Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - null_scientist_44

Pages: [1] 2
1
Yes, That's why my question is more along the lines of what was actually acquired, and more along the lines of were the actual clients themselves compromised. Really it was a check to see if anyone knew anything more about it.

2
Anyone know what databases they are even getting? is it just whom downloaded it or the webui password databases.

https://torrentfreak.com/hackers-grab-deluge-and-qbittorrent-user-databases-151221/

3
Anonymity and Privacy / Re: vpn discussion
« on: December 04, 2015, 07:57:12 pm »
I use a combination of a home L2TP_VPN, set up with a *PI and a PIA connection. The Proxy is worth it for torrents, everything else is just cream. Android interface is awesome, and I have a lifetime account for TigerVPN, but they are a bit slower, and I'm still not sure how much I trust them..

4
General discussion / Re: Lets talk about names?
« on: December 04, 2015, 07:50:26 pm »
...it's just a name I pulled out of a hat...

5
Anonymity and Privacy / Re: Windows 10 Leaking DNS Requests Over VPNs
« on: November 17, 2015, 11:34:35 pm »
Didn't ever get a chance to read this article when it hit my RSS reader the first time. Thank you for posting about it on here.

6
General discussion / Re: Anonymous declares war on Isil
« on: November 17, 2015, 03:27:46 pm »
I have to say, I would hope that they could do something. I agree with Phoenix though, Nuke the fuckers. End this dumb 'war on terror' and bring about a new world order..I mean *cough* fuck them up!

7
Hacking and Security / Re: XMPP still compatible with facebook ?
« on: October 26, 2015, 12:08:42 am »
There are several Third Party Pidgin plugin's from there web page. I've Googled it for you.

https://developer.pidgin.im/wiki/ThirdPartyPlugins

Edit: I felt like looking for you further so that future generations might gain benefit.

https://github.com/jgeboski/purple-facebook/wiki

Not my work, but is designed by James Geboski (or so it says on the page) This is for Pidgin.

8
Hardware / Re: Recommendations for Android Phones.
« on: October 20, 2015, 06:45:16 pm »
Nexus devices as a whole are good for use, Honestly the 'phablet' is a form factor that probably will stay until we have the 'eyePhone' from Futurama. I myself have an N6, and just use a BT headset to talk on it.

The Nexus line also makes life easier for Rooting and putting your own OS/Firmware on it.

9
Hacking and Security / Re: Great links/tools to learn from
« on: October 20, 2015, 06:42:34 pm »
Looks like site is down, I'll look for a few days and remove it after that with an update on the bookmark pack. Seems to be mis-configured apache...

10
it really is, I'm almost done with it, and expect to finish in the next few days. You are correct though, I know probably most 'hackers' at this point wouldn't really go to the effort he did in evasion. He does however show that he really was fully learned by the time he's on the lam.

I hope one day to go to a conference and meet him, just to have a picture with a hero :)

11
Hacking and Security / Re: Great links/tools to learn from
« on: October 07, 2015, 12:04:23 am »
Hey, I made a sort of customized version of this, figured I would share with you. No credit wanted or taken.

bookmarksv1.0.html

12
Beyond that there is:

Exploit-db.com
http://www.securityfocus.com
and
https://packetstormsecurity.com/

Edit: Thank you for CVEDetails btw, hadn't seen this one in A LONG time!

13
That's very true Darkvision, There's still a reason to comb through old stories like this, and the next one I'm going to be on to after I finish which is 'Exploding the phone' Old phreaking techniques are amusing to learn about before getting into the extremely high tech of today because social engineering still works, Kevin funnily enough makes enough of a statement about it in the book.

"People are willing to help those that they feel are authenticated and in trouble" it's why social engineering works period, You can call up certain places and with a certain degree get free food if you ask nicely and are not a total DB about it, which in some of the instances he describes the usage of calling up and getting access to internal SSA database, even though he never Actually had hands on nor broke into it, just by talking to 'Ann'.

14
Operating System / Re: NeoKylin Operating System
« on: October 01, 2015, 09:28:37 pm »
@ptales: It looks like it's related to word, here are the formats supported. This seems more like a Version of Word than Open Office, but it does support the LibreOffice formats. EDIT: It's called NEOShine Office



Here's the new page screen:



@0E 800
I haven't seen anything in scans (Symantec "works AV" and Microsoft) and nothing appears from any known Rootkit, or Rootkit behavior after installing it. That being said, I would say it's totally plausible for them to have thrown something sneaky in.

15
I bought and played this with the foreknowledge that this game was going to be much like Uplink. I was not surprised that it was, and did enjoy it quite a bit honestly.

If you want more realistic games, I know there is a debugging game online that lets you 'break into' vaults but there's also TIS-100, which teaches a Form of Assembly code to rebuild a BIOS on a 'TIS-100' computer.

Loved the jokes in Hacknet leading back to both 1337x4 and Steve Jackson games.

Pages: [1] 2