Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - pebcak

Pages: [1]
1
Hacking and Security / Re: GPU Malware
« on: May 13, 2015, 03:26:55 pm »
I seen a Windows PoC like 2 years ago lol

Well then. With 2 posts to his name, he has shit on 2 people.

Dearest Reverend, I too would love to see from what source you reference. After all, criticism without the goal of resolve is just another way to waste oxygen and electricity Ж)

2
Hacking and Security / Re: Linux RAT
« on: May 12, 2015, 04:13:41 pm »
HA!

I must have been blasted out of my fucking gourde to post shit like this.

The correct answer to my question was, "Don't run *nix as a host machine...ever, you fucking fuck."


3
General discussion / Re: Mental illness?
« on: May 12, 2015, 03:52:12 pm »
does anyone have a mental illness hear ? also have you ever been to the psych ward?

What exactly do you want to know?

4
The problem with tor - and i think most people recognize this now - the exit nodes are in a position of trust. Do you know/trust the exit nodes? They may not know where exactly the request originated - but they can record any traffic that has an unencrypted end point (as in, not using https). im sure they can also do other shit with the encrypted traffic that may leak useful information but you know the government... theyll find a way.

There is no "trust" in Tor. That's the point. And don't give too much power and mysticism  to the "enemy". Anyone can jack up Tor. Read. Learn.

## Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf

## Locating Hidden Services
http://www.onion-router.net/Publications/locating-hidden-servers.pdf

5
I've used TOR before.
 I think your looked at like a "Alien"  because ToR is used by people trying to hide there browsing activity
(Which usually means , 'They are involved in some bad shit' ..Peado's, Hitmen, Drugs...etc.
I only ever came across 'nasty sites'.
If you know some good (Nice) sites post the address's here..

Wow. I'm late to this party. This ^ is wrong. And it's "Tor". The good Tor provides isn't documented because THAT WOULD DEFEAT THE PURPOSE. You don't hear about the Azeri journalist who sent the details of her investigations via The Onion Router. The shit you see on the Hidden Wiki is just that. And I hate to break it to you, but the "real" Internet is just as poisoned as the "deep web" is (good god I hate that f**king word).

6
Hacking and Security / Linux RAT
« on: February 28, 2014, 04:13:53 pm »
Looking for ideas on implementing a RAT, allowing access to my Ubuntu machines in case of theft, and/or just for giggles.

I have a domain ready to go, but I have no clue how to go about setting this up.


7
Hacking and Security / Re: Presentation for Cyber Crime 101 course
« on: November 12, 2013, 12:55:27 am »
the professor shot down my arp spoofing demo :(

8
Hacking and Security / Presentation for Cyber Crime 101 course
« on: October 08, 2013, 01:40:10 am »
I'm going to do a guest presentation for a college level course -- an introduction to cyber crime. It'll be later in the semester; so the students will have more of a basis for my content.

My presentation will include a few examples of prominent malware and groups involved -- some BHEK and infection vectors, ChronoPay / Glavmed feud, underground economy and forums, etc...

But I'd like to do a basic demonstration -- some act of hacking that will strike fear into the heart of a college freshman. Do you all have any ideas or suggestion? Any here want to contribute?

Thanks!
-pebcak

Pages: [1]