nightfox

Members
  • Content count

    20
  • Joined

  • Last visited

  • Days Won

    4

nightfox last won the day on May 9 2014

nightfox had the most liked content!

Community Reputation

1 Neutral

About nightfox

  • Rank
    SCRiPT KiDDie
  1. Another option might be so spoof someone elses MAC on your node and apply it to a hacked modem. Then you'd be going through the ISP with someone elses profile. More convenient than stealing WIFI if you plan on doing bandwidth intensive work. It can be done easily using a cheap blackcat modem. This used alongside Encryption + VPN + SSL might do the trick! Blackcat Modem http://www.tcniso.net/
  2. I moved the cygwin1.dll that comes with hydra to the /bin/ in cygwin. Now when I do ./hydra the command options come up. So I think it works, will test it out a bit. Sorry for the double post.
  3. Hello, I'm trying to run hydra in cygwin. I am having trouble compiling it. Not sure what cygwin directory to place the hydra directory in. I tried moving it around all over the place, /usr/bin, /usr/tmp, etc... When I start cygwin, I go to the above directories and ls and see hydra but when I try to go into the hydra directory it says: no such directory also, when I do ./configure make it says: no such file or directory I'm using cygwin 1.5.24-2 and hydra-5.4-win Can someone please explain how to get hydra working in cygwin. Thanks
  4. What about this device here? Seems like we can use it to capture the data. Its a little pricey but if we could get some direction I don't mind grabbing it. http://www.ers.fr/Sagem/OT460%20data%20sheet_0605312.pdf We really need some cellular techs to help us out. If we're gonna really make this happen, we have to start assigning tasks. Its definatly not a small project.
  5. Joined their mailing list. Let's see what they have!
  6. Thanks for the links kenetik, those devices seem interesting. I'll contact the manufacturers to get more information on them to see if we can put them to use. Here are some more links: general GSM info http://www.iec.org/online/tutorials/gsm/ GSM interception http://www.dia.unisa.it/professori/ads/cor...sec/netsec.html If anyone has any information, PLEASE share!
  7. It would be great if we could get some information from the guys that did this at Defcon. Instead of having to completely re-invent the wheel, we can use their info and add to it. I searched the Defcon site and googled for anything relating to their project and found nothing. Anyone have contact info or a link for these guys? Thanks
  8. Hello everyone, I've been doing a little research in the field of GSM sniffing and cryptography related to cellular networks and have taken an interest in a device known as an IMSI catcher. This device is used to intercept/record/jam GSM cellular communications. There are several devices being sold commercially, however they are only offered to LE/ Gov Agencies (large corporations also use them for corporate espionage). The price of these units is upwards to $500,000 USD. Below is a sample of a commercial IMSI catcher: http://www.cellularintercept.com/pc-14-1-c...ercept-gsm.aspx I would like to research this technology and build a unit that has all the capabilities of the commercial products. Once the project is complete I plan on providing a step-by-step tutorial on how to build an IMSI catcher using compnents readily available to the public. My budget for a working protoype is 15-20K (R&D + Parts), but the goal is to design a unit that a hobbiest can build for under 5K (if possible). I am looking for people that have experience in the field of cellular communications, cellular cryptography and general electronics. I have no problems communicating the entire project through this thread, as the end result is to make our findings available to the community. Anybody that wants to learn about this technology, please feel free to participate. A brief explanation of how an imsi catcher works can be found here: http://www.cryptophone.de/qa/intercept/index.html Basically its a man-in-middle attack where the unit mimics the cellular network's base tower. Once you can get the phone to connect to your base station, you can sniff the information but in order to keep the call alive you must re-transmit the signal to the networks real tower. To do this I read it is best to use a repeater, ones that are commonly used to eliminate network dead zones. So basically the data comes in through a reciever that mimics the cellular tower, goes through preselector/combiner, data passing through is monitored by a laptop or PC, and the signal is then re-transmitted to the real cellular tower. So, first of all we have to find a machine that can mimic a base tower. Something that is reasonably priced and available to the public. The links below show two units that are commonly used for testing GSM equiptment. Typically SIM cards with no network codes are inserted in the phones and the phones are forced to connect to these virtual netwoks for analysis/debugging purposes. These machines are said to be programmable where you can enter the network codes of a (real) GSM network and mimic base station. The receiving range of these units are low so we would need to add juiced up antennas to increase our range. CTS65 http://tinyurl.com/c7l4r 4100 Mobile Fault Finder http://www.willtek.com/english/products/tt/4100 I am trying to peice together as much information as possible. My first goal is to figure out exactly how the base stations work and how to obtain network codes for GSM networks. Does anyone know of any solid resources on this topic? Also has anyone worked with the test devices mentioned above? All feedback is GREATLY appreciated.
  9. Thanks
  10. I did a search on the forum for CONs or meetings in Canada with no results. Anything going on in Toronto specifically? I would love to be a part of it.
  11. Try sending her parents a Trojan. Or wait for the next 0Day. LOL
  12. From hamachi website: Correct me if I'm wrong, but what I understood from the site is that although they cannot decrypt/read the traffic between two peers, they can trace your location. So if prompted by Gov or LE they will most likely give up that information. Good for hiding content of communications but not a solid method to hide location.
  13. It's probably a ghost server running on your network, probably fully encrypted. My guess is it might be used for VPN or Warez. Good luck gaining access, try finding the partition the OS is on and format it.
  14. What about tunneling through PPTP VPN, is the traffic encrypted on both sides of the VPN server, or only between client and VPN server. Also, is it possible to tunnel into a VPN using TOR, to protect against DNS enquiry.
  15. I've never heard of ATM's with built in WIFI. I've seen Interac terminals with wireless PinPads that are encrypted. Isn't it standard architecture to have all the data encrypted before transmitting out of the ATM, to avoid any sniffing. Transmitting in plain text sounds unreal to me. Edit: Added a very interesting link on the topic, for those who are interested. http://redtape.msnbc.com/2006/11/researchers_who.html