snakesonaplane

Members
  • Content count

    293
  • Joined

  • Last visited

Everything posted by snakesonaplane

  1. Remember this site? You could get tons of information on cell phone numbers. Now, it seems to be restricted. http://tirs.us/ Anyone know of a similar resource, or has anybody requested access and successfully gotten credentials?
  2. Didn't know where to put this topic, so feel free to move it. I remember reading a while back an article in 2600 with a comprehensive list of resources for protecting your identity from falling into the hands of marketing companies. There were websites where one could opt out of receiving credit offers, etc. I have a decent collection of 2600 mags, but I can't remember which issue this was in. Does anyone know?
  3. Honestly, I'm not sure. Every time I have done ARP poisoning or traffic sniffing, it's all been on the same 192.168.1.x gateway. I think as long as you can route the LAN's traffic through your PC, you should be set. I'm not an expert on this stuff though.
  4. It depends what you mean by "wireless sniffing." For any machine connected to your LAN, it doesn't matter if it's wired or wireless, as all the packets will still go through the same place - the router. To sniff these packets, you can use Wireshark on one of the clients. You can also ARP poison using Cain, which essentially makes the computers on the LAN think YOUR pc is the router. If you are looking to sniff wireless networks and not computers connected to your LAN, I'm not sure how to answer your question. While many DD-WRT routers can be set to "client mode" to mimic a wireless adapter, I've never heard of people using this equipment for wireless hacking.
  5. Excellent! I knew it was relatively recent. Thanks.
  6. Reposting is not going to make anyone more eager to help you.
  7. I am curious as to how they would do that. While there are certain laws about revealing high-risk information, most of the topics discussed here confer the responsibility to the people who choose to use the information. Are you saying that someone providing instructions on how to use a USB keylogger would be incriminating them self?
  8. DD-WRT does this too. Awesome for RDP if you open the ports up!
  9. Many of you who have visited a public library or university may be familiar with print release software. The print station is run by the software, and it serves as a payment acceptor for credits. When you release a print job from a public computer, it goes to the release station, which then releases the job to the actual printer when it gets paid. Is anybody familiar with Pharos software? I'm wondering if there are any vulnerabilities or interesting keystroke combinations out there. I'm not sure what version I used the other day, but after you swipe your card, it lists all active print jobs. After you choose your job, it will print for you. Since a magstripe reader is merely an HID, I'm thinking there are some keystrokes that might open a hidden menu or something? There is a keyboard there in front of the print release station, so I could try any suggestions. Before anyone asks, I am not looking for a way to print for free. The obvious (and simple) solution for this is to cut out the middle-man, the print release station, and print directly to the printer's IP address. I know how to do this, so I'm really just wondering what I can find out about this Pharos software. I'm not in it for destructive purposes, but just looking to explore and figure some cool stuff out.
  10. Is there an easy and legal way to download embedded quicktime movies that you'd stream from a website, besides buying quicktime pro? I'm going to be taking an online class and I'd rather download the lectures to my pc than have to stream them. I've been doing some research, but was wondering if the BinRev community had any personal suggestions.
  11. For those prices I'll stick with regular mate, thank you very much. $2.79/kilo, can't beat that.
  12. Pretty subjective question, as it's all a matter of opinion. Me? I think GNOME kicks KDE's ass. I've found that Fedora looks real nice overall as a distro.
  13. -
  14. That's the old style license, which I'm pretty sure is no longer in circulation.
  15. 1. Look up various information on proxy servers and VPN's. Find out how these work, how they differ, and how they can change one's IP address to the outside world. 2. Not really sure what "web spoofing" means. 3. There are multiple options for USB encryption out there, including biometric USB keys. A popular option is to use the open source program TrueCrypt to encrypt an entire USB volume. I can give you ideas for starting points, but I'm still confused about the big picture or what exactly you're trying to do. I'm not seeing how this ties together in developing some sort of "security system."
  16. Credit cards often have a negative stigma attached, but the power is in the eye of the beholder. I very rarely use my credit card on things I wouldn't be buying with cash anyway. It's easy, often protected, and builds my credit history. Just pay it all back at the end of the month and you'll have no problems.
  17. Make sure you do your research and find a company with low APR and no annual fee. Even better if you can get one with cash-back rewards! Just be careful if you intend to have multiple cards; I can't stress the importance of responsible credit use enough. Good luck!
  18. Do you, by any chance, work for the school district of Lower Merion Township in PA?
  19. I am VERY interested in IR bruteforcing for another project. A link would be much appreciated. I'll look for it in the meantime.
  20. Completely OT, but every time I hear the word "microprocessors", I think of Martin Sheen's terrible Boston accent in "The Departed".
  21. There's no shame in looking for something beyond emotionless sex. Sex is better in an emotional relationship with somebody you trust and care about, anyway. That being said, there is also no shame in exploring your innate human needs. You shouldn't feel bad about either of your choices. In fact, you should embrace the fact that you have choices.
  22. At least he's stealing them. A few months back, there was a guy in Cambridge, MA going around beating the shit out of parking meters.
  23. I'd hardly call popping in an Ophcrack disk complicated. Nice guide nonetheless.
  24. They do that at my school, which is irritating. It's a weird system, though. Initially they just blocked the .torrent extension, so people were using Txtor or connecting to the tracker with a basic proxy. Then, they somehow found a way to block all torrent traffic, even if you switched up the ports. I had to use a VPN to download. Sometimes torrents are blocked, other times you can download no problem. That's weird. My Uni doesn't care at all about on-campus (read: no bandwidth used) traffic. In fact, the DC++ hub used by students has been known to get pretty good speeds. I live in an older building that doesn't have gigabit, so my DL speeds cap at less than 2.0 MB/s. Still though, can't complain.
  25. Good idea trying it in a VM. I would like to test it out myself, but I don't trust anything that has been supposedly "leaked". As time goes by and there is an increasing amount of verification, I might give it a try. Amen. BartPE is very useful and highly customizable.