Search:

Type: Posts; User: meloncholy; Keyword(s):

Page 1 of 3 1 2 3

Search: Search took 0.03 seconds.

  1. Replies
    25
    Views
    13,401

    Actually if you are talking types of DoS, you...

    Actually if you are talking types of DoS, you must consider all types....Including DNS poisoning, account deletion and something as simple as cutting power or impeding physical access to a system....
  2. Replies
    21
    Views
    25,026

    **Modderfokker: But in response i will still...

    **Modderfokker: But in response i will still defend saaying that even if a hacker did know this vunerability they have to get past your firewall (that u should have running) with a trojan sent to...
  3. Thread: Help

    by meloncholy
    Replies
    7
    Views
    5,903

    You should probably work your way up to "White...

    You should probably work your way up to "White Hat Hacker". Usually thats called a Pen tester. The best thing to do would be to get on a router team or something in networking. If you don't...
  4. For those Americans who are afriad of NSA....get...

    For those Americans who are afriad of NSA....get over it, they are not snooping on you, they have other 3 letter government agencies to that type of stuff...Those are the ones to be afriad of!
  5. Replies
    12
    Views
    8,912

    You say "get a security clearance" like its as...

    You say "get a security clearance" like its as easy as that. I myself have one, but was fortunate enough to have a technical job in the military that provided one to me. I now work in the DC/MD area...
  6. Replies
    28
    Views
    12,872

    I agree with a little of both....If the porpose...

    I agree with a little of both....If the porpose of ISOMEDIAs scans was to find SMTP relays and block them, I'm all for it. There are a ton servers out there with SMTP open, that allow relaying...
  7. Replies
    24
    Views
    12,247

    Haha...totally totally agree with you SDK....The...

    Haha...totally totally agree with you SDK....The goverment is a prime example of not staying current. They are in a phase of upgrading and "modernizing" to, get this, M$ 2000. And running Linux, are...
  8. Replies
    6
    Views
    4,273

    On a switched network try learning DSNIFF and its...

    On a switched network try learning DSNIFF and its toolset. It comes with ARPSPOOF and you can perform a man in the middle attack...(ie you will be spoofing the senders IP). You can modify the payload...
  9. Thread: Hacking

    by meloncholy
    Replies
    38
    Views
    24,388

    Better yet, buddy up and see if someone from one...

    Better yet, buddy up and see if someone from one of your pen testing teams or vulnerability assessment teams will let you go with them on an assessment. You can learn alot by just watching. I'm on a...
  10. Replies
    7
    Views
    6,924

    For MrFatal......Yes, router and firewall. Thats...

    For MrFatal......Yes, router and firewall. Thats whats called layered security. Depends on what you're defending really. If its private data that is confidential (like banks, law firms, ect...) you...
  11. Replies
    2
    Views
    5,052

    Agree, this is VERY basic stuff. I hate to say...

    Agree, this is VERY basic stuff. I hate to say it, but like everyone else says, type "subnetting" into Google. I am very surprised that if this is an instructor led class, he/she did not cover any of...
  12. Replies
    9
    Views
    5,607

    We've had to do this in the past as well. Like 4...

    We've had to do this in the past as well. Like 4 or 5 people already said. The "best" way would be a sniffer. Any sniffer will do, just write the output to a file then go back and look at all the...
  13. Replies
    40
    Views
    19,999

    My 2 cents on the subject..... Well I have a...

    My 2 cents on the subject.....

    Well I have a little of everything. Started out with a Sharp computer my dad brought home in 1984, then the commadore 128, then the good ol 33mhz DXII, and so on....
  14. Replies
    16
    Views
    12,035

    FYI - Another thread, also a link to another...

    FYI - Another thread, also a link to another thread in that thread....

    http://www.antionline.com/showthread.php?threadid=244043#post628451
  15. Replies
    11
    Views
    10,010

    Go and search alt.binaries.warez, or...

    Go and search alt.binaries.warez, or alt.binaries.windows. Newsgroups are your friend!
  16. Replies
    14
    Views
    10,014

    Re: Port Scanning

    Unplug your computer.

    Actually, people will scan, you can prevent them from getting any results, but you can't stop them from scnning. Its not that unusual to see scans in your log file. If you...
  17. Replies
    81
    Views
    51,712

    As a geek I'd say that was a pretty good...

    As a geek I'd say that was a pretty good description. I really don't get lonely, I can pretty much entertain myself for days (and I'm married). I do however get overworked, thats just because I don't...
  18. Replies
    12
    Views
    7,687

    ARRGGH....sorry, OK, what is the best way to...

    ARRGGH....sorry,

    OK, what is the best way to search this site to see if something has been posted. I always use the "search" field and I never seem to get back accurate searches. I searched "xbox"...
  19. Replies
    12
    Views
    7,687

    xbox hacking

    Has anyone been to http://hackingthexbox.com/ ? Mr. Huang is selling a book with xbox hacks and what looks to be general security type stuff. The original publisher backed out due to fear of the...
  20. Replies
    4
    Views
    9,702

    Is it a bad thing to actually show the "nuts and...

    Is it a bad thing to actually show the "nuts and bolts" of a buffer overflow? I was actually thinking as a part2 to this to show an outdated buffer overflow, the exact CVE# it went after, how it...
  21. Replies
    4
    Views
    9,702

    Buffer overflows explained

    If this has been talked about before, I'm sorry. I searched the site and did'nt see anything useful on buffer overflows, so I decided to write this up. I know when I first got into the field, buffer...
  22. Replies
    12
    Views
    19,431

    Yup, Ettercap would do the trick. Now...

    Yup,
    Ettercap would do the trick. Now that is one nasty tool!

    a little off this subject, but since you brought up wireless.....

    You can now buy jammers (a bit bigger than a bottle cap)...
  23. Replies
    81
    Views
    51,712

    Negged comments I have received: "**** ****"...

    Negged comments I have received:

    "**** ****" and other names not worth repeating
    "just leave"
    "you just don't get it do you"

    No, I don't get it? Why would you neg and not explain yourself....
  24. Replies
    12
    Views
    19,431

    Sorry I didn't see your Tut earlier Networker....

    Sorry I didn't see your Tut earlier Networker. That was a nice post! A bit more detailed than mine, but hopefully I got the point accross in this one as well. I did a search for "man in the middle"...
  25. Replies
    93
    Views
    224,805

    http://osiris.shmoo.com/ - Awesome free data...

    http://osiris.shmoo.com/ - Awesome free data integrity checker (like a free Tripwire) for Linux

    http://www.heatscanner.com/ - No one said it had to be free, but the best Vuln scanner out there...
Results 1 to 25 of 54
Page 1 of 3 1 2 3