• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About mad_jimi_simi

  • Rank
    SUP3R 31337

Contact Methods

  • ICQ

Profile Information

  • Location

Recent Profile Visitors

1,632 profile views
  1. A while ago they moved their site to Switzerland. Here's the link for anyone who's interested: I ended up using a D-Link DWL-122 I found on ebay (without installing the D-Link drivers - thanks for the tidbit tekio). Just plug it in, fire up Kismac, load the Prism2 USB driver, and away you go. It supposedly supports injection, but I haven't been able to get it to inject/reinject to generate enough traffic to capture enough IVs in a reasonable amount of time. For simple passive scanning and network discovery, despite a somewhat crappy range, it works great.
  2. Could it be because they don't pay their writers?! :pissed: The entire magazine is based off user submitted content but, yet they keep ALL of the profit. I call bullshit but, I won't start this rant. That's been the premise of 2600 since the get-go. It's not a profit motive for writers and their submissions, but rather, a place where people who love hacking can share their knowledge and discoveries in a published and distributed magazine. The draw for writers simply used to be having your content published in 2600, which was just plain cool in and of itself, and a bit of credibility behind your know-how in the hacking community, if you want to look at it that way. It seems that lately though, the content of submissions has been a bit lackluster. The publishing business is an ass-rape for any type of operation that isn't backed by high-paying advertisers and and offest by bulk production discounts. At most major retailers, publishers have to eat the cost of stocking their mags whether or not they're sold. I think anyone would be hard up to actually document net profit by 2600 that reveals some lofty sum that could justify actually paying for submissions. It's a far cry from the digg model if you ask me. What would be nice would be maybe a 2600 t-shirt and other swag for "article of the month" or something. Wait, didn't they used to give a t-shirt to everyone who got published? Maybe I'm hallucinating. The fact of the matter though, is that when you start letting less-than-intriguing articles seep in, it becomes a vicious cycle wherein people that have potentially great material may shy away from submitting because the content quality of the mag isn't what it used to be, and the motive just isn't there anymore. And then more mediocre content gets published because that's all that's being submitted. Wash, rinse, repeat. That's not to say that there aren't ANY good articles anymore, but maybe it's the romantic fantasy of days gone by, where I feel like virtually ALL the articles used to be way cool. Could all just be relative and a matter of perspective I guess. Oh, and the issue of hakin9 where I mentioned the article on overflows is actually the starter kit. I hadn't noticed until I pulled it off my desk out of curiosity after reading through this thread. Still, I'd like to know what Aghaster thinks of his subscription and if it was worth the price.
  3. Keep us updated when you do finally get the starter kit and your subscription. I'd like to know how far in advance they get to you before they hit the shelves, and if you think it was worth the $$$. I've bought a few off the rack at B&N, and they've all been excellent reads. A recent issue had a software exploitation article that gave one of the best tutorials on overflows I've ever seen. And I agree with your opinion on 2600. It's sad, really.
  4. I thought "enable" gets you the privileged mode password prompt. I've never seen it as a default password itself. It's been too long since I've played with IOS though, so I may be completely full of it. yea, enable is the command that gets you to privileged mode but I've seen it used multiple times as the password as well. It's the equivalent of Administrator, administrator on windows. That's depressing.
  5. A decent lawyer, PI, or PI via your lawyer can find this out pretty easily. Once they figure out where he works though, it won't do much good in court unless they can prove it, so they'll have to request a VOE (verification of employment) from the suspected company this guy works for. Most companies take precautions though, such as requiring written consent of the person being sought, and sometimes social security number as well. But, if you have a lawyer, he'd probably be able to subpoena the company for that info, in which case they must comply. That being said, I know nothing about law, and this reply may be a blaring indication of that, so everything I've said thus far may be totally out of whack. This is not legal advice, this is random chatter. But if this guy is your friend's brother-in-law, why can't you just ask your friend to find out? As far as websites go, most whitepages search results for people will display links to services that claim to pull the type of information you seek (and more). I have no idea how much they cost though, and can't provide any specific recommendations. Sorry. If you have $, it's probably best spent on a decent lawyer anyway.
