snakesonaplane

Members
  • Content count

    293
  • Joined

  • Last visited

Community Reputation

8 Neutral

About snakesonaplane

  • Rank
    SUP3R 31337 P1MP

Profile Information

  • Gender
    Male

Contact Methods

  • ICQ
    0

Recent Profile Visitors

16,236 profile views
  1. Honestly, I'm not sure. Every time I have done ARP poisoning or traffic sniffing, it's all been on the same 192.168.1.x gateway. I think as long as you can route the LAN's traffic through your PC, you should be set. I'm not an expert on this stuff though.
  2. It depends what you mean by "wireless sniffing." For any machine connected to your LAN, it doesn't matter if it's wired or wireless, as all the packets will still go through the same place - the router. To sniff these packets, you can use Wireshark on one of the clients. You can also ARP poison using Cain, which essentially makes the computers on the LAN think YOUR pc is the router. If you are looking to sniff wireless networks and not computers connected to your LAN, I'm not sure how to answer your question. While many DD-WRT routers can be set to "client mode" to mimic a wireless adapter, I've never heard of people using this equipment for wireless hacking.
  3. Excellent! I knew it was relatively recent. Thanks.
  4. Didn't know where to put this topic, so feel free to move it. I remember reading a while back an article in 2600 with a comprehensive list of resources for protecting your identity from falling into the hands of marketing companies. There were websites where one could opt out of receiving credit offers, etc. I have a decent collection of 2600 mags, but I can't remember which issue this was in. Does anyone know?
  5. Reposting is not going to make anyone more eager to help you.
  6. I am curious as to how they would do that. While there are certain laws about revealing high-risk information, most of the topics discussed here confer the responsibility to the people who choose to use the information. Are you saying that someone providing instructions on how to use a USB keylogger would be incriminating them self?
  7. DD-WRT does this too. Awesome for RDP if you open the ports up!
  8. Many of you who have visited a public library or university may be familiar with print release software. The print station is run by the software, and it serves as a payment acceptor for credits. When you release a print job from a public computer, it goes to the release station, which then releases the job to the actual printer when it gets paid. Is anybody familiar with Pharos software? I'm wondering if there are any vulnerabilities or interesting keystroke combinations out there. I'm not sure what version I used the other day, but after you swipe your card, it lists all active print jobs. After you choose your job, it will print for you. Since a magstripe reader is merely an HID, I'm thinking there are some keystrokes that might open a hidden menu or something? There is a keyboard there in front of the print release station, so I could try any suggestions. Before anyone asks, I am not looking for a way to print for free. The obvious (and simple) solution for this is to cut out the middle-man, the print release station, and print directly to the printer's IP address. I know how to do this, so I'm really just wondering what I can find out about this Pharos software. I'm not in it for destructive purposes, but just looking to explore and figure some cool stuff out.
  9. Is there an easy and legal way to download embedded quicktime movies that you'd stream from a website, besides buying quicktime pro? I'm going to be taking an online class and I'd rather download the lectures to my pc than have to stream them. I've been doing some research, but was wondering if the BinRev community had any personal suggestions.
  10. For those prices I'll stick with regular mate, thank you very much. $2.79/kilo, can't beat that.
  11. Pretty subjective question, as it's all a matter of opinion. Me? I think GNOME kicks KDE's ass. I've found that Fedora looks real nice overall as a distro.
  12. -
  13. That's the old style license, which I'm pretty sure is no longer in circulation.
  14. 1. Look up various information on proxy servers and VPN's. Find out how these work, how they differ, and how they can change one's IP address to the outside world. 2. Not really sure what "web spoofing" means. 3. There are multiple options for USB encryption out there, including biometric USB keys. A popular option is to use the open source program TrueCrypt to encrypt an entire USB volume. I can give you ideas for starting points, but I'm still confused about the big picture or what exactly you're trying to do. I'm not seeing how this ties together in developing some sort of "security system."
  15. Credit cards often have a negative stigma attached, but the power is in the eye of the beholder. I very rarely use my credit card on things I wouldn't be buying with cash anyway. It's easy, often protected, and builds my credit history. Just pay it all back at the end of the month and you'll have no problems.