Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - lolwut

Pages: [1]
1
Most likely NSA (or related state agency) has control of more than 50% of the exit/entry nodes. It wouldn't be too expensive to do.

So just from statistics over the long term they'll be able to use timing attacks to figure out who's been posting where there.

2
Projects and Discussion / Re: Is this a realistic project for a n00b?
« on: October 05, 2015, 10:38:00 am »
Database (MongoDB) + some web design  (JavaScript/HTML5)+ REST API + mobile app development (Objective C)+ data scraping/ data mining (Python maybe)

Maybe too much for an absolute beginner but you could easily get there within a year.

Look at some MOOCs like from Coursera and MIT. Maybe google some web design courses from Udemy and database stuff from an online training program like LiveLessons.

i.e. You'd want to look at resources into becoming a full stack developer - plus some Python or Ruby for scraping.


3
Depends on how accessible the information is in the first place - in the USA virtually impossible since there's so many private databases you'd have to go through.

Somewhere like Africa - definitely possible. But 'scrubbing' isn't as effective by itself without having a 'new' identity. Combine the two and you have a good shot at being an unknown. Now if you're on an Interpol blacklist then no way in hell - in that case the trick is to scare/bribe the daylights out of a country so that they effectively give you safe harbor - think of El Chapo. No sane person is going to stick their neck out and report him even if he were in public dancing around naked with his wanted poster tattooed on his chest. if the risk is having your entire family tortured and killed (if you're lucky) in unimaginable ways.

Disinfo works to make it harder to figure out - but with the power of google's date selection they could easily just pick an earlier point in time and have the actual info at their fingertips.

4
Beginner's Corner / Re: What to look for in a nmap scan ?
« on: October 05, 2015, 10:11:05 am »
The main thing is to look at what ports are open, and what ports are not open.

This can give you an idea of what sort of person has configured the machine - if it seems that FTP, SSH, TELNET are all open on one internet facing machine on a interesting target you might either have an extremely incompetent admin or more likely looking at a honeypot.

5
Operating System / Re: Win 7
« on: October 04, 2015, 11:57:58 am »
My wife's laptop runs win7, I tried to do an upgrade to 10 but it says that I need to install SP1 which it has.  It also has an issue with its updates.  Any suggestions welcome.

Does she really need Windows 10?

Does the laptop have drivers for windows 10?

Is the laptop BIOS or UEFI?

All these things need to be considered prior to going to Windows 10.

Oh, and are the specs for the laptop decent enough - I hope it has an SSD at least!

6
Beginner's Corner / Re: Truecrypt Issues
« on: October 04, 2015, 05:21:06 am »
I would like to go back on topic and say don't install those on your HDD - install on a flash drive... when will people finally realize that Kali or other "hacking" distros are not meant to be used as a primary OS or even installed on your drive to dual-boot.

Or use a VM so when you inevitably break something by a crappy multiarch package you don't have to wipe the flashdrive and wear down the cells.


7
Beginner's Corner / Re: Any way to practice Xcode on a PC?
« on: October 04, 2015, 05:11:39 am »
Finally, if you want a piece of advice i guess you should just start with python3 (Note: i'm a java dev) there are books on it in the ebook section

No, start with Java if you want to move to Objective C eventually.

Or better yet (assuming you have no programming experience) start with going through some courses the following topics -

Discrete Mathematics - http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-042j-mathematics-for-computer-science-fall-2010/
Intro to Computer Science - https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
More Into to computer science (Object Oriented stuff) - http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-00sc-introduction-to-computer-science-and-programming-spring-2011/Syllabus/

After that you should be fine for any language really.

8
Hacking and Security / Re: trying to collect all my modem's files
« on: October 04, 2015, 04:53:28 am »
hypothetically speaking let's say i was able to modify the modem's firmware. how exactly would that help? what information are instored in a modem's firmware?

unfortunately i didn't find much data about my modem's model i could exploit. by the way here are the specs:

Modem brand:      D-Link
Modem model:      DSL-2730U
Firmware version: ME_1.07
Firmware date:    Fri, 19 Jul 2013 18:33:21

                       brand             model
Processor       REALTEK         RTL8672-VE-GR
ADSL               REALTEK         RTL8271B-VR-GR
RAM memory      Hynix           HY5DU561622ETP-5
Flash memory    MXIC            MX25L6445EM2I-10G

You're talking of uncapping - https://en.wikipedia.org/wiki/Uncapping

I don't know for what sane reason you're trying to do that for - but you're probably going to have your internet terminated for it.

You'd probably have better luck at a forum such as haxorware for this sort of thing. And you'd want to use a Motorola modem. Nowadays, you should be able to get unlimited internet anyways, and I was saving this for the end but you can't uncap an ADSL/2 modem - the speed is more due to the physical distance/condition of the copper to your house/unit. So get cable/fibre.

9
How about "TCPDUMP" ?

Tool for different purpose (that's for analyzing packets in general, not really for detecting sus stuff unless you're going to grep it) - you want to use SNORT but note that you won't detect passive sniffing only active (you shouldn't be able to detect passive sniffing since that's the entire purpose of passive).

10
I wonder if there is a textbook or something for the courses. I found nothing on torrent sites so I thought I ask it here .. maybe someone knows something ..

Good luck... The people taking these sort of courses aren't going to upload something that would advantage other potential replacements for them.

Also a lot of it is also being able to ask something right in front of you rather then looking at a few tomes for a few hours to figure out something that could be answered in 30 seconds.

If you do manage to find a copy of the notes then please share - but I suspect that there's some NDAs being signed, and I believe (not sure if true) that in the advanced training there's an actual 0-day/s used. I wish some people that have done the course/bootcamp recently could share their experiences.

11
Hi;

ive played so many games and i think that all of them have hackers.... for instance crossfire, combat arms, counter strike, even metin has hackers...

Can someone tell me why league of legends is not as hackable as these other games.



Thank you,

if this question bother you in any single aspect, im sorry, my only wish is to learn more;


By Nizzel

I'd assume most of the variables are also stored server-side, and that any sort of hacking would be extremely obvious since everything in the higher tiers would know the damage formulas and could easily notice that suddenly hits 10K at lvl 1.

The skins are all stored server side imo.

Pages: [1]