  6. Are you sure that's not an additional update after Service Pack 2? I tried this on a freshly installed copy of SP2 today, and it worked just fine *shrug* I have SP2 running in a VM with latest updates installed as of yesterday. Worked fine for me. I'm double-checking Microsoft Update right now to make sure I do have the latest patches installed... UPDATE: Yes, Windows patches are all up-to-date.
  7. I thought "enable" gets you the privileged mode password prompt. I've never seen it as a default password itself. It's been too long since I've played with IOS though, so I may be completely full of it.
  8. Pissing match? lol Sure, buddy. Try not to take things so seriously, or personally, with a post like mine. 'Twas just a bit of light-hearted sarcasm.
  9. NEVER. What also doesn't get old though, is the temptation to be a lazy or rushed bastard and disobeying all of that and risking everybody giving you n000b shit. *ahem* No n000b shitting in the Nubie HQ. Non-attention-paying-and-rules-disregarding infidel slams are probably okay though. Which would also include you, should you proceed with said n000b shitting in the Nubie HQ. Carry on.
  10. Judging from the way you phrased your question, it would be worth your while to read into any decent turotial on the basics of networking and IP addressing. About 10 minutes into any decent IP addressing tut, and you'll understand why you got nothing when you tried to access
  11. Dos That was the first result for a Google search on "How botnets work".
  12. Did you read the Op's original post? He wants to know how to sustain a connection he already has; not get a new one. I think what PurpleJesus is saying, is that if the neighbor wisens up and enables WPA on the wlan, even if you placed a "backdoor" on one of the neighbor's boxes, you wouldn't be able to access the backdoor because you'd be locked out of the wlan. Personally, I don't see how a backdoor to a client would do you any good to sustain your access to the neighbor's wlan. How would you even get to the credentials if you can't get to the box you rooted? The botnet theory is different, but I don't think that's what you meant in your earlier post. Really, what needs to be done is sneak into the neighbor's house (preferably in ninja garb), run a cat5 from a port on the router secretly to a hidden location, where you place a new access point, of which you encrypt and give your own ssid. For maximum effect, the ssid of the secret AP should be CATSEX.
  13. If you have vmware workstation, you have the choice of using a pre-configured vmx image, of which you can find many on the web (various linux distributions and setups thereof). Or, as already mentioned, you can use the installation disk for whatever operating system you'd like to run and install it to your virtual machine. vmware in itself is not an operating system, but rather, think of it like a virtual computer. You need to install the OS yourself. Windows, Linux, BSD, whatever you have available to you. n0x mentioned iso images, which are single file "packages" that can be burned to cd. When the cd is burned, it extracts the contents of the image (or "package") to the cd. This makes it much easier than forcing people to download every single file needed to create a linux installation disk for example. They're sort of like zip files in that respect, but they differ quite a bit (which I am about to explain). vmware takes it a step further, since iso images are mountable, meaning they can be mounted and read like another disk such as a removable hard drive. you should be able to point your vmware cd-rom directly to an iso image instead of your computer's cd-rom drive so you don't have to burn the iso to a cd first. vmware treats the iso image like a cd-rom drive, so when you start up a new vmware instance, it reads the iso, and begins the OS installation just like you would with a physical cd in a physical cd-rom drive. HTH
  14. Open up My Documents Go to "Tools" menu on top part of window Click on "Folder Options" Click on "View" tab Find and un-check the "Hide extensions for known file types" option (no checkmark) Click "OK" button Now look at the file you saved with Notepad. Is it called ""? If so, right-click on the file, click on "Rename" and then rename it to Best guess, that's probably the issue if it's not associating with ActivePerl. And you should also realize, that bumping up page views without bumping up the number of songs plays will probably look bad. If several thousand people went to a band's page, but only a couple hundred actually listened to their songs, that could have a negative impact. I think it would a much better use of your time and effort to think of creative ways to entice people to actually view the band's page. Who knows, they may get popular based on true merit and musical talent, eh?
  15. It means you are safe from the perspective of not showing up as an exposed box with open ports on the net. You may still be vulnerable to a myriad of other attacks or exploits.