Jump to content
xisto Community

bombshop

Members
  • Content Count

    18
  • Joined

  • Last visited

  1. I will definitely recommend Slackware. If it does not suit your needs you can install DELI Linux which is a distribution based on Slackware. I have installed DELI ona a 486 box with 720 MB harddisk and 8 MB of ram. You will be able to use it in the command line but you can experience some slowing down in X desktop.
  2. I generally use this method to modprobe the modules so i don't really have to terminate the program. But let me make it clear, if i start a program editing rc.local i can't stop it with "kill pid" ??? hmm that sounds pretty awful in some cases but great for some other cases if you know what i mean
  3. Just beware that norton internet security slows down your system very much. so it is a con for me. Avast does not do the same. any con's for avast! ??
  4. Encrypting your folders and files is one thing but encrypting your wireless network connection is for sure another thing. Let me tell you one thing. Just listening to the network traffic i have one of my friends mail box and password INDEED OPEN!!! You know what that means? it means that i have an UNRESTRICTED ACCESS on the e-mail account that has been compromised! And let me add, i can read google mails that has been read by the "victim". just beware. And also i took me 31 seconds to crack a 64 bit wep key with nearly 300,000 iv's.For your attention..
  5. as you can tell unauthorized users using your connection is not the only problem here. For example if you choose capturing all the traffic (not only IV's) they can tell what sites you have been visiting. And as they capture all the traffic they can sniff your passwords or so.So be aware
  6. Sometimes you scan the neighborhood for the wireless connections, you see open connections but can not connect to them. Well this is possible because they use MAC filtering to secure up their network.I will try to explain how to bypass this protectionNOTE: This is for EDUCATION purpose only to show you it is possible to bypass this security. I am not responsible for unauthorized use of these information.Requirements :1- You need some tool for sniffing the traffic. I suggest using Aircrack-ng (http://www.aircrack-ng.org/)2- You need some tool to change your MAC address. I use MacMakeUp (http://forums.xisto.com/no_longer_exists/)Action On Windows:First you need to sniff the traffic around you. Open Airodump read the screen and make your selectionsFor me it is : Interface = 4 Intel Pro® Wireless 2200bg, Interface type =a , Channels=0 (if you want to sniff the traffic in all channels) , Output file prefix : Up to you!, Only Write wep IV's : y (This will save you some space) then proceedEdit: ipw2200 will not work under windows, i used an USR usb stick to capture traffic around.You should see something like this on your screen:BSSID, First time seen, Last time seen, Channel, Speed, Privacy, Power, # beacons, # data, LAN IP, ESSID00:**:BF:53:**:**, 2006-12-09 21:29:36, 2006-12-09 21:35:54, 6, 54, OPN , 13, 224, 62, 192.168. 2. 2, AIRTIESStation MAC, First time seen, Last time seen, Power, # packets, BSSID, ESSID00:**:F0:BF:**:**, 2006-12-09 21:29:39, 2006-12-09 21:35:40, 16, 79, 00:**:BF:53:**:**, AIRTIES It also logs the details to a text file in the same directory.This tells you that 00:**:F0:BF:**:** is the client connecting to that network so you can confidently assume that it is added on the Allow list. So open MacMakeUp, select your interface and enter this mac adress without the colons. click press and it will cycle your interface.Next time you try to connect to that network ends up with success :)In linux you can useairodump-ng -c 0 -w Prefix eth1this tells you to monitor all channels on interface eth1 and log them to a file with the Prefix after -wif you don't know your wireless cards interface type iwconfig or ifconfig -aConclusion :As you see it is possible to bypass this security precaution. And more important if someone monitors your connection they may be able to get crucial information about you. For example i can see what sites the network clients has been surfing around. MAC filtering must not be trusted for securing your network. You must use password protection in order to secure your network (preferable WPA not WEP, i will explain it in another article). So thats all for today.Can ISIKLI (bombshop)
