tekio

Binrev Financier
  • Content count

    1,525
  • Joined

  • Last visited

  • Days Won

    80

Everything posted by tekio

  1. Edit: I just tried this. By default u can only poke friends and friends of friends now. Sorry. If you're lime trying to meet this chick, you're really going about it the wrong way. If you try to "hack"'her Facebook, you're gonna come off like super creepy, and scare the hell out of her ! You can poke anybody on Facebook! I do it all the time to meet girls on there...
  2. thinks Stacy's got a pair that's nice to stare at!

  3. It is the software that dictates what IP addresses are valid. Do a little research on the OSI model, and where TCP/IP falls within the model. IP, what we're talking about here, is at the Network Layer. It defines communication rules between remote networks/hosts. Hardware requirements are not defined in IP. Each layer is a separate entity from the lower layers. So, no matter what hardware, or operating system is being used, it uses IP to communicate with remote networks. Experimental to me is a vague generalization as well. But, it states, "class e addresses should not be used on an IP network". So, routers and some operating systems will not recognize class E addresses. Why should they? It's experimental, and has been reserved as such. For example class D addresses are used for multi-cast. Well, someone was bright enough to decide and save about 268million IP addresses for something that might be unforeseen at the time as well. Fine and dandy, right? Well, not really. As you've probably heard there is a shortage of IPv4 IP addresses. It was proposed to use the 268 million class e addresses. However, with all the work it would take, patching the tcp/ip stack of current operating systems, for a short term fix, rolling out IPv6 was decided as the solution. Yes, you would probably need to "make your own" software. It is experimental, and that's experimenting, right? I honestly don't know much about IPv6, yet. I've never needed to lean about it, but will fairly soon. I'm definitely not gonna google it for you. edit: as far as being experimental, it is used to experiment with different IP delivery methods, more than likely. For example, what if we want to test a new transport layer protocol that offers more robust services than TCP or UDP. Well, maybe we might need to do something to the IP layer to make that transport layer protocol work a little better. Maybe making the size of the IP packet larger to increase speed at the IP layer. Well, there are 268 million addresses that were reserved to experiment with. Most all class a, b , and c addresses are in use right now. And the reserved address spaces for private IP ranges is reserved for functioning private IP networks.
  4. Not at all I'm doing some personal research and I've reached a road block. Wikipedia; What is an RFC? RFC 878; Arpanet Hots Access Protocol RFC 854; Telnet Protocol Specification RFC 5735; Special Use IPv4 Address Space RFC's document the idea, and progression of a protocol, or standard for use on the Internet. Might want to throw some ketchup on those, they tend to be rather dry reading material. Have fun! From what I can understand in here... E class address schemes obsolete and may not be really be being used for study or what ever they did with them? Oh and thanks for the RFC's Class E addresses were reserved for future use, or experimentation. I read the RFC really quick, and it went over something like the class E addresses shouldn't be used on IP networks. IP is used to communicate between hosts on remote networks, subnets, or broadcast domains. So, if you set up machines on the same subnet, the class E address might, or might not work. However, most equipment that routes traffic between different networks probably will not be designed to relay traffic destined for a class E address on a remote network. Even if networking equipment were designed to route class e addresses, they have not been assigned to anybody by a regional allocation registry. If you really want to learn how class e addresses work just play around with them. Get two hosts and assign them a class e address, and see if they can communicate with different operating systems and network utilities. Test it out to see what happens if class e addresses are used to communicate between different subnets... Some operating systems or network utilities might do unexpected things because they were not designed with class e addresses in mind. Who knows, maybe you'll stumble on to something cool.
  5. Not at all I'm doing some personal research and I've reached a road block. Wikipedia; What is an RFC? RFC 878; Arpanet Hots Access Protocol RFC 854; Telnet Protocol Specification RFC 5735; Special Use IPv4 Address Space RFC's document the idea, and progression of a protocol, or standard for use on the Internet. Might want to throw some ketchup on those, they tend to be rather dry reading material. Have fun!
  6. If you can bypass WPA with ease, you should have no trouble circumventing MAC address filtering. You'll just need to sniff, find a valid MAC, and either wait till it's off the network, or DOS it... If you go on with a duplicated MAC, most likely it will receive all your traffic because the other hosts already have it in their ARP cache.
  7. My experiences with it is limited, but I believe mod_rewrite, can achieve the same results you are describing. The URL in the address bar will be whatever the user put in, but the underlying module will "rewrite" the url, showing what is defined by the webmaster. EDIT: just google, "mod_rewrite examples" and you'll get the idea.
  8. In CSMA-CD there is an automatic backoff algorithm. Whenever there is a collision the senders wait for a random amount of time and then try again. You said if multiple users try to communicate the base station GIVES them the backoff value (as opposed to generating this value themselves). Are these two different things ? If they are, how does the base station succeeds in communicating the values when everybody wants to talk. Won't the packets collide ? Forgive my noobish question, I am new here. WiFi. 802.11 doesn't use collision detection, each device would need two radios. It uses collisions avoidance. Because the sending host first listens to the channel, looking to see if the receiving host is busy, random noise will cause it to just wait to send. ASAIK the sending host first looks for a CTR, clear to send from the receiving host. If none is returned it backs off for a random interval generated by the sending host.
  9. Yes, it is possible to gain access to insecure wireless networks that require authentication or an encryption key. Just joking.... How WEP is insecure WPA insecurities Links to the podcasts are in the upper left portion, under the description paragraph. Just thoght I'd mention that, because it took me a few seconds to locate that small text.
  10. You can't break into secure networks. If you can, they're insecure networks.
  11. You need to get them to give it to you, since they are in possession of the logs. I've have not used AOL mail for a long time, but if someone responds to one of the emails sent out, you could look at the SMTP headers and get that information. Also, you could try looking in the sent folder, and trash folder. You might find something that was sent from your account there. Also, you can go into the AOL mail preferences and check the option for a mail notification when messages are open by the receiver. But that only works/worked when the recipient looked at the message from AOL Mail. All that is assuming AOL still uses AOL Mail, it's proprietary mail system, and the person has not used public POP3, IMAP, or SMTP servers. I worked as a tech in aol a long time ago, and had access to that info from KRIS (the old AOL - customer/account db system). I don't know if techs still have that info. But even if they do, they're not supposed to give it out for privacy reasons, it was a big "no-no". We'd get girlfriends wanting to know when their bf's are online, people trying to get Sandra Bullock's personal (she had a public aol email back in the 90's) info... etc...
  12. First, you are using Leopard Beta. Don't use that. It's old, has gaping security flaws, and no up-to-date patches. You've probably got it from TPB, or a similar place. So the image quality is questionable. Are you trying to make an install disk from an ISO, from disk manager, from the install routine? If so try burning an install disk on another system. With OS X, like any other operating system, minimal drivers are loaded during install, and not all media formats can be recognized. Go to where-ever you go. Find a GOOD image, burn it to disk from another system that has a fully intact operating system installed. The problem is either a bad image, or needed drivers to understand the image format are not loaded.
  13. +1 for Afterm4th. Anyway, isn't selling "hacked accounts" in a security forum like trying to sell ice to Eskimos? At least that's what I think he's trying to do.
  14. I still think the deauth is the best, most practical solution. I just say that because I've been a victim of it once. While playing with Kismac, I fell asleep, left it running; set for the Ethernet broadcast address. Of course by the time I woke up and went to get on the net, nothing would connect to my router. At first I thought my router was fuxed. Finally I fired up Omnipeek and saw all the deauths.
  15. ARP spoofing works at a different layer than chrome; Application vs Datalink. I tried it with cain, and it spoofed. sslstrip could have problems tough.
  16. is convinced WiFi reception is 25% technical and 75% black magic & Voodoo

