-
May 10th, 2007, 03:36 AM
#11
Originally Posted by hknetmaster
To login the computer must have shares enabled and don´t have firewall blocking netbios ports.
assuming the 2 key points are fulfilled, how would someone infiltrate the target system? i dont get the picture.
-
May 10th, 2007, 11:09 AM
#12
well, some dipshits share their entire c: drive. I remember one time when I was at uni I was browsing file shares. The "convention" was to name your box after your room number (yeah fricking right I'm going to do that) and this particular guy had and had shared his c:. OOOhhhh fun. So there I am browsing this guys computer. Oh look! he uses kazaa. Lets see what he is downloading right now..... (incomplete downloads folder) OH GOD MY EYES! MY EYES!! This guy had the second sickest porn collection ever, lacking only some child porn to round it off. Dogs, horses, transvestites, transvestite horses you name it he had it.
Quick print screen, fiddle in paint to emphasise the computer name and hide my details, print *10, middle of the night blue-tack mission all round his flat. Lot of the place was open, so every one of his flatmates got a copy under their door and one in the kitchen for good measure.
Funnily enough that network share disappeared the next day....
BWAHAHAHHAHA.
If the world doesn't stop annoying me I will name my kids ";DROP DATABASE;" and get revenge.
-
May 10th, 2007, 03:45 PM
#13
Originally Posted by hknetmaster
First, the autofill terms are memorized by the browser, so if some strange term appears is because someone accidentally tapped it.
Second, WEP is not secure, is better to use WPA. And the admin password can be cracked with bruteforce.
I agree, local "autofill" would only be affected if someone one (AT) your computer or had (REMOTE) access to your computer. If they had access to you router, you would notice by the logs or by checking "connected computers".
-
May 18th, 2007, 09:37 PM
#14
Originally Posted by Aardpsymon
Quick print screen, fiddle in paint to emphasise the computer name and hide my details, print *10, middle of the night blue-tack mission all round his flat. Lot of the place was open, so every one of his flatmates got a copy under their door and one in the kitchen for good measure.
Damn u musta hated this fool! i been in and out of ppl's comps in that sense. just stole their music and let them go. shared folders are obvious targets. easy access, but useless for hax.
-
May 24th, 2007, 07:36 PM
#15
Junior Member
I'm not sure on this but i think when they cracked that wep in less then 1min they were using 3 laptops. i'v done 128bit in 137sec but cant seem to get 1min or less.
I only had one laptop and one card though.
I dont think theres any real way to secure an ap. Having MAC filtering and wpa encryption helps but can still be cracked.its enough to keep most wardrivers away. Also theres a way to get around the logs on some routers. I use the netgear dg834g v3 new firmware
and i can get around the logs by changing my MAC to the same one that my ap uses and have no problems surfing. this doesnt work on a speedtouch.
Aardpsymon LOL
A friend of mine has both his drives shared and half the time his wep and firewall is off. Stupid!!!
I tell him to get it secure but he doesnt listen. So when i connect to his ap, i move all his files around. messy messy!! he still doesnt listen though.
-
May 25th, 2007, 08:59 AM
#16
Basically, the only reason I felt the need to bust this guy is because he had some really nasty porn in there. If he had just had "normal" porn I woulda left him alone, but jesus H christ that was nasty stuff.
As for the security of WEP/WPA, its foolish to think that its a secure system. The plain fact is that anyone with a card can come along and intercept your traffic without you knowing it, they then have as long as they want to break the WEP. BUT take an online credit card transaction - even if they break the WEP in 3 seconds, all they get is the 128bit SSL. Good luck cracking that. Of course, all your chat and forum posts are vulnerable.
If the world doesn't stop annoying me I will name my kids ";DROP DATABASE;" and get revenge.
-
May 13th, 2008, 12:04 AM
#17
Junior Member
Originally Posted by Aardpsymon
even if they break the WEP in 3 seconds, all they get is the 128bit SSL. Good luck cracking that. Of course, all your chat and forum posts are vulnerable.
Well they can still do an ARP Poisining attack, and if the victim is foolish enough to accept the fake SSL certificate, then voilĂ* !! :P
You last visited: July 24th, 2004 at 02:40 AM <--- DAAAAMN
Similar Threads
-
By DeadAddict in forum The Security Tutorials Forum
Replies: 10
Last Post: July 21st, 2008, 12:16 AM
-
By XTC46 in forum Site Feedback/Questions/Suggestions
Replies: 15
Last Post: August 24th, 2005, 07:52 PM
-
By Shrekkie in forum Other Tutorials Forum
Replies: 1
Last Post: September 2nd, 2004, 09:11 AM
-
By mmelby in forum The Security Tutorials Forum
Replies: 1
Last Post: October 23rd, 2002, 02:31 PM
-
By zigar in forum AntiOnline's General Chit Chat
Replies: 10
Last Post: February 22nd, 2002, 02:24 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|