Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - madf0x

Pages: [1] 2 3 ... 10
1
Hardware / Re: Troubleshooting help needed with new build
« on: November 29, 2015, 07:51:24 am »
Unfortunately seems like he hasn't logged in for almost a week now, so sounds like the mystery of exactly what was wrong shall stay a mystery to us.

2
Beginner's Corner / Re: DVWA Command Execution: Using What You Find
« on: November 27, 2015, 11:00:47 am »
Dude you have command execution.

Literally hundreds of different ways you could just setup a shell and call it good.

Stop focusing on getting the treasure, treat it like a normal box. You have execution, setup a shell or some means of persistence, THEN go goodie shopping.

3
Operating System / Re: what about Parrot security??
« on: November 26, 2015, 07:23:50 pm »
As always, bit skeptical over any sort of 'hacking distro', but there does seem to be some neat things worth checking out. Bit worrisome is the whole custom kernel aspect, cause that can be a good thing or a terrible thing and they have a bunch of custom tools and stuff on there. Thats neat and all, but that means taking more time to check through and make sure nothings suspicious.

I do approve however of some of their design philosophies. They want to emphasis on personal security with with option of everyday use, and has tools like 'Pandoras Box' to help prevent cold boot attacks, and AnonSurf to force all traffic through Tor. Thats oddly way more aggressive then most distros, in the sense that most other ones wouldnt bother because 'Its meant for professionals! if you are a professional why are you so worried about anonymity leaks that your clients aren't going to notice?' Havnt heard of either of those tools before either, so I imagine they are either some of the custom tools or just a case of there are way too many tools out there to stay in the loop with all of them.

I've been saying for years that professionals need to change they way to operate to mimic the tactics that real attackers use, and it SEEMS to be a sentiment they share.

All in all I'm interested in trying it out, but its gunna be a bit time consuming before I would trust it or would consider using it for any real project.

4
Just whatever you do dont make the primary difficulty be from 'being traced in x seconds' like every other game in the genre does.

5
News and Announcements / Re: Board restrictions to new members
« on: November 26, 2015, 10:26:59 am »
My guess is that most people are like me, they second guess and under-estimate how much they know or can provide, so they don't talk. Maybe its a fear of rejection by the forum members, or that the admins will get angry or something. I don't know. In any case, any lurker here should take this as a sign to share what you know with the forum, and if you can't learn something you can share.

Well that is why places like the beginner corner exists, meant to be a 'safe place' to ask all the stupid questions you please. Just try to check up on any existing topics first so you dont create the 100th topic on the same subject.

And no one ever has a problem with someone whose legitimately just trying to learn and can show effort in doing so.

6
Hardware / Re: Troubleshooting help needed with new build
« on: November 26, 2015, 04:29:04 am »
"exact same processor" if its the same processor one works the other doesnt, its not a chipset problem, his processor either got shocked while putting it together or was DOA to start with.

"So I swap processors between the machines and my machine is able to POST just fine with her processor but her machine does not POST with my processor."

You misread the post, the processor in question worked fine in his machine, both processors failed on the machine with issues. Ergo, the processor is not the problem here, either the motherboard is, or some unrelated issue is.

7
Operating System / Re: Partitioning Hard Drive
« on: November 25, 2015, 06:56:48 pm »
No not really, assuming you dont mind the risks of losing your recovery bullshit when you should be doing your own backups instead (pffft who does what they are supposed to do? What am I supposed to do, NOT precariously place my laptops on various high ledges?).

So yeah, you can (probably) safely delete those. However *STANDARD ANTI_KALI DISCLAIMER* Dont install kali. Go to any of the hundreds of other threads about kali to get a varied opinion on why.

I know you Evilzone, dont make this the third(fourth?) active Kali thread.

