Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - FractalInsanity

Pages: [1] 2
1
Hacking and Security / Re: Methods of Email account penetration <==3
« on: November 13, 2012, 12:13:54 am »
Oy vey. so nothing groundbreaking huh? I was hoping for some highly skillful method. I suppose it is something email providers focus on more than anything so would be difficult, thus, making a trap for user is best way.

2
Hacking and Security / Re: Methods of Email account penetration <==3
« on: November 11, 2012, 11:24:08 pm »
Ah ic!


Thank you, although I don't know if proft is meant to mean profit (which still doesn't make sense) hmmm....

3
Hacking and Security / Methods of Email account penetration <==3
« on: November 11, 2012, 10:56:52 pm »
jk with subject hehe. What is the most effective and direct way to gain user level privileges to a chosen email address.


Methods I am already aware of:


1)Phishing:
  a)Links
  b)Attachments


2)Brute force doesn't work nowadays.


What are some others? There has to be something other than phishing with links and attachments (just sketch and lame).


I would love to hear some creative answers?!


 

4
In other words,
Start with network admin lol

5
Hacking and Security / Re: Article for PenTest Magazine
« on: July 16, 2012, 04:06:51 am »
If anyone is starting any projects, especially regarding network apps, I'm interested....


Most people in pentesting security don't think those in the underground are "script-kiddies". It's often a function of political stance. A lot of security pro community, especially ones who do work for government, are into law enforcement/good guys and think hackers are incompetent, just by the fact they aren't doing what they are (in terms of risk and where they are in the power structure/system).


6
Projects and Discussion / Re: Proxy Tool kit [Test]
« on: July 16, 2012, 03:23:10 am »
Down to help :)


Source code?

7
Thx for your responses....I guess I could have communicated a little more efficiently lol


Anyways, I read through Nmap and learned a lot, in addition, that Fyodor is hardcore with Nmap. I wouldn't have guessed it was written in LUA.


Is Lua the most efficient language to write network apps in? I originally wouldn't have guessed so but finding out it is based on C....maybe it is? C is amazing for hardware specific tasks/embedded system....

8
Hacking and Security / Using NMap.....mass port scanning question?
« on: July 15, 2012, 09:37:18 am »
So the app is pretty straightforward, however, I'm curious if you wanted to scan multiple hosts non-stop in succession rapidly would you have to write a program to rapidly inject inputs into the scan query? Is this a lot more doable when using linux than windows?


How would one go about this.....I'm know how to use Nmap,  as it is pretty clear, however I know you can scan insane amounts of ip's and curious how you would do it if you wanted to?


Thx guys as usual,
FI

9
Assembly - Embedded / Re: Learning Assembly
« on: July 04, 2012, 01:28:53 pm »
is dealing with assembly essential to hacking/effectively manipulating the machine....


I'm going completely high-level pretty much.....I would take a wild guess that OS's are generally coded in C-based?




10
Other / Re: Where to get IDA Pro or other Decompiler?
« on: July 04, 2012, 01:25:25 pm »
Sweet sauce!

11
Other / Where to get IDA Pro or other Decompiler?
« on: July 03, 2012, 02:24:18 pm »
I've been trying to find a great decompiler.....I been working with this malware analyst text and pretty much I need IDA Pro for it but looking online it is mad expensive.

I'm a math/sim/modelling guy and can't afford this right now....

Anyways, can any of you guys advise/recommend (or means of getting something of) a comparable substitute. That is free or cheap or cheaper than IDA pro (hundreds of dollars!).....It looks amazing though and I'm tempted but you know how that goes...

Thanks guys!
Feel free to ask me anything btw (pm etc)

12
Operating System / Re: BT5R2
« on: June 29, 2012, 08:56:27 am »
What I meant is if I download R2 will it update itself....or will we have to go to their website to download/apply patch?

The 0day patch I guess is in wicd. Here is the exploit/patch in python:

http://www.wiztechie.com/2012/05/backtrack-5-r2-wicd-privilege-escalation-exploit-and-patch/

13
IRC also altho I'm trying to make/use something other than ssl...

SSL has seemingly has weakpoints....whether the weakpoint can be applied to IRC I don't know?.....ssl uses same encryption protocol repetitivelyso that if found makes every transparent. Check this out, this is project of Moxie Marlinspike:
http://www.youtube.com/watch?v=ibF36Yyeehw&list=FLRJCD91PGtJtjJ18BwvejfQ&index=21&feature=plpp_video




14
Operating System / Re: BT5R2
« on: June 29, 2012, 07:13:22 am »
I haven't used R2 yet, I'm avoidant: I hear it has a major bug in it. Have they patched?

15
Operating System / Re: Best linux operating system?!
« on: June 29, 2012, 07:07:41 am »
Get used to compiling

scratch that lol newer distro (therefore) Arch

Pages: [1] 2