Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Melatonin

Pages: [1] 2
1
C - C++ / Re: C and C++ CheatSheet
« on: October 04, 2015, 05:32:25 pm »
Formatting the source would be nice.

2
Android / Re: Awesome collection of tools and resources
« on: October 02, 2015, 02:10:00 am »
Thanks for this, I'm mostly curious about the RE tools.

3
Hardware / Re: How to Convert a USB Charger Into a Tiny Linux Computer
« on: September 28, 2015, 10:11:55 pm »
Sticking the RPi into a charger, isn't it like too small or obvious ? I mean it's not the smallest thing or whatever. But seems like it's still a great idea ! Might adapt it

Your can try it with CHIP, it is smaller than the Raspberry Pi. Don't know much about it though.
https://www.kickstarter.com/projects/1598272670/chip-the-worlds-first-9-computer

4
I found this very interesting free book about reversing iOS apps.

Github: https://github.com/iosre/iOSAppReverseEngineering

I figured this would apply more towards the people in the Reverse Engineering section. My apologies if I am posting in the wrong section, feel free to move it.

5
Hardware / Re: How to Convert a USB Charger Into a Tiny Linux Computer
« on: September 28, 2015, 09:34:27 pm »
Ahhh, they stick a Raspberry Pi into a charger. Was confused when I first read the title. Seems like a nice project.

6
Beginner's Corner / Re: Python is good for hacking or Ruby?
« on: September 28, 2015, 09:29:02 pm »
Python is more faster than ruby and there are more libraries available. And there is a good book ( Black Hat Python ) which shows the real side of python, and I think it is advisable to start with this book first, do it perfectly and then move ahead :)

Black Hat Python is a good book for beginners, but I feel that it is not a light read for a total beginner.

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers is a much lighter read.

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python is a great introduction to Python as well.

7
Tutorials / Re: The Faraday Cage - A Must In Today's Society.
« on: September 28, 2015, 12:20:53 am »
My thoughts about this:


You believe that stuff is happening?

8
Tutorials / Re: The Faraday Cage - A Must In Today's Society.
« on: September 27, 2015, 10:43:57 pm »
This would be an interesting project, thanks for the idea.

9
so if i make a "unique" virus the antiviruses they will not caught them from the beginning ?

If the signature is not in the AV database it will not be detected. There are more things to consider though. Google around there are many papers online about AV Evasion, learn about Crypters. Hope your intentions ethical...   


10
In my eyes, I think the people that done this attack are pros, and in no way would do this cynical offense for just $500,000. If somebody would do it for this, then...wow. I am out for words

Apparently McAfee concluded that it was an insider attack done by a women.
Source: http://thehackernews.com/2015/08/ashley-madison-hack-insider-woman-job.html

11
Hacking and Security / Re: FB Social Engineering
« on: September 27, 2015, 06:57:52 pm »
Wow, never knew some people answered truthfully to those security questions...

12
Making it FUD would be the best route. Metasploit however has a script that disables any antivirus running that is in there list.

Take a look at it here: https://github.com/rapid7/metasploit-framework/blob/master/scripts/meterpreter/killav.rb

13
This is nice! Shame they did not record any lecture videos to go with everything else. Do you know if they will in the future?

14
Beginner's Corner / Re: Ìs reaver dead ?
« on: September 27, 2015, 07:52:22 am »
Development of the original has stopped. There is a fork of Reaver on Github.
https://github.com/t6x/reaver-wps-fork-t6x/tree/Big_endian

15
Wireshark and netstat are good, you can see all outgoing connections with netstat -nputw.
Also check out iftop and jnettop.

Pages: [1] 2