8
Hardware / Re: Troubleshooting help needed with new build
« on: November 24, 2015, 11:03:47 pm »
I second motherboard incompatibility, but it isn't over yet. What exactly is included in the build? Gimmie yo parts list

More specifically give us a pcpartpicker list.

heck it'll probably point out any compatibility issues you have before you can even give us the details :)

9
Hardware / Re: Troubleshooting help needed with new build
« on: November 24, 2015, 10:28:53 pm »
What's the model of the motherboard and the cpu? Assuming you have everything connected properly, it sounds like the motherboard simply doesnt support the chipset or whatever your cpu uses.

10
Hacking and Security / Re: Is it still possible to brute force online?
« on: November 24, 2015, 10:21:03 pm »
It's still possible but most places with even a fraction of a brain implement rate limiting of all stripes and colors, so your odds are stacked against you if thats your tactic of choice. Of course there are still plenty of second rate and obscure services out there that can still be attacked by brute forcing logins.

At least brute forcing logins are mostly dead. Obviously the concept of bruteforcing is merely a tactic used to solve a wide range of problems, and many of them are still very relevant to security.

Since you were talking about  email, I should point out you'd probably have a better time trying to figure out the password recovery security questions most email providers have, or just social engineer in some form the victim. Not even necessarily to get them to tell you their password, but getting them to click on some evil link of yours, run some evil executable of yours, or open some evil file for a commonly unpatched client software like adobe reader.

If you do really want to stick to brute forcing, youre going to want to at least establish that your tool or code can make a  successful connection first. As 0E 800 hinted at, for a lot of forms that may mean solving some captcha, especially if the service later detects the automated behavior (as you can imagine, some places like google are more on the ball with this). Once you can get a successful login to a test account, then you need to find the lockout policies, usually its some rate policies such as no more than 3 attempts within a minute, or no more that 10 attempts in a single hour, or both. Dont assume those numbers though, merely an example on my part. Once you know the lockout rate you can throttle your tool better, cause slow is better than not at all. Depending on your target, it may be worthwhile to instead try a small amount of passwords and attempt them on a range of accounts instead of hammering one at a time. In lax windows networks(talking more like a company intranet here) this can be a nice tactic to avoid a lot of newbie account lockout settings set in Active Directory(of course if its a lax windows networks, there are a lot of more standard time tested methods that dont rely on brute forcing :) )

Ultimately in my opinion, it takes far too much time and effort to get results brute forcing account info through some login form. If you're really committed you can eventually get some results but the way I see it its like trying to get inside a locked house. The front door doesnt budge so you decide to bash your forehead on the wall till you can make a hole to climb in, when instead you could have just opened a window.

11
Hacking and Security / Re: Hacking OS COMPARE
« on: November 23, 2015, 04:45:53 pm »
Friendly reminder the whole original part of 'hacking distros' is to provide a standard base for professionals to use. That way you know everyone on the team has the same tools, same environment, and depending on how rigorous your reporting format is, it saves extra paperwork documenting your environment.

Sure thats not the primary goal behind a few of the hacking distros out there but imo those one are misguided. For the sake of learning, building (and documenting!) your own environment does far more for you. I know I've learned a few interesting things simply by stumbling across half-forgotten articles, blogs, neat tools, etc by doing no more than finding the source of some BackTrack tools I liked for my own setup.

And obviously for your own non-work shenanigans, your own environment will always be better than some hacking distro simply because it is inescapably tailored to yourself. If you're willing to run the risks, nabbing the repos from hacking distros isn't that bad of an idea (until you 'sudo aptitude update && aptitude upgrade' and find yourself staring at a broken kali installation).

12
General discussion / Re: Anonymous declares war on Isil
« on: November 22, 2015, 11:35:58 pm »
I'm reminded of the darpa project I think HD Moore worked on to test new grant paperwork, was basically a wardialler on speed built for about 50$ that could call every number in a given country in less than an hour. There was some amusing speculation about how many bombs in development one could set off by hitting cell phone triggers early. How long semi-random country wide cell phone calls would terrorists stand before abandoning that trigger method.

Other than maybe toying with that, there really isn't much a hacker could do to truly damage an organization like ISIS without discretely handing data over to authorities and letting them make the judgement call.

