tekio

Binrev Financier
  • Content count

    1,525
  • Joined

  • Last visited

  • Days Won

    80

Everything posted by tekio

  1. Yes, canvas is awesome! But, they will not sell it anybody off the street. I had to go through a lot of hoops, including sending a written request on company letterhead, and having an email address that matches the letterhead. It would be easy to forge all that stuff though.
  2. The Prism2 chipset was great! Notice, I said was. The manufacturer actually provided third-party developers with documentation to develop drivers for it; beyond the oem versions. However, it is outdated, only supports wireless B, and starting with the Prism 3.0 no more support for 3rd party developers. So in short, scratch the prism 2.5. I'd go for alfa USB with the realtek RTL8187 chipset (note the 8187 is different from the 8187L and 8187 LE, you want the 8187). Alfa makes a 2.0Mw version with the 8187, and is the most sensitive chipset I've ever used. Great reception! The older PCMCIA and PC Express cards really suck. The MMC and MMCX jacks that host the pigtail for external antennas gets worn, and soon will loose the ability to make a good connection with the pigtail (not to mention the pigtails are usually cheap, and make the RF signal bleed out). Eventually, external is all but useless. The MMC and MMCX adapters were a piss-pore and flawed design. USB uses either type-N, but mostly an SMA jack; a much better and more durable design. Also, the Alfa USB adapters are way cheaper than a PCMCIA or PC Express card. If you do decide to go with PCMCIA or PC Express, Atheros is the best chipset. That is because a lot of stuff is done on software to lessen the cost of the chipset. Despite being "hardware deficient" this design allows for a developer to do more stuff with the chipset. In the past I've used two Atheros based Ubiqiti cards, one to inject and the other to capture. They injected way fast!
  3. Just got a new Pit, named Pascal. Everybody keeps calling him Rascal.. lol

  4. You could try to identify who makes the camera. Then figure out what the welcome page looks like, ie "Welcome to ACME IP Camera login". Then google it. Of course, all that is assuming it's an IP camera, is accessible over the Internet, and has been indexed by google. Most unlikely it is not any of the latter, though.
  5. Dude, you're back! I thought you got lost in the woods or something. :P

  6. damn i knew i'd need a quad core There are precomputed rainbow tables as well. The set I have is like 35GB, and covers some common SSID's like "netgear", "linksys", and what not. Being so huge they're really a pain to work with unless you've got an eSata external drive. I d/l them to my NAS, and when I tested them it took like almost and hour to transfer some to my laptop. Very annoying, to say the least.
  7. Tell the owner his box is insecure.
  8. Complying and "ratting" are two totally different things. wish my ex-employer was as sympathetic instead of sending the phedz out for a visit... as for complying and ratting being two totally different things - not too sure they are *totally* different things, seems more like a razor thin line to me... which is why i would just choose to avoid a situation where i would be legally bound to rat (or "comply") Actually it was not in federal jurisdiction. Never crossed state lines. Where I come from protecting peds and felones is kinda "unAmerican" Comply == issued court order and turn over records or comply with investigation.
  9. I never have. But I'd guess being locked up for protecting a pedophile (bad porn) wouldn't score too many points with the other inmates. But Maybe I've just watched OZ too many times. lol Seriously, though. Yes, I've been caught compromising a system before. One of my previous employers found out I had gotten card blanche on the NT network. They paid some big fancy forensic guy to audit what happened. After they found out how I got in, and that I didn't even try to do anything malicious my boss just wrote me up. He told me, "I wish the people I pay to run the networks had come up with something that clever". It really wasn't that impressive of a hack to someone who knows about security, though. Something like that no, I wouldn't even care about someone's curiosity. However, if the crime included harming another person, or severe malicious actions, I wouldn't hesitate to comply. Well, unless the guy had mob connections or something.. lol Complying and "ratting" are two totally different things.
  10. I have had little problems with vista? Whay is 7 so much better? Vista was horrible until service pack1. However, that addressed most issues with the stability of Vista's initial release. IMO, the biggest advantage of 7 is support for the i7 quad-core w/ hyperthreading. I see little reason for you to spend $200 to upgrade unless you happen to have an i7. 7 is essentially vista with a modified kernel. its minimum suggested requirements are less than vista. This means that the os will run better on the same hardware than vista would. I've not done any bench-testing, but, yes the Aero runs a lot smoother on 7. But, with Aero turned off they're pretty close. That was my expedience anyway.
  11. Compiz: working; Broadcom a/b/g/n: working; Damn I love Gentoo, now!

  12. Is having the damnedest time getting Linux to work with nVidia Optimus on his notbook, and will probably need to patch the kernel........

