips. A Quick search on google for "marvell 88w" (Why didn't I think of that before) show a bunch of hits for it being one of Marvell's Wifi chips. 88e is the ethernet series. http://markmail.org/message/53x7ynowjdf3sw7g "3 network controllers, 2 of them are based on Marvell 88E8053-NNC chips supporting 10/100/1000 Mbit/sec Base-T (PCIE Gigabit Ethernet), and the third one (wireless LAN adapter) is based on the Marvell 88W 8310-BAN chip supporting up to 54Mbit/sec WiFi-b/g operating speed (IEEE 802.11b/g)." http://www.murga-linux.com/puppy/viewtopic...af813236ad35d23 Unfortunately, the Marvell 88W-series is one of the few wifi chipsets not supported by a native Linux driver. And Aghaster, good luck on getting source code.
  7. SIP = Single Inline Pins As opposed to DIP (Dual Inline Pins). So you would need a strip of SIP to be able to solder on a header to it. I only have DIP headers (standard width, they fit most internal connectors, like internal USB and Front Panel LEDS/Switches, and even 3.5 inch IDE slots.) I need to get some SIP headers for stuff like this (And some 2.5inch ide sized headers) As for the ethernet, you could use short (still atleast one/two Twists) cat5e cables and make a short extension to a ethernet socket, yes, but it would be better to try to get one that fits right on the board. The problem is that it won't work with just the connector. It looks like alot of passive components for the ethernet connection are missing, plus two possible active components (U1, and y1). Like I said, U1 is probably the ethernet transceiver, what gives the ethernet connection its mac address and converts from Layer 1 to Layer 2 or above. The Ethernet PHY chip. Y1 could be level protection and smoothing. To get it to work on ethernet, you would be better off buying the lexmark card with ethernet. But if you have a working wifi router, there is no need.
  8. While it is safer to use a lower voltage than higher one, its not smart. It requires 19 for a reason, but there should be some internal play that will let that slide (Laptop power bricks are regulated, so there won't be too much play room) Second, there is a reason that HP pays for and makes you pay for, a 90w brick. Even in bulk, a 90w brick will cost more than a 65w brick, and if HP thought the laptop did not need 90 watts, then it would not bother. A 90w brick gives (90/19)=4.7 Amps at max. A 65w brick give's (65/19)=3.4Amps. That's almost 1.5 amps of difference. If the laptop needs more power, and can't source it, the brick will either blow from overcurrent, or the laptop will shutdown.
  9. 8 pins, plus two leds? On a card with wifi? Unpopulated ethernet port. I'll bet someones life on it. Some googling found that Marvel chip (wifi) to be the same as some Linksys voip router combos. The Empty u1 would most likely be a ethernet transceiver. The four pin blank connector between the ethernet mask and wifi shield might be serial. One too many pins for WOL. The two pin connector next to it might be a led connector? One pin looks like it goes through a resister then under the wifi shield. Finally, there's a 7 pin sip connection near the top left on the front picture that cant be seen because of the angle of the picture and the caps in the way.
  10. Oh, and additionally, any self respecting network team would likely voluntarily pull their site if they are notified that their site is supporting or causing such a catastrophe. Site's get pulled and cleaned for alot less. (Recently, a hack on MetaFilter ended up adding a bunch of spam code that would redirect every link on the site to a virus site, and create popups, etc, as well as erased some database information [user profiles]. Pulled, cleaned, and restored within 12 hours of infection, for a site that is not monitored 24/7 by staff [They got to sleep to]). Only some really (damn real) important site would refuse, and pricks. No need to piss off the feds if they are right about you being the source of an infestation.
  11. AFAIK, the letter of this law is clear. They can order the shutdown of TRAFFIC to/from government websites. This does not, literally, give them the ability to order the shutdown of the website. They can ask nicely, or they can ask with the threat of getting on the Gov's bad side, or they can force it and face a lawsuit that they were out of bounds of the law.