Even something 'big' but misguided like announcing the locations of ammo depots and training groups could easily, and likely, turn into a case of 'we already knew about that, and thanks for giving the terrorists a heads up when we had an OP planned in three days when a high value target would have been inspecting the camp, yup, real helpful anon'.

People like anonymous dont realize that in a true information warefare its impossible to be an independent and successful third party. If you could there would be literally ZERO reason for the CIA/NSA to work with the GHQ on ANYTHING. In an information war if you have an enemy, you HAVE to side with your enemy's enemies or else you simply risk helping your enemy instead. At least, if you plan to take objectable action with the data you gain.

13
Hacking and Security / Re: HP ProCurveManager+ (PCM+) v4
« on: February 04, 2015, 12:29:35 pm »
Hahaha.. someone sold you PCM. That means you bought a dead horse :)
http://h17007.www1.hp.com/docs/products/eos/PCM_Plus_End_of_Sale_Announcement.pdf

No need to put any work into this.

If you need any help with setting up HP Networking devices or something related to PCM / IDM / NMM drop me a message. I could also offer to check your configurations if you want me to. Just let me know :)

Well the reseller apparently already fucked him, why not doubley fuck him?

Eh well, if his company still needs it, he still needs it. Could all be a ploy to get his hands on a good copy that he can play around with cause some target is using it, but didn't want to sound like an annoying skid asking about it. If thats the case I for one appreciate the effort in coming up with a story, and sometimes reversing dated software can be fun :P

14
Hacking and Security / Re: File size
« on: February 04, 2015, 12:00:37 pm »
1.1T is Huge. That file would cover every possible combination that regular people use for wifi and demonstrate to my friends how bad password they have.
I can delete 150 000 since I covered every year from 1900 until 2000. Plus I wanted to have all combinetions even smoler then 8 char. But I will add to script to remove every combination that have less then 8.
File have 45 000 lines only with names, surnames, middlenames and words that people generaly use. Everything else is birthday combinations and numbers with special simbols.

I literally can't think of a WPA implementation that would even accept password lengths of 7 or less, so if your focusing on WPA, you might as well cut those lengths out. Also keep in mind that many tools have issues with opening large files like that, so when you go to generate it, split it into numbered chunks so you can feed them into your tools incrementally.

File most def wouldn't cover every possible password used by regular people. More and more APs are setup with a default semi-unique password that you are simply not going to reliably get in a generated password list(outside of flukes or abusing vendor specific bad pseudo-random passwords). Just something to keep in mind. Not to mention as per WPA specification, the ssid is mixed into the crypto, making rainbow tables unfeasible except for some very common ssids, with that in mind remember that its gunna take some serious horsepower to power through a terabyte plus sized list.

You may be better off collecting a few different raw lists and mixing and sorting them manually, so that way you test real world passwords first. Essentially assume that if someone has been proven to use a given password once, someone else is using the same password elsewhere. Far easier to guess that then to try and generate a bunch of 'unique' passwords. Of course the exception being for targeted password generation. However, in the context of wifi security targeted password generation is only reliably useful against business, companies, etc that are more likely to standardize their passwords for easy employee use.  Home users are gunna be using either the default complex password, or using a common password you can find in other lists. Thats just assuming they aren't picking out good secure passwords in the first place.


All this being said, theres a good reason why a lot of serious wifi security research goes into avoiding passwords whenever possible :P or abuse implementations.

15
Hacking and Security / Re: HP ProCurveManager+ (PCM+) v4
« on: February 04, 2015, 11:37:48 am »
There is no Link on that page, you're not blind ;)


Here you go, thanks btw,


https://h10145.www1.hp.com/downloads/DownloadSoftware.aspx?SoftwareReleaseUId=9586&ProductNumber=J9756A&lang=&cc=&prodSeriesId=&OrderNumber=&PurchaseDate=

No problem, but no promises either.

Wound up downloading the 32bit version instead. A lot of oldie but goodie and reliable tools don't play friendly with 64bit. So it simply saves time and energy messing with a 32bit version. Just as a heads up in case I do make good headway.

Pages: [1] 2 3 ... 10