  17. VMware will make USB devices available to the virtual machine, as long as they are on a true USB. Not a USB card plugged into the PCI bus. So, if you plug a USB card into a PCI/PCMCIA/PC Express slot it will not work in the vm.
  18. Wiping out her home folder and account will not, for sure, get rid of any applications she might have installed, malicious or not. If you don't know how to track down malicious software the only way you can be sure is to reinstall os x. If you do reinstall, make sure it is a fresh copy, and not an archived install. Go into Disk Manager from the install screen, and delete the partition table, then make brand new partitions for the new install. That way, you'll be sure there is nothing left over from the previous install.
  19. Most people in here have learned on their own. Just start out by doing some tutorials on the web, and getting a few books. I'd recommend starting out with something like PHP, PERL, Python, or JavaScript instead of a more difficult language like C or C++. If you start out with a difficult language, it gets really boring damn quick. With a simpler language, you'll be able to better focus on learning to program. Rather than trying to understand concepts that have a steep learning curve and struggling to understand example code. Starting out with an easy language will first teach you to think like a programmer, making learning advanced concepts like OOP and memory management a lot easier. Not to mention it gets boring studying syntax and making "hello world" applications. With something like PHP or JavaScript you'll be able to make little applications in a matter of a few weeks. P.S. If I were to recommend a language for someone starting out, I'd definitely recommend PHP. It is easy to learn, but can also be challenging for more advanced programmers. Also the syntax is similar to languages like C, C#, Pascal, and even PERL.
  20. Me: Cuda is not working on my Sony Z series notebook. Sony Support: The standard nVidia drivers will not work, Sony Z series uses special drviers to switch between Intel and nVidia graphics, and they don't support Cuda. Me: But when I bought it, the sticker on the top said, "with Cuda". SS: yes, the graphics h. w. does support cuda, the drivers do not though. Me: ????????

