-
January 28th, 2004, 03:05 AM
#41
well, at least we got to chat about an interestig topic for a while, but yes, time to end this thread I think.
Quis custodiet ipsos custodes
-
January 28th, 2004, 06:08 AM
#42
Hell, I'll do it just to keep this guy from learning anymore than he already has about hiding his intentions.
He's so 3l173 that he had to ask us.
Note to Moderator....Thread Closed
Thank you very much and a nice day
-
January 28th, 2004, 03:33 PM
#43
Senior Member
if theres a LAN it is for a purpose, and I agree the n/w administrator has the full right to know what is going on in the network.
Now is the moment, or NEVER!!!
-
January 28th, 2004, 05:25 PM
#44
This is my point: If you do not own the system, and the system belongs in a LAN, no1 has any business installing trojans, modifying anything or even making it invisible to the admin without the admin's permision. I'm having mixed opinions about you _G_. You start off soundind like a script kiddie trying to experiment with sub7, then you tell us how you'd send S7 through the AV, but then again you drop down to a script kiddie level. As 576869746568617 said, it does not add up. I asked you a question in one of my posts, and i have received no answer yet.
I want, for example to listen an mp3, see a movie....., without beeing detected by programs like netwatcher(pro), in fact i don't want them to see me at all.
Any particular reason why you would need to be invisible to do these?
(thought i plan to "install" s7)
Why would u install sub7 in a system that you do not own. My guess: You have a computer at home, where u have the server side of the trojan installed. You are trying to experiment and seing what it does. (Not a good Idea since the other system is not yours, and you're doing this without the owner's consent)
i just want to be invisible sometimes, because, let's say i'm older.
What exactly do you mean by this? I strongly believe you're around 16-17 years old, because any adult in the IT world would know how "useless" sub7 has become.
and, yes, the s7 is living, in fact i'm proud that s7 was made by romanians (because myself i'm romanian).
You're proud , good for you. I hope you guys come up with something new because indeed sub 7 has become Obsolete.
Please clear some of my confusion, perhaps we could assist you better.
-
January 28th, 2004, 09:40 PM
#45
Senior Member
interesting idea
I have been reading this thread, and an idea popped into my mind......dont know if this would work, but im sure someone could make it work
1) if you had 2 nics, one for receiving packets only, and one for sending packets only. Hooked them up with specially made cables...sending and receiving...
2) using the receiving nic to passively receive the ack packets
3)using the sending nic to send the packets where you want them. Could this, in theory actually work to leave you "hidden" yet able to communicate? There would have to be something tying the nics together. However, you could still be detected because of "unknown traffic" However, you couldnt be found as your "receiving" nic is totally passive. Does this make sense or is it totally stupid? LOL Thanks for any imput. I have no idea how to make it work, but it seems like it could work....just horribly inefficient. Any ideas anyone?
PS. just to let you know, i am currently attending college for my BaS of Information Systems Security.
.
M$ support is like shooting yourself in the left foot and then putting a band-aid on the right one.
-
January 29th, 2004, 02:56 AM
#46
Yes, that in theory would work, IMHO, as it is theoretically and logically sound. The problem is that, as you said, there would still be traffic that would be "unknown", but would still be traceable to the port on the switch depending on the switch. If it's a hub, then there is no really easy way to trace, and if an IP proxy/anonomyzer was used in conjuction with a blanked out MAC address, it would be damn near impossible. What I don't get is why the thread is still open?
..............===========...........................
..............|......................|...........................
.............sss...................S..........................
............u....u.................U..........................
.............bbb..................B..........................
...............s...................S...........................
...........eeeee..............E............................
..........v...vv...v............V............................
.........e....ee...e...........E............................
........n.....nn......n.......N.............................
..............s..s..............S..............................
............ u....u............U...............................
............c.......c...........C...............................
...........k.........k.........K................................
.........ss.........ss.......S................................
................................|.................................
DONKEYBALLSDONKEYBALLSDONKEYBALLS
What do I have to do to get someone to kill this thread. Maybe if we just neg the **** out of him it'll commit suicide!
I can't believe I just did that, but IMHO I think it's the most worthwhile part of this whole thread!
-
January 29th, 2004, 04:25 AM
#47
ROFL....creative
-
January 29th, 2004, 04:28 AM
#48
very nice pic...lol
and yes, I thought this was over..
Quis custodiet ipsos custodes
-
January 29th, 2004, 02:53 PM
#49
Senior Member
[pong][gloworange]665[/gloworange] Next door to the [glowpurple]devil[/glowpurple][/pong]
-
January 29th, 2004, 03:12 PM
#50
FINIS
And the true neighbours of the devil are 664 and 668...............the other buggers are across the road?
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|