diablo69

Members
  • Content count

    120
  • Joined

  • Last visited

Everything posted by diablo69

  1. Open source it where its at. I for one will defiantly be monitoring the progress of this. Regards, Diablo69
  2. I wanted to know if you could use the -oN or -oG option in nmap to save a logfile that can be pulled up in nessus, and scan the ip's that are contained in that file that nmap generated. If this is possible, please explain to me how this is accomplished, I just spent a good 20 mins on google trying to find the answer.... This is as close as I have gotten...cred goes to http://list.nessus.org/pipermail/nessus/20...rch/014949.html ---------------------------------------------------------------------------------- just tried this and found it to work fine -- nmap 4.01, nessus 3.0.2, and NessusClient 1.0.0.RC4. And checking "Do not scan targets not in the file" caused Nessus to avoid scanning hosts not in the nmap output file. You may want to check your logs and make sure nessusd is loading the nmap.nasl plugin and launching it during your scan. Is there an issue with the format of the nmap output file? And what exactly do you mean by "Nessus does not appear to use this file"? In other words, what makes you think there's an issue? ------------------------------------------------------------------------------------- Any suggestions? Diablo69
  3. Woot always more to learn . I've been in the Security Game for a while now, but I just figured out after 8 years of doing it, that I really like the computer security aspect of things and not information security, though I do dabble here and there in forensics. Anywho Thanks for all the in put. I really need to study perl again to automate my scripts as I don't like to work harder than I have to . Use to have perl automate scans for me . Anywho i'll be back periodically. Back to the forums and eq2 I go.
  4. Does anybody know of some mobile network security tools that will work with a blackberry 8320? I know palm and windows mobile have a few, but I would think blackberry has some as well.
  5. Port scanners wifi scanners anything that makes my life as a admin easier. I mighyt just have to go back to windows mobile again
  6. vtc

