Dirk Chestnut

Members
  • Content count

    269
  • Joined

  • Last visited

Community Reputation

3 Neutral

About Dirk Chestnut

  • Rank
    SUP3R 31337 P1MP
  • Birthday 10/31/1981

Profile Information

  • Interests
    Making things not work, thinking I made them work again, and having end-users come to tell me things are still broken.
  • Location
    248

Contact Methods

  • Website URL
    http://
  • ICQ
    0
  1. Try ffmpeg I don't know that it has a nice easy to use GUI interface, I've only used it on the command line, but once you get used it on command line you can use it to do pretty much anything. Convert to other formats? ffmpeg does it. Downsize the dimensions of a video? Yeah, ffmpeg does it. Change the audio codec of a video? Right, ffmpeg is your guy.
  2. Colt 45, works every time!

  3. If that's so, that would be cool to see on some other distros. I was thinking last night that I could start to work on securing linux boxes. The field I'm looking into joining is IT security and computer repair/maintenance, anybody have any suggestion for this? Some inside look at what the other cds might be for other distros...http://www.pcbsd.org/content/view/106/11/ If you're looking into learning how to secure Linux boxes, you should use and learn a Linux distribution, as opposed to a flavor of BSD. Many of the concepts are the same, but there are differences. For example, for firewalling, Linux uses IPTables, while the BSDs use IPFilter. I don't have much experience with IPFilter, but I'd assume it works differently in defining filtering rules. If you're looking into doing this professionally, the main distributions of Linux you'll be interested in are Debian (or Ubuntu) and Redhat (or CentOS or Fedora). If you have zero Linux experience, I typically prescribe Ubuntu, as it's almost always going to be the most successful mix of easy-to-install, and compatible with all of your hardware right out of the box. At the end of the day, you'll want to learn how to secure things via command-line (aka shell). The shell is where differences between most flavors of Linux become unnoticeable - most distributions work the same under the hood, but are differentiated by different default user interfaces and base application installations. When you're comfortable with the shell, you'll find you can manage to do almost anything you know on one distro on another.
  4. I've never used this, but you'd probably be able to get similar results out of Tamper Data, another Firefox extension. From the screenshots I grokked of LiveHTTPHeaders, it looks like manipulating a POST would be easier with Tamper Data, at the very least. If you're married to the command-line though (and good for you! You'll find it more flexible for this sort of thing) I second the the usage of "curl", as in the standalone binary... to me it's wget with more options. An (untested) example of usage for your case would be something like: curl -H "Translate: f" http://www.yourserver.com/..%c0%af/protected/protected.zip I'm not 100% sure if the shell you're using would interpret %c0%af as the Unicode character "/", but that should be an example to get you started.
  5. Maybe not super-helpful, but the first time I read this - http://xkcd.com/327/ - was when the basic concept of SQL injection dawned on me. I'm not exaggerating. It helps to have a basic understanding of SQL, of course.
  6. Debian, Fedora, and RH 9 (ugh)... in that order of usage. 27
  7. Anyone going to Penguicon this year? I've meant to go for the past few years, but never really gotten around to it. This year, Rasmus, the creator of PHP, is going to be on hand... and we use PHP extensively for work... sooo... Other than that, the lineup doesn't look too awesome, for the OSS crowd at least, but I've been meaning to go for a while now so decided might as well start now.
  8. I hereby condemn using the Kindle 2 for this. The idea of an always on and (currently free) cellular internet connection may seem appealing, but so far I haven't seen a lot of promise in the way of hacking it and gaining root privileges to its OS. That said, I've heard that allegedly there may be updates to it in the future that allow for third-party developed applications. Also, it has a rudimentary web browser, so you could write your own web-based tools, and connect to them. The big bummer, is I don't think it supports connecting to Wi-Fi hotspots the way an iPhone does. You can tether it to a PC or laptop using a USB cable, but that's only useful for a free (and probably slow) connection for said extra device you'd have to lug around.
  9. I think this is a cool idea. To me, it's always been easiest to know how to exploit something if you know how it gets there in the first place, which seems to be the aim here. It definately helps cater to both sides of the security minded: those that want to know what they can exploited, and those that want to know what they're doing that could be exploited. A quick critique though - keep it simple. For example, your XSS example is maybe more complex than you intended. There's really no need for the SQL. You could do something as simple as: <? echo "<form method=\"POST\" action=\"" .$_SERVER['SCRIPT_NAME'] . "?" . $_SERVER['QUERY_STRING'] . "\">"; ?> <p>You say:</p> <p><textarea rows="10" cols="100" name="phrase" size="20"></textarea><br /> <input type="submit" value="Submit" name="Submit_button"></p> </form> <p> You said:</p> <p> <? echo $_POST["phrase"]; ?> </p> I didn't test the above example, but even if it doesn't work out of the box you should get the gist. If you enter in: <script>alert("Hello world");</script> ...into the text box, than the user would see a Javascript alert saying "Hello world". My point being, it illustrates the bare minimum needed to showcase a particular vulnerability. The above is EXTREMELY common in PHP programming. Taking it a step further you could add some comments to the script (or actual copy to the rendered HTML doc) to tell the reader how to exploit the vulnerability and then comment the part(s) of the script that cause it to happen, and maybe even offer some suggestions on how to do it right. Going maybe a step further than that, if your hosting provider supports you using .phps syntax, it could make showing PHP sources easy. If your web server can be configured as such, specifying a .php file as .phps will instead show the code of the script with highlighting and whatnot. It would be trivial to auto-generate the links to this on each page, so a user can quickly see both what the script generates, and what the code is, without requiring you to maintain separate files of each.