  7. Ok here is my situation more detailed.I have installed links in my school shell account. also i can use ssh, telnet ftp from my account in my school[Home]-->[school]-->[Google:80] is possible using PuTTY so i want to tunnel my connection to google through the connection set up to my school using PuTTY.I set my connection up so that a dynamic port is added (for instance 3333) and the SSH session is up and runningnetstat -na does the trick and my local port 3333 is on LISTENING status.The question is, I am supposed to open the google front page with this tunnel but when i try it says DONE and shows me nothing. I suppose there is a problem with that tunnel but can not kinda figure it out.For tunelling the ssh connection is it necessary for the server i log in and the site i try to reach to be on the same subnet??It makes sense to be able to tunnel my connection to any ip using the connection set up to my account but it is not always about making sense
  8. For anyone interested in this topic http://www.opensourcecms.com/ will be a very good source. There are lots of blogs, CMS's etc. with sample installations.
  9. For the last couple of weeks i have been dealing with a worm. It copies itself to C:\Windows with the name bittorrent.exe. it infects any usb device connected to the infected computer and any computer you connect the infected usb to and so on. I downloaded F-Prot and updated it, it could not find the worm. I installed McAfee and updated the virus definitions to the latest release but it also could not find the worm. So i downloaded Avast! and updated the definition. Voila it found the worm and cleaned it up good. So i suggest avast! which proved me the "up-to-date"ness of itself. And also avast! is free for home users. Give it a try i say there is a 60 day trial if you want.
  10. I am planning to design a web site about computers and security stuff. I think the easiest way is to set up a blog so i am trying to find out which is the best.I used Wordpress and it seemed fine.So what are your favourites (cons and pros also)
  11. I have been reading about ssh tunneling for a while now but i cannot get it work. i have a shell account at my school (say me@myschool.edu) and i can use a web browser there (links). I am using putty as the SSH client. At my schools library i cannot use torrent programs or eMule as the firewall blocks the ports of them. The question is: are there any ways to bypass the firewall through my shell account and use the service as i wish? Here are some things i have tried: set port 3333 as dynamic and tried forwarding the port to https://www.google.de/?gfe_rd=cr&ei=BwkjVKfAD8uH8QfckIGgCQ&gws_rd=ssl then i made the connection to my shell acount and then in the adress bar of firefox i typed LOCALHOST:3333/ , it did not work As i used dynamic putty acts as a Socks4/4a/5 proxy so i take a chance to set firefox connect via proxy at localhost:3333 but it did not work either. Any tutorials, HOWTO's or suggestions and also questions are welcome
  12. Yeah i have been trying out easyPHP for a while now. It may not be up to date but it does the work good enough.Only one con (i don't know if it is a con or not but) i cannot change the state of register_globals.So i have to type--------if (isset($_GET['foo'])){$foo=$_GET['foo'];}else {$foo="";}--------it says they did it for security reasons so i think it is good this way. Just a little coding work.
  13. As this is the same kind of problem i went through under slackware i am going to explain the slackware solution of it :Pfor slackware 10.2;put your slackware 10.2 CD2 in your drivemount the cdtype pkgtool and install the alsa driverstype alsaconfit should try and detect your sound drivers. then select the appropriate driverthen use rexima (or your favorite mixer) to change the sound levels.try to play a media file.this should work fine for your sound card.
  14. If you have your kernel sources you can try and compile your kernel with usb support.Just install the sources then goto /usr/src/Linux then typemake menuconfigthis should lead you to the kernel options menu. Then find the usb support in the device drivers menu and build it into kernel.You can do it by pressing "Y" when the option is highlighted.If you want them to stay as modules but get usb support when you start your computer then you must modeprobe that modules on startup.You can do it by editing /etc/rc.d/rc.local open that file and write"modprobe modulename"this should give you your usb support on startup.
  15. I have been trying to use php on my computer but i cannot seem to get Apache2 work with PHP5.Apache works fine by itself but when i edit the configuration file, the server crashes upon restart. When i comment out the Loadmodule line the server works but without the php support.Any ideas, tutorials or suggestions?
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.