unregistered

Members
  • Content count

    23
  • Joined

  • Last visited

Everything posted by unregistered

  1. and still get it to process/work?
  2. hi what softwares are available to sniff a particular wireless network, would simply using airodump-ng and air-decap to decrypt the packets work? the problem here is that i can only seem to capture only incomplete fragmented packets, what can i do to ensure that i capture full packets other than going on the network itself and do some arp spoofing? btw is there a wireless equivalent of wireshark?
  3. would someone sniffing on an exit node still know where your packets are going (the destination node) if they are encrypted, whether through ssl, ssh or otherwise? when encryption happens, do the packet headers get encrypted too?
  4. ok it says here for vpn http://searchsecurity.techtarget.com/sDefi...213324,00.html# 1) so how would the routers know where to route the data if its encrypted? and how would i go about implementing that? 2) what's the difference between a proxy and bouncer? 3) btw, is ssh tunnelling an implementation of vpn? 4) another question i have would be that for ssh tunnelling, it works at the transport layer onwards so only applications which are designed to use the port would go through the tunnel and be encrypted right, other apps would not go through the tunnel. On the contrary, IPsec works on the network layer so all information above the network layer whether they use UDP or TCP or whatever ports for TCP would go through the tunnel and be encrypted. Are the above statements correct?
  5. if you're tunnelling web traffic don't forget to disable java,javascript too.
  6. dlink dwl-g650 dlink dwl-520 (i think) intel ipw3945
  7. it only works with 802.11b, imho, orinoco is old skool, the best wifi card currently (pcmcia, pci-e, whatever) by far would be in the ubiquiti brand range. The senao cards are not too bad too and i heard they can match up to ubiquiti src but both are way to ex and beyond my budget.
  8. windows can do injection? that's something new to me
  9. oh i forgot to say, linux software
  10. the only difference between this and airodump-ng is the virtual interface? but the key thing is will it be able to capture every packet that comes from the ap since when i monitored with airodump-ng, it only gave me incomplete fragmented packets?
  11. i also want that
  12. as above, is there any way to spoof the router's dhcp client's table to not show an extra node?
  13. i know nothing but im just curious poking around
  14. so the only way to obfuscate my position somewhat is to create noise as in wifi transmission on the same channel, etc as my transmitting machine correct?
  15. what if my wifi nic is shouting with a directional antenna, would it make it any more difficult to pinpoint my location?
  16. how about not using DHCP at all.. if you guess the networks ip range which should be pretty simple just give yourself a static IP address. This way your computer will not apear in the dhcp list. well yes but it would appear in the rotuer's static ip page, the key here is to not make your node show up on any of the router's admin pages and perhaps not even on the ping sweep by getting your computer to drop the icmp packets or something like that. anyone knows how to do it? i'm not sure what the router static ip page is.. its probably an arp cache.. the way to clear it out could be to arp flood.. generate fake arp replies until the "page" is cleared. As for the ping sweep, you just need a firewall software that has stealth mode.. which basically ignores all icmp and other requests. the "static ip page" is the place in the router configuration where you have to put in your computer MAC and the ip you want otherwise you wouldn't have a static ip.
  17. Wimax really isnt going to have any thing to do with him connecting locally to a wireless router. The reason I mentioned WiMAX was because the extended propogation distance facilitates triangulation evasion because of the wider hypotenuse. ** temporary thread hijack ** Triangulation is a very poor method of discovering the source of emissions. Why limit yourself to three sample points? It works in theory because such calculations typically assume an empty environment, devoid of matter that could in any way obstruct the emissions. A much better way is to use many more sample points, and then use interpolation methods. That's how I did it for instance to discover the position of routers in a city environment, full of obstructive buildings. It's not hard to do, all you need is some GIS software to import that latitude/longitude/signal-strength data into. Getting that data is as easy as using Netstumbler + GPS. Using such a method, you could accurately be pinpointed. ** end hijack ** what's GIS software?; but anyway im more curious as to how to bypass this technique.
  18. how about not using DHCP at all.. if you guess the networks ip range which should be pretty simple just give yourself a static IP address. This way your computer will not apear in the dhcp list. well yes but it would appear in the rotuer's static ip page, the key here is to not make your node show up on any of the router's admin pages and perhaps not even on the ping sweep by getting your computer to drop the icmp packets or something like that. anyone knows how to do it?
  19. ok i dont see how this relates to triangulation but if youre conected to the router and you have the admin pass then you could always clear the client table. but the best thng to do would be to spoof your mac and or change your computers name to something simmilar to one of the clients already on the list. That relates to getting discovered that someone intruded on the network in the first place, but if i write a program to delete my entry in the dhcp clients table, won't i get disconnected? I was actually thinking something along the lines like making a fairly intelligent phishing page of the client table which hides my presence but indicates all other connected clients.
  20. yes, it is a most probable point of failure as data goes out unencrypted and any sniffing from the server's isp could compromise it, so does anyone know a way to bypass this weakness? or do i encrypt it through the anon/socks proxies?
  21. Using an unsecured wireless access point far away from home with a spoofed MAC address. And if you're really paranoid, throw Tor into the mix. If you're using a web browser, disable any browser plugins; Java, JavaScript, Flash, etc. Use SSL whenever possible. The most important thing is to use common sense. Oh, and you might find this FAQ informative regarding your original question. * HDD encryption with possible hidden volumes > * Live cd can be used when carrying out activities that require privacy > * MAC spoofing > * someone's wireless - reroute through someone's computer on the intranetwork and/or encrypted connection (can be VPN or ssh to prevent sniffing) to a trusted server on the net > * Tor network > * SSH server > * [Anonymous proxy chain can be added here] ok let's say i have already done all this in addition to using no script in firefox, what other advice can you give to achieve greater anonymity and privacy?
  22. So supposedly they know the destination node and i suppose they could get authorization from the destination server admin to sniff my traffic but if the admin disallows that, could monitoring be done on outgoing traffic without the server admin of the destination node knowing, say through carnivore of the server isp? Also, for securing both anonymity and privacy, what do you guys suggest?
  23. gentoo or customized slackware