  10. One-liners are almost always completely situational - you might have this awesome one that does what-have-you, but it's not usually not useful to someone else in what they're trying to do. I think it's kind of a rad site for learning new general tricks and shortcuts though. I'm definately going to keep it in mind for the next time I need to clunk together a shell script to do something like reformat a text file.
  11. Check out the --propupd switch for rkhunter. Also, check out http://www.manpagez.com/man/8/rkhunter/ and search for the "propupd" switch. It looks like checking the physical location (inode)/checksum/modtime of popular binaries is only one facet of what rkhunter does. For individual files (and their inode/checksum/modtime), it would appear the "baseline" for rkhunter is determined by being run on the local system, and generating a database of those stats. My knowledge of rkhunter isn't 100%, but I can't imagine your distro (or the rkhunter dev team) holds a database of ALL possible values for inode, checksum, or modification time of a particular program. If they did, they'd need to maintain a checksum for all possible supported versions of any given program. It would be nearly impossible to maintain mod times on binaries (this depends largely on your package manager - many do preserve mod timestamps from when the binary was created in the repos). However, it would be COMPLETELY IMPOSSIBLE to store a known baselines for inode usage. Considering these factors brings me to this conclusion: I think the intended usage of rkhunter, as far as system admin related files are concerned, is that you update only from 100% trusted sources, after which you run the --propupd routine. I haven't the foggiest on what Wubi's package manager is, but my guess is when it is run to update a system, it doesn't automatically run "rkhunter --propupd". Thus, if you see warnings of the type above, they're likely due to updates (which rocky already stated). I suggest running the program with this switch, then running he check again. If you don't see any warnings, I think it'd be a pretty good indicator that this is the case. If my understanding of rkhunter is correct, than it also looks like a lot of what it does is also basically what tripwire does. That is, it is run to determine a "baseline" for the system, and every time it is run after that, it compares the "current" state with the "baseline". With tripwire, of course, it's common to see a whole slew of warnings as soon as you run an update.
  12. If both PCs have their ethernet (aka network) ports plugged into a switch that's powered on (and provided the cables are wired correctly) you shouldn't get a "Network Cable Unplugged" error. If this is indeed the error you're geting, from experience, this is a problem with the cables. It's a very low level function of all network cards to detect whether or not the physical connection from them to another device is intact. If you resolve this "cable unplugged" issue and still have problem connecting from compA to compB, consider the firewall. If A and B are at least Windows XP, then by default they will have a firewall enabled shutting off external to all services, including filesharing.
  13. Binary is not necessary to learn how to program. It's necessary for subnetting networks by hand (which is un-necessitated by programs that act as a "subnetting calculator"). If you don't know what I'm talking about right now, then this doesn't apply to you either. NO ONE programs in binary. Someone figured out a long time ago that it's much easier to develop a programming language with a style that more closely mimics an actual written language, which is then converted automatically into machine code (aka binary). It's handy to know how a binary system works for understanding why variable definitions are what they are (in C/C++ that is), but if you're just starting out... it doesn't really matter. Knowing the restrictions of different variable types is enough. As for sources to teach you how to program, just do Google search on "<insert language name here> tutorial". You'll typically find information that's on par with any starter books. If you prefer a book to read, check out your local library. Most offer books to cover the basics of the more popular languages.
  14. Run a VNC server on your Mac? http://www.dssw.co.uk/blog/2007/05/14/a-vn...n-mac-os-x-104/
  15. See: http://episteme.arstechnica.com/eve/forums...01053931/inc/-1 So... it looks like if you use ActiveSync to connect to your e-mail, this becomes an issue. Read all the posts, there's certainly some "job longevity" facets to consider in disabling it. Those posts are old, so why the sudden headache now? I couldn't tell you. Maybe your e-mail server team ramped up security? My knee jerk reaction is to also recommend seeing if you can connect using the plain old IMAP protocol (assuming you're not already). It seems you might lose some Exchange specific functionality (and I don't own an iPhone so can't tell if this would be huge or not), but it might be a viable option. Viable only, of course, if your Exchange admins have set Exchange up to allow it to be accessed via IMAP. At any rate, it seems you may be able to turn down the passcode timeout threshold, so it asks for it less frequently. Although, it looks like 15 minutes is the max, which isn't very long. If you need to check your e-mail every 15 minutes or sooner, you may want to consider a new employer . Alternatively, if you just need access to e-mail to get quick automated alerts when things are fubar, is there a way to do it via SMS (aka text messaging)? I don't know anything about AT&T's service, but I know with Verizon my phone (which has no e-mail capabilities) can receive "e-mail" by sending said e-mails to an e-mail address that looks something like <phonenumber>@verizon.com. In reality, that address captures the e-mail, and converts it into a text message.