  12. They could, until it hits the news and the courts. But why would the President, or the office of the president try to shutdown a site like myspace? How would Myspace be considered Critical to Infrastructure, or a threat to it? As the law reads, they could order myspace cut off from all government networks, but it wouldn't allow them to cut off myspace from private networks. Also, even the Patriot Act cannot produce enough reason to ban information in regards to the First Amendment right to speech and press.
  13. What does this have to do with laptops (Or any data device?)? No prior laws, or (AFAIK) policies and case law would allow police to search a laptop from a vehicle search without warrant.
  14. 1, don't know. 2 is easy. You have the definition. It is at the President's whim. Most likely, any non government stop between Federal Agency A and Federal Agency B, like Level 3 internet backbone providers. If it needs to be there so those two (or three or x) agencies or offices need to talk, then it is considered critical infrastructure. Even local ISPS if they provide the network connection for an agency office.
  15. Time to break out the multimeter, and IC datasheets. Trace where the 12v leads to, and see if there a dc-dc regulator or ic that might bring it completely down to 5v (or whatever), or might bring part of it down to 5v (or whatever), and make sure that the voltage out you see is what it should be, according to the datasheet docs. Check the various ICs V+ pin and compare what it is to what it should be. If it's not, its a power issue. Easiest thing (relatively speaking) to trace. Otherwise, it would be fried logic chips. Good luck on that.
  16. How do you have a successful AP that doesn't transmit? It may not transmit an essid, but it still transmits and good scanners will show it's mac and list it as a hidden AP. If it never transmitted no client could ever connect to it at all. And yes, you're right that it's not as simple as capturing a handshake but most residential AP's usually just use their phone number (not that I would know much about that ;P). ... The router serial number is never transmitted. Ever. It is not apart of any wireless packet. Not the same as not transmitting a public essid, while still transmitting the essid in connected packets. Edit: Well, it is apart of the packet if it is the password, but you know what I mean.
  17. I'm not sure what you mean by detectable. Everything is detectable, even no-broadcast essid AP's. If you mean not crackable well, it's crackable too. Brute force on a GPU is quite an improvement over current conventional methods. Most people, even network admins I know, think WPA2 is secure. It's really not. All you need is to capture a 4-way handshake. Will the new routers allow the customer to change the PSK? Change it often and you should be ok if you keep it long and complex. The attacker will get tired of cracking it over and over. How do you detect something that is never transmitted?
  18. Well, I don't see how it would be. It is the main board's serial number, not the MAC address, and not the MAC or Serial numbers of the wifi card (Atleast with the Verizon DSL Versalink routers, they have an minipci card for the wifi part). How would that be detectable in a wifi scan?
  19. Verizon and Comcast, atleast in my area, has been shipping routers with WPA preenabled, and with the password as the serial number of the router, so not detectable from a wifi scan.
  20. It does. The name of things have two byte letters, one for the letter, then a 00 byte.
  21. Python Debugger http://docs.python.org/library/pdb.html http://www.ferg.org/papers/debugging_in_python.html It even has a stepping feature, which imho is the most helpful.
  22. How exactly do you treat your laptop as a thinclient? What in the world are you talking about? Exactly how I described it. By having all data (and apps if you want to get hardcore) on a server in a secure location. The data should not be stored on the laptop. The laptop should only act as a terminal or monitor.
  23. Apparently, Lexmark does have drivers for corporate-type printers, but not the commercial-type printers they make.
  24. It might. Don't know. Just mentioned that as a reason someone might want an extra usb wifi device, in general. If it did, and you can get it for 15, then kick ass.
  25. Since you work for an ISP (so, always on Internet accessible Network), and security/encryption is the goal if the laptop is lost, treat it like a thinclient. No (data) files on the laptop itself. Just the apps you need, and VPN to your work network and access/store the files remotely. Someone gets your laptop, they have a nice laptop, but no data. Additionally, you can treat it like a complete thinclient, and even access the apps over the VPN (Like X-11 Forwarding), so the files never touch your laptop. THe apps and files stay on the work server you securely access, and the only information you laptop ever sees is GUI images.