    I have researched alot about vtc.com. I recently bought a membership to the site, however I was hoping I could download the files to my hardrive due to me not having access to the internet all the time. I have tried flashgot, download helper, orbit, and xfer, and nothing seems to work. I read somewhere that they employ DRM protection. Any advice? Diablo69
  7. I recently figured out how to use giganews and newsleecher to find binary headers. I have also heard of a program called usenext, however but from what I can tell is it just makes what wouldn't be that difficult, dummy proof so that the avg user who knows nothing about computers can use it. Does this sound accurate? If not please fill me in. Diablo69
  8. no....I know how to do it. I was just wondering is usenext created for the not so tech savy people, while the more tech savy people use giganews and find files with the site you mentioned in the post above.
  9. Demonoid is back btw..therefore its back on my #1 list, followed by mininova and torrentz.
  10. I was running kismet..I finally got it working under ubuntu for the ipw3956 intel pro wireless card, and anytime I hit L on the ssid it says "Wireless Card Power" Server is not reporting card power levels. No Signal information is available. So my question is..does this mean I have kismet configured wrong, and if that be the case..whats the easiest way to fix the problem?
  11. I finally copied the config file over from backtrak, however it worked on backtrak after fiddling around with it and loading the intel driver manually on backtrak...so I guess I am going to have to download the same driver that backtrak was using and install that on my ubuntu box, and hopefully kismet will work then.
  12. On a sidenote it keeps closing the server connection b/c the card is in AUTOFIT mode. Strangly however I did type "iwconfig eth1 mode monitor" and it went to another line that is blank..so I'm guessing that means the cmd worked. To find out if it worked do an iwconfig eth1 and it should state the crard is in monitor mode. As for it working can it detect any wireless networks. (yours maybe)? It could be that your card's driver reports the signal levels different than Kismet understands. Also, if Kismett.conf is set up for the correct driver it should put the card in monitor mode at startup. When I put my card (running HostAP) into monitor mode and then start Kismet an error will be generated. I think backtrak (a live wireless auditing linux cd) has a special ISO for your particular card. Give that a try and copy the configuration they have to your installed linux. I will try that when I get off work today. For now I though I have to go another death run. Thanks for the advice and the tip.
  13. On a sidenote it keeps closing the server connection b/c the card is in AUTOFIT mode. Strangly however I did type "iwconfig eth1 mode monitor" and it went to another line that is blank..so I'm guessing that means the cmd worked.
  14. I don't even really have to go into how much this is bullshit. My real question is since all this shit has been implemented OPENLY, b/c lets face it they were doing this shit years before they admitted to it. Anywho, I use Tor and Privoxy, but I heard from a few friends that it isn't really as secure as people say it is. So the question is, what is better than tor? Or can Tor be configured in a more secure manner.
  15. /me says F*** that!!
  16. Naw--we just have a very shitty judicial system As for the topic though--I got something similar for warez a while back. If you know what your doing you can use a little SE to get off the hook, or if you didn't do it--then be as honest as you can, and hope for the best
  17. I am not going to pretend I know much about what you are talking about--but maybe this will help. http://www.preshweb.co.uk/linux/howtos/dos/ It says is "Emulates" DOS programs in Linux
  18. www.certiguide.com
  19. I was wondering if this is true? Can't Log On to Windows XP? If that’s your only problem, then you probably have nothing to worry about. As long as you have your Windows XP CD, you can get back into your system using a simple but effective method made possible by a little known access hole in Windows XP. This method is easy enough for newbies to follow – it doesn’t require using the Recovery Console or any complicated commands. And it’s free - I mention that because you can pay two hundred dollars for an emergency download of Winternals ERD with Locksmith which is a utility for unlocking lost Windows passwords. See here http://www.winternals.com/products/repaira...y/locksmith.asp ERD is an excellent multi purpose product, but you should know it is not a necessary one if you have a healthy system and your sole problem is the inability to logon to Windows due to a forgotten password. Not necessary because you can easily change or wipe out your Administrator password for free during a Windows XP Repair. Here’s how with a step-by-step description of the initial Repair process included for newbie’s. 1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD) 2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd” 3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files. 4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now 5. The Licensing Agreement comes next - Press F8 to accept it. 6. The next screen is the Setup screen which gives you the option to do a Repair. It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it” Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process. 7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes. 8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds” 9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted. 10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system. 11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel. 12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy). 13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact. I tested the above on Windows XP Pro with and without SP1 and also used this method in a real situation where someone could not remember their password and it worked like a charm to fix the problem. This security hole allows access to more than just user accounts. You can also access the Registry and Policy Editor, for example. And its gui access with mouse control. Of course, a Product Key will be needed to continue with the Repair after making the changes, but for anyone intent on gaining access to your system, this would be no problem. And in case you are wondering, NO, you cannot cancel install after making the changes and expect to logon with your new password. Cancelling will just result in Setup resuming at bootup and your changes will be lost. Ok, now that your logon problem is fixed, you should make a point to prevent it from ever happening again by creating a Password Reset Disk. This is a floppy disk you can use in the event you ever forget your log on password. It allows you to set a new password. Here's how to create one if your computer is NOT on a domain: Go to the Control Panel and open up User Accounts. Choose your account (under Pick An Account to Change) and under Related Tasks, click "Prevent a forgotten password". This will initiate a wizard. Click Next and then insert a blank formatted floppy disk into your A: drive. Click Next and enter your logon password in the password box. Click Next to begin the creation of your Password disk. Once completed, label and save the disk to a safe place How to Log on to your PC Using Your Password Reset Disk Start your computer and at the logon screen, click your user name and leave the password box blank or just type in anything. This will bring up a Logon Failure box and you will then see the option to use your Password Reset disk to create a new password. Click it which will initiate the Password Reset wizard. Insert your password reset disk into your floppy drive and follow the wizard which will let you choose a new password to use for your account. Note: If your computer is part of a domain, the procedure for creating a password disk is different. See here for step by step instructions: http://support.microsoft.com/default.aspx?...-us;306214&
  20. The first distros I learned were Slackware and OBSD/FBSD--not recommended, but I would reccomend Ubuntu now or Kbuntu depending on what window manager you prefer.
  21. Buyxg.com has some HELLA great deals.
  22. Where do I even begin--your question is beyond vague, so I am going to take a few mins and ramble about it. Firstly you need to READ alot: Material-->Sql, Linux, C, C++, Java, Ruby, Perl, just to name a few. Secondly: Google is your best friend...alot of questions can be answered if you know where to look. Thirdly: from what you were describing, the "tools" you would be using you would not understand how or why they are being used, thus in my opinion you are a future script kiddie. Not all hackers know how to code, but all of them do know and understand the tools they choose to implement if they do not code one themselves. Fourthly: It takes time--lots of time. There are so many diff definitions for a hacker that I am not going to list them, furthermore there are many sub categories as well. Then there is the whole topic of Hackers vs. Crackers--which I will also not being getting into. Basically "Hacking" or "Cracking"--whichever term you choose to implement, is a NEVERENDING quest for knowledge. Fifthly: Suscribe to ezines--you can use google but I will list a few to help you out. 2600, Phrack, etc. Lastly: Hang around in IRC, ask questions, and join forums. My 2 favorite forums are blackhat-forums.com and binrev.com. Hope this helps, *If you have any SPECIFIC questions, you are more than welcome to send me a PM* D.i.a.b.l.o.69er
  23. LMAO--I was mermerized by the site--all of the glowing goodness ..but seriously I am contemplating on ordering me a pair
  24. CONNECTING TO INTERNET WHIT WIRWLESS on Linux backTrac2 In Strom-Approved English, "Do I need to use a special wireless card program on the Backtrack2 live CD, or does it auto-configure?" LMAO
  25. Yes packet sniffing is the way to go D.i.a.b.l.o.69er