Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - GoldDust

Pages: [1]
1
General discussion / Re: TOR exit node raid
« on: November 16, 2013, 12:49:09 am »
Old news indeed.
If TOR wasnt completely flawed I would probably run one, Im probably igorant, lies in my nature :P

Why do you say Tor is flawed? There are vulnerabilities, yes. But I don't find it to be flawed. Just as long as your maintain basic OPSEC you should be fine. Even with the Edward Snowden/NSA revelations slides have shown that the NSA can't even fully break Tor. Please let me know how Tor is flawed...

-GD

2
General discussion / Re: Bob against G+ on youtube
« on: November 16, 2013, 12:43:54 am »
Never cared about the comments, won't start caring now. Even when I am on youtube, I'm there for the video, not the degenerate flame wars and usual spam. It's the obligatory G+ account that's been bugging me.

I don't like having a Google account associated with my YouTube account! Not cool. I feel like I've lost some security. Ugh. -GD

3
Projects and Discussion / Re: Web tracking?
« on: November 16, 2013, 12:35:23 am »
I don't want to be a skeptic, but there are people who learn tracking techniques not to help capture pedophiles. Instead, they use this skills to blackmail pedos to give them money. I remember reading something like this is some forums in the past and they have a term for it, but I can't remember it.

What they do is simple, they act as an underage child and they upload a cam show of little girls and display is if they are the ones doing it, and then they request the older male to expose himself. After that they pretend they are cooperating with LEA and they demand money, or they will hand the videos to the FBI or any other LEA. Eventually and usually the blackmailed individual pays the required money thinking this will make him avoid at least 10 years in prison.

The point here is that we don't know for sure your real intentions, and what makes me more suspicious is that your position in what you've claimed a forensic company, doesn't indicate you are related to tracking pedophiles, judging from the fact that this job is mainly intended for people who are specialized in computer forensics, not software engineering. In addition, you should be knowledgeable in digging up information since your major is related to softwares and computers in general, yet you choose an underground forum for to ask for assistance. There is something fishy about you.

I agree with you. I'm not sure if this guy is actually extorting or blackmailing people but it sure is skeptical. He has a jump team in place? This sounds like vigilante justice and lots of the time that doesn't end well. Anyhow, best of luck mate. -GD

4
Hacking and Security / Re: Presentation for Cyber Crime 101 course
« on: November 16, 2013, 12:25:51 am »
As much as it'd probably be fun to actually hit a target with a real exploit, it's unlikely that an academic institution would allow you to do this. Why don't you just do a setup? Setup a fake website and make it exploitable. Then just hit it with a SQL injection and have it barf out a bunch of fake CC#? Super easy and you'll look kick ass. -GD

5
Hacking and Security / Re: Stuxnet in Russian nuclear plant
« on: November 16, 2013, 12:12:25 am »
From what I've collected, yes this was a targeted attack and Stuxnet is very active in the wild. Stuxnet is actively deployed via USB drives. This is the infection/attack vector. Perhaps this Stuxnet was planted before the Iran attack?

Either way, this was a purposeful plant. Stuxnet doesn't spread like normal malware, it is targeted. Interesting. -GD

6
Tutorials / Re: Penetration Testing Biometrics Systems
« on: November 15, 2013, 10:07:35 am »
Thank you for the tutorial! Another good resource on bypassing biometric security can be found here:
http://dasalte.ccc.de/biometrie/fingerabdruck_kopieren?language=en

-GD

7
Tutorials / Re: Analyzing Malacious Malware Embedded in Adobe PDF Files
« on: November 15, 2013, 10:05:22 am »
Great tutorial. Thank you!

-GD

8
Anonymity and Privacy / Re: [EvilTutorial] The Art of Anonymity
« on: November 15, 2013, 09:57:35 am »
Great tutorial, Lucid. Thanks for the post. I know I should search, but would anyone be interested in an I2P tutorial?

-GD

Pages: [1]