Search:

Type: Posts; User: whistlersec; Keyword(s):

Search: Search took 0.03 seconds.

  1. Replies
    11
    Views
    8,689

    Well, I have the books, pretty much all the books...

    Well, I have the books, pretty much all the books I need, but in which way would you guys go about taking in all this information? Should I start with C until I am an expert, then move on to to...
  2. Replies
    11
    Views
    8,689

    how to get to that next level

    Right now Im fairly proficient in most facets of what I need to be to become a good pentester. I have the basics of C, networking, cisco etc down. What steps would you take, adn what would you guys...
  3. Replies
    12
    Views
    10,037

    correct me if Im wrong

    I think what Bio was reffering more too is not so much why/how/etc microsoft has so many exploits, its that hackers tend to snicker and sneer when a MS exploit is realeased, but act like *nix has...
  4. Replies
    1
    Views
    3,758

    hotmail note?

    From : internet email service <smtpautomat@freemail.com>
    Sent : Thursday, February 5, 2004 1:26 PM
    To : " " <receiver@homeserver.net>
    Subject : Error Report

    MIME-Version: 1.0 ...
  5. Replies
    11
    Views
    3,677

    First off, I am not a newbie, I dont post much so...

    First off, I am not a newbie, I dont post much so you may not know that, but I have been around AO for about 6 years (previously Darqw1nd), anyways I was not too sure where to post it, but it was...
  6. Replies
    11
    Views
    3,677

    You know theres something wrong when....

    I was doing a search on google for installing phlak to a HD (still havent found an answer, I dont have the CD yet, any links) but I DID find this little gem, you know there is something watered down...
  7. If you really want to scare the guy write a...

    If you really want to scare the guy write a script to scan the IRC net's for that adress, whois the guy, and do some recon on him by joining the chan if you do find it....
  8. Replies
    1
    Views
    7,025

    edit n/m

    edit n/m
  9. Replies
    1
    Views
    7,025

    cryptophone.de

    I was listening to Off the Hook today, either 12/03 or 12/10 cannot remember, and they had a guest on who helped develop a secure encrypted cell phone (gsm), they retail for about 2500-5000 dollars,...
  10. Replies
    23
    Views
    13,198

    Also check /etc/inetd.conf for any abnormal entry...

    Also check /etc/inetd.conf for any abnormal entry that uses /bin/sh as its program etc....possibly looking for lkm rootkits as well
  11. Thread: Net Gone

    by whistlersec
    Replies
    10
    Views
    7,371

    define net

    Are you just looking in the webbrowser, or are you trying to ping ip #'s, could be that your dns is messed up.
  12. the first thing that came to mind...

    when i read the message, i immediately thought of nmap's idlescan fuction. http://www.insecure.org/nmap/idlescan.html check the egreess filtering under idlescan challenges. It kinda of makes sense...
  13. Replies
    19
    Views
    11,144

    type: ifconfig eth0 192.168.0.1 up...if you get...

    type: ifconfig eth0 192.168.0.1 up...if you get some type of error code, you need to load the correct module....if you have no idea what module to use, cd to your lib/modules/net dir and just try...
  14. Replies
    7
    Views
    5,790

    Fellas, long time reader, first time poster. ...

    Fellas, long time reader, first time poster. That my friends is a core dump. Nothing else,
    no irc trojan, worm, etc. Basically what that is: you know if netscape etc crashes they want you to...
Results 1 to 14 of 14