Search the Community

Showing results for tags 'network'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General
    • General.Rules, Guidelines and Announcements
    • Nubie HQ
    • General Hacking
    • Old Skool Phreaking
    • LinkZ
    • Hacker Media
    • Hacker Meetings
    • Programming/Code
    • HAM Radio/Hardware Hacking
    • Retail Hacking
    • Urban Exploration And Social Engineering
    • *NIX
    • Graphic Designs
  • BinRev members section
    • Assorted Projects
  • Off-Topic
    • General Chat
    • Scratchytcarrier's Joke-A-Thon


  • Community Calendar


  • StankDawg: Howling@the.moon
  • Brokennode
  • RedAnthrax the BLOG!!!
  • CETX_var_log
  • The Hillbilly Hacker
  • Exit Status One
  • Bit Bucket
  • 1337_snic's Blog
  • Kotrin's Blog
  • LibbsSecurity E|Hacker Network Security Blog
  • R4p1d's Blog
  • Ohm's Blog
  • Letting the smoke out
  • 1337_snic's Blog
  • 1337_snic's Blog
  • jeremy_.html
  • tekio's blog
  • lattera's Blog
  • The Microwave Rider


  • Audio
    • Internet Radio shows
    • Miscellaneous
  • Zines
    • Phrack
    • BR Magazine
    • PoC||GTFO
  • Video
    • HackTV

Found 3 results

  1. I'm staying at the university dormitory. Our dormitory has blocked the torrent network. I cannot download files from the torrent network. ultrasurf, vpn tools such as Seed4.Me tried. But I could not solve the problem. Is there anyone who can guide you on this? How do I solve the problem?
  2. Anyone here have experience with OpenBSD 6.3 as a guest under libvirt? I've spun up a couple instances on my CentOS 7 KVM/libvirt host and I cannot seem to get more than roughly 100Mbps network performance from them. Using the virtio NIC I can sustain transfer rates of roughly 12 MB/sec. I tried switching to the e1000 NIC and performance was worse ( ~8 MB/sec sustained transfer rates with it) even though the virtual NIC indicated it had a 1000baseT full-duplex link. I did not try the rtl8139. Any ideas?
  3. Hey guys, First post here, so be gentle. Over the past couple weeks I set myself a little challenge to write a little script which would look for network printers > compare model info with default credentials info and or brute force http logins > nmap and log the ip w/ verbose but general information > also checkup on them once a week to see if creds still worked > finally store all this information locally in quite well formatted text files as well as a mysql db I did this on the 22nd of September 2013 and am going to finish tomorrow (22nd October, local time) I've checked logs and it appears I've ended up with about ~9,500 network printers and their current creds which makes for a 49mb text file. My question is what can or should I do with this, personally it was just a project and I'm not looking to harm anyone so if it was valuable for learning I'd like to share it but at the same time theres an obvious risk of someone just hacking the whole network and effecting a lot of people. I even had the idea to print of a sheet to each of the printers explaining this and advising them to change their passwords. Or maybe setup some mini network or something although I have no real network admin experience. Are there any places where this type of harmless but sensitive information is stored in a friendly environment? Thanks, Brod. EDIT: I just turned the system off. Below are some fun facts I got from the test, I'm also going to write this up in a more complete and formal fashion and release it at a later date. Fun Facts ~3,000 appear to have had their password changed from the default one to either 'password', 'admin', 'administrator', 'syspass' or 'sekret'. This is just plain stupid. ~1,800 appear to have already been hacked / going off the fact they had 'hack' and or 'b*tch' in the printer name, I assume the owner did not assign this. ~400 appear to be disliked as they had 'Stupid', 'Sh*t' and or 'Dumb' in the printers name, I assume the manufacturer did not assign this. 12 had 'brod' in the printer name