  21. I like Beryl as a Windows Manager with Gnome. Just because it's pretty, I guess. On a lower-end machine I love Fluxbox! It looks cool, and is easy to easy to navigate.
  22. You don't want to watch the films? in the address bar of you browser: javascript: alert(dunn(return true)); OR alert(window.theViewer.getVariable('tPlayValue') = true;) alert((vTotalTime = 300); I know FF will execute js from the address bar, not too sure about other browsers, though. You'll need to use alert() to hold the code w/o generating errors. The second idea, is a shot in the dark since you didn't post the code for the viewer application. So, you'll probably need to find a way to escape the single quotes. I know it is possible, I've done it before, but forgot how. If you get stuck just google something like, "XSS encode OR escape single quotes". There are several ways to trick it. It's just a matter of finding something that isn't tamper resistant. Looking at the code it isn't too sophisticated at all. I'm not too good w/ js either, but I think you want to look at dunn(), and the preceding the function. I haven't taken driver's ed in years, but do remember understanding content before the test proved a good idea.
  23. Your question is a little vague. Are we talking PHP code injection, or SQL Query injection? By the example given, "select where myparam=whatever", I'm guessing SQL injection. If we're talking about PHP code injection, it's rather simple to do something: <?php system($pwned, cat /etc/shadow | grep "\root\|mysql\|admin\"); println(nl2br($pwned)); ?> OR <?php system($true, mv /etc/shadow /etc/shadow.bak); if($true) { system($access,"sed -i \'s/^root.*$/<line with predefined root hash for injecting into shadow file>/g' /etc/shadow"); } if($access) { echo "pwned!" } ?> If it's an sqli you can still add and delete records, and switch databases. MySQL uses databases to store credentials for logging into MySQL. So if permissions are not well designed you could easily update the MySQL user authentication db.. Also you can use stored routines to possibly send commends to the o/s. EDIT: I was thinking about the PHP injection, and the examples given wouldn't work, unless the web server was running with UID 0. Or PHP was running in cgi mode at uid0. Very seldom to find that. But you could still have carte-blanche access to the system as "nobody", or whatever the web server is running as. Well unless it's chrooted to /var/www.
  24. I did something similar, and aet it up like this: MyMain Router/WiFi Network -----NAT TRanslation----> |DDWRT 54G| Since NAT cannot be (if implemented correctly) traversed upwards, it kept my main network offlimits to the "victim" using my "honey pot" wrt54g. The wrt 54g connected to my neighbor's WiFi in client mode (don't want people doing naughty stuff on my Internet Connection). I then had another WRT-54G plugged one of the Ethernet sockets of the DDWRT WRT-54 router, with an unencrypted signal, and blocked all connections from that router to the WRT-54G running DDWRT, to any administration ports (23, 80, 443, 80.. etc..), so a 1337 h4x0r couldn't access admin functions of the WRT running ddwrt. That was really the most secure way I could figure out to run a WiFi honey pot and access it from a secured network. It was kind of a pain in the ass to set up routes enabling me to sniff on the second wrt-54g, though.
  25. dinscurge's idea was very good. In aircrack-ng, if no source mac is specified it goes to ff:ff:ff:ff:ff:ff. Some systems will ignore the Ethernet broadcast, but most do not. edit: destination address, not source address.....