semen

Members
  • Content count

    304
  • Joined

  • Last visited

Everything posted by semen

  1. One word. debtakeover. What is it you have on the box, and what is that you want to install?
  2. A copy of the baby!
  3. You can probably do it easier and quicker using grep, awk and sed. But, you will need to give us a little more information as to exactly what you're doing.
  4. Make sure you compile framebuffer support in, and you can use fbi to view them. You should also give bootsplash and shot, I recently enabled it and really enjoy it.
  5. Hm. Although there are 2 threads for this already, here and here - the card I'll recommend is the SMC 2532W-B. Dig those threads as they have good banter in them.
  6. You are correct. It does use radiotap as opposed to how they work with Linux, and as current as it is - as far as I know radiotap doesn't support RFMON when it comes to Orinoco/Hermes-I chipset cards. So, your card won't work with any applications that use passive sniffing - Kismet or bsd-airtools. BSD-AirTools will however, allow you to actively scan for AP's by sending out beacons - which is very noisy. If you want to complain to somebody, it's either Sam Leffer (for the original code) or Pedro who's pulling it from OpenBSD onto FreeBSD. Either way, eventually they'll get it working on FreeBSD so just hang in there.
  7. Oh my word. 802.11b/g is in the 2.4GHz spectrum and 802.11a sits in the 5.8GHz range. HowStuffWorks.com has a dummified explanation of it.
  8. If you keep the source tarballs, some include a `make uninstall` within the Makefile - that's if you're super lucky. I'd suggest you start using CheckInstall to create binary packages for Debian that can be installed and uninstalled using dpkg. For the existing ones, you might use something more dangerous-like, perhaps this (if you wanted to remove, say, mplayer) updatedb && locate mplayer | xargs rm -rf to remove all traces of files with mplayer in it, or inside an mplayer-ish directory.
  9. Yeah. It depends on how the data is arranged. It could be an easily solved problem using awk, sed and grep. Post an example for how the documents have the data and perhaps we can give you a solution.
  10. You might try using a soft-yet-abrasive cleaner to do it - something like toothpaste. All it does is level the polycarbonate down to the depth of the scratch/gash in it. You can also try something like a 2500 grit sand paper and lots of time. I've picked up my slim-line PS2 many times from the right side, and pressed the disc into the surface but I've never scratched it. You might also be able to get an audio place to repair the disc for you, somewhere that sells pre-owned stuff probably.
  11. You mean bsdcan.org . I know some dudes from to2600 who are definately going to be there. There are some pretty big guns talking this year. This one seems a lot more "playful" by the looks of the speakers than the 2004 one.
  12. No, everybody should be using Opera. See here. Opera has had like, 5 bugs since newer high 6.x builds. Which for the most part are all locally exploitable that don't even have working PoC's that do anything.
  13. Well, setting up a VPN in Windows is as easy as pie - client and server. Same with Linux - TLDP.
  14. Uh. yeah. Why is this in the General Code section? Anyway, most of your "free links" can be found at freestufftimes.
  15. No. This is precisely what VPN's are used for. Do you guys just not give straight answers anymore? Sub7? What in the hell? The VPN will allow you to tunnel, using the internet as your medium, into "your" internal LAN on the other side. This is the main purpose of a VPN - so use it to your advantage.
  16. Yowzers.Nix that idea. Give weplab a shot or dwepcrack which has been ported to Linux by a groovy cat here.
  17. If the traffic you captured isn't too revealing, post the dump file and see if it's just you having problems with it. Try it with weplab and run it with the --analysis flag to see what you get.
  18. natas => StompBox. You could EASILY build one for a fraction of the price too - keeping in mind that this guy went "all out" with his gear. You could get stuff off eBay and chop what he spent on accessories right in half (if not more).
  19. MSH

    blogs.msdn.com has instructions on getting the beta for XP and 2003.
  20. Once the packets aren't specified as LLC in kismet and do go under the "Data" packet section, then you'll be getting encrypted frames. Kismet will log everything properly, but you will be better off sticking to one application for stream-sniff cracking that aircrack is best suited for.
  21. Kismet writes data dumps in a .dump file into the directory specified in the /etc/kismet.conf file. These are pcap compatible and will work. You may also want to look at this swell code to dissassociate a known client from an AP aswell as fatajack, libradiate and as mentioned before - void11. edit: Link fixed.
  22. No you can't. Because it is extremely possible for that to be done in that time. That's what an active attack is good for. It's already been explained in many different threads that FMS cracking is not the same as the style of cracking being done today. You're still stuck thinking the old FMS method - which is weak keys and is not how the newer methods of cracking work.
  23. Well, both aircrack and weplab incorporate deeper byte checking than h1kari's bsd-airtools anyway. Depends on what type of cracking you want to do. Passive or active? Passive, it totally depends on the amount of traffic passing and active depends on how fast you can inject packets and get replies from the router - which is fairly zippy. You won't be able to do replay attacks with your Orinoco card though. Your two best bets are to, generate bucket loads of traffic and let aircrack stream sniff it - or a grab a couple of encrypted frames and dictionary/bruteforce attack them.
  24. The article you're looking for is at SecurityFocus. edit: link fixed. I hate the jscript box that automatically has "http://" in it for the link tag =[
  25. I used to pay people to do my homework. So you owe me about 7$ and a pack of double bubble for this. valvoline research labs Key scheduling bugdev The latter being more informative. Your best chance at understanding it, might be to look at how RC4 works - perhaps by looking at some source that implements it or even looking at the RC4 source itself