Inode

Members
  • Content count

    103
  • Joined

  • Last visited

Community Reputation

0 Neutral

About Inode

  • Rank
    elite

Contact Methods

  • Website URL
    http://www.chromedpork.net/

Profile Information

  • Location

Recent Profile Visitors

1,190 profile views
  1. There isn't a particular tone to reject the call. Apart from just hanging up, you could try devising something that generates V.21 FSK modulated HDLC frames, which fax machines use to encapsulate T.30 protocol control messages, the one to generate would be a disconnect (DCN) message, represented by 11011111 (0xdf).
  2. You might want to test those caps first. (http://www.eio.com/repairfaq/sam/captest.htm) If you think the amplifier is the problem, take a look at the datasheet (http://www.ortodoxism.ro/datasheets/philips/TDA1517P.pdf) for information about its typical operation characteristics and check these against readings from the necessary pins.
  3. Disassembling an el-cheapo optical mouse for the sensors might be worth a try, I've seen very crude handheld scanners built out of these
  4. Most flatbeds feature 3 arrays (each with it's own red, green, or blue filter) of CCD (charged coupled device) sensors. Some use CIS, which are contact image sensors.
  5. Depends on the (IEEE 802.11*) standard, most cards operate on the band of frequencies around 2.4GHz, some offer support for 5GHz. The modulation for transmission means most interference is negliable. Though many cordless phones that operate on 2.4GHz seem to have some dodgy effects on data reception. Building a jammer probably wouldn't be too difficult and shouldn't require too many parts, and might be the simplest option.
  6. You'd need to generate a signal of 'noise' with as much power, if not more than the encoded video signal, in the bandwidth allocated to channel in use between the camera and the base (somewhere around 2.4GHz) to successfully jam video signalling from being received. You'll also preferably need line-of-site to the base and a directional antenna, or at least access to an area close to it where you could use an omnidirectional antenna and a signal generator putting out a fair amount of power to achieve this. There're probably EMP generation techniques you could use to screw with the camera itself, or transmit some random signals in the infrared band towards the lens, providing it doesn't do IR filtering, if you're looking to white out the image the cam will generate. *shrug*
  7. The first line of commentary on overflow1.c is: Take a look at the following code: char large_string[128]; void main() { char buffer[96]; int i; long *long_ptr = (long *) large_string; for (i = 0; i < 32; i++) { *(long_ptr + i) = (int) buffer; } The 'long' type on x86 is 4 bytes long, which happens to be the same length as a pointer (of any type), and as you can see: 128 / 32 is 4.
  8. Who is this 'we' you speak of? Also, it's rather interesting that the blame is placed on the Chinese PLA, though tough to form an opinion on what the real situation is without any evidence being presented, but that is the way of government. It really makes me wonder if these so-called victims are basing this claim on the source address(es) of the attacks. Which doesn't count for much in any instance, especially considering that many chinese networks are notoriously insecure. And if they did really have 'an army of hackers', wouldn't they be the first to make the attacks appear to be from elsewhere? Something to consider is that there're many oppressed minority groups whose homelands are now part of China, some of whom would surely love to try to put the "Peoples' Liberation Army" (as well as the government) in compromising situations.
  9. Are you sure that's not an additional update after Service Pack 2? I tried this on a freshly installed copy of SP2 today, and it worked just fine *shrug*
  10. You could also use some live cd based linux distro, mount the particular partition you're interested in, change the root directory to the directory that the partition is mounted to (with chroot), and then execute passwd.
  11. Well, there is a method to gain a level of access called SYSTEM (which you'll notice many 'important' processes on your system may be running as) which is technically higher than, and has all the priviledges of, Administrator on Windoze XP. There is a program installed by default, called 'at' which is used to que jobs at user-defined times which happens to execute all jobs as SYSTEM. Run cmd.exe and leave its window open. Observe the current time. Enter the Task Manager (ctrl+alt+del), and kill the process called "explorer.exe". Go back to the cmd.exe window and enter the following command (adjust the time accordingly, a minute or two after the current time works well): at 03:47 /interactive explorer.exe Wait until the clock hits the time you've specified, and shortly afterward "explorer.exe" will be executed. You'll know by the start menu/task bar/time returning. Verify that "explorer.exe" is running as SYSTEM by checking out its entry in the process list in Task Manager. PS: This should work provided that "at.exe" has not been removed, and the user you're performing this as is not the Guest user. Apparently it doesn't work over remote desktop, though VNC should be fine.
  12. Boot into single usermode (if LILO is the boot loader, then try: linux 1), and run the passwd command, which will allow you to set a new root password. As for remote access, it may already have sshd configured, or perhaps telnetd if it is an oldish (<= 6.2?) release. Install or update OpenSSH, if you're concerned about security. Check out http://www.tldp.org/ for some documentation.
  13. To write an exploit successfully, you need to understand the vulnerability you're trying to exploit. Having a good understanding of programming is necessary and, like Aghaster suggested, learning C is a good choice. Although, at some level a working understanding of the target architecture and the ability to write assembly for the platform you're targetting is vital, not only for reversing potentially hazardous binaries, but one example is if the vulnerability you intend to exploit requires you to subvert the flow of execution by means of injecting machine code, such as: buffer overflows, format string bugs, and file stream overflows. Learning languages like PHP, Perl, Python, ASP, and probably a few others will help you to recognize bad programming techniques in (http) server side scripting and how they manifest themselves to the end user. Combined with an understanding of SQL you'll be able to explore associated databases too. In short, once you're comfortable with programming, you should start researching software vulnerabilities, then writing exploits will come naturally.
  14. Your choice of language should depend on the nature of vulnerability, and in some cases the language in which the vulnerable program was written in.
  15. http://www.binrev.com/forums/index.php?showtopic=33148