  13. Elcomsoft makes some nice stuff. Too bad all their stuff is so expensive. I just have an unlimited trial version. The only way it is crippled, is that only shows the first five chars of the cracked key. Good enough to have fun with, though.
  14. Smashing the Stack for Fun and Profit is a great introduction for what you want to learn. It's a bit outdated, but does a good job of describing the basics of buffer overflows.
  15. Considering the PSK is hashed 4096 times with SHA1, it's gonna take a while to brute force (SHA1(psk, ssid, ssid-length, 4096)). Especially while further considering the PSK must be at least 8 chars. To top that off it is seeded by with the SSID (i think that is correct) So premade tables must be made for an individual SSID. The best options are: 1) use advanced rules with john and send it into aircrack: john <john options here> --stdout | aircrack-ng -a 2 -b <mac> -w - /path/to/mycaptureddata.cap 2)Use hardware acceleration to brute force: The above image is using two Radeon 5850's for acceleration. Along with a quad core CPU @ 3.0Hhz with all the individual cores maxed.
  16. IDK about DDR2 and DDR3 compatibility, and am too lazy too google it right now. Just thought I'd add my 2 cents on liquid cooling. I'd not recommend it, unless you're gonna do some serious overclocking and need it. IMO, the more complicated stuff is, the less reliable it is. I've overclocked a 2.8 Q9550 to 3.5GHZ (pics were in the gallery) and it was stable as heck. That was with and nVidia chipset, that was known to run extra hot, too. Of course with the two 250mm side-fans, two internal 120mm fans, and a third-party zalman heatsink/fan it sounds like small vacuum when running full throttle on hot summer days.... EDIT: thermal compound; I've yet to find anything affordable as good as arctic silver 5. A small tube for about $20.00 will last 10 or so builds. Just be sure to learn to apply it properly! I've seen so many people that just splurge, thinking extra compound will work better. When in fact, too much, will actually insulate the CPU. Put about the size of a grain of rice on the heatsink. Then spread it evenly with a razor blade or exacto knife. The coat should be thin and even across the entire copper placement of the heatsink. You could put it on the CPU, but I just hate handling them too much, as pricey as the damn things are... The heatsinnk can usually withstand a static discharge that would fry the CPU. You could also use rubber, medical gloves to spread it with your fingers. Just don't touch the heatsink copper placement or cpu with bare hands, though. I've read the oils from human contact will degrade the compound prematurely...
  17. so you would go adrian lamo? sometimes people use proxies because what they are attempting to do is illegal in the country where they are located, but not necessarily immoral or wrong... so you would rather subject someone to an oppressive government than to allow free exchange of information? guess you have never had to go thru the system, perhaps then your views might change on cooperating... For someone looking at "bad porn" or "hacking systems"? Fuck yes. I wouldn't go to jail to protect them. Sorry.
  18. But wouldn't the proxy server be full of child porn and thus subject to legal punishment? Do you mean like a cacheing proxy server? Most will not cache images other than small gif's, or a size set forth by the admin. That would just take up too much disk space on the cacheing server to justify. Maybe I'm just confused?? Ahh, no, I was the one confused. I figured the proxy automatically downloads (and keeps for a short while) everything the proxy-user does. Thanks for the info. Most anonymous web-based proxies are a cgi or PHP script that download the content and pass it to the user. Since it is passed to the user by the script they show up in the logs and not the client-browser. EDIT: it's really easy to program one. You'd just need to make a script sending the request and displaying the content.
  19. But wouldn't the proxy server be full of child porn and thus subject to legal punishment? Do you mean like a cacheing proxy server? Most will not cache images other than small gif's, or a size set forth by the admin. That would just take up too much disk space on the cacheing server to justify. Maybe I'm just confused??
  20. If I ran a web based proxy service, I'd give all requested info. to law enforcement. The purpose of most is anonynimoty for legit purpose, and not to cover up crime.
  21. I have had little problems with vista? Whay is 7 so much better? Vista was horrible until service pack1. However, that addressed most issues with the stability of Vista's initial release. IMO, the biggest advantage of 7 is support for the i7 quad-core w/ hyperthreading. I see little reason for you to spend $200 to upgrade unless you happen to have an i7.
  22. I think it depends on the version of XP. Home only supports dual core. XP Pro supports quad, but will not support (or rather not take advantage of) i7, which is basically a quad with Hyperthreading in the desktop series or a dual with 4 threads in the mobile version. I'm not sure what the limitation of XP pro are (I think it's two dual core Xeons for workstation setups), but I remember some the versions of NT support like 16 CPU's, depending on the license. I don't know about Vista with the i7, but I think only 7 takes advantage of the i7 technology.
  23. That would be super funny. I was kinda thinking somewhat along those lines. Like what if the guy is just super phsyco and it's just random gibberish that makes sense in his mind? I mean whoever wrote it, there is a good chance they kill strangers at random. So he's probably a few bricks short.........
  24. I noticed at least 3 letter blocks beginning and ending in T and E. Two of them were consecutive, the first two words starting what looks like a phrase. IDK much of anything about breaking encryption, but there are only so many words (if each letter block does represent a word, even) that begin and end with the same letters (T.E) with the same char count as depicted. And especially that would make sense to be the first two words of a phrase. Also, there appears to a hyphen in one of the letter blocks on the fourth line (a two letter prefix in front of a work, like pre-something). But off the top of my head I cannot think of any two letter prefixes that are common to hyphenate. EDIT: oh... after googling ex and a few more are common to hyphenate.
  25. I'm not exactly sure about that to be honest. Each state seems to do something a little bit differently, I found a study guide though, so I'll probably start basing my decisions off that. Perl Manual has been added to the list of things to bring, good idea! Oh if you're using BT4 update your Nessus plugins, too. Chances are good they might set up something that will intentionally be detected by Nessus.