«
Expand/Collapse
40 items tagged "Discussion"
Related tags:
chaos communication congress [+],
labour [+],
informational capitalism [+],
information feudalism [+],
george dafermos [+],
capitalism [+],
General [+],
remote exploit [+],
playstation 3 [+],
password [+],
member [+],
BackTrack [+],
zero day [+],
zero [+],
yahoo answers [+],
wrt [+],
work in progress [+],
work [+],
winrar password [+],
winrar [+],
windows registry [+],
windows [+],
weird stuff [+],
web [+],
vlc [+],
use [+],
upgrade [+],
united states [+],
u.s. i [+],
u.s. [+],
turkey [+],
toronto [+],
top [+],
today [+],
thanks in advance [+],
text shell [+],
technology [+],
target network [+],
system memory [+],
system [+],
stupid thread [+],
stopping [+],
static ip [+],
static analysis tool [+],
static [+],
start [+],
source codes [+],
source [+],
someone [+],
somebody [+],
slides [+],
site [+],
simple request [+],
servers [+],
server error [+],
security experts [+],
security [+],
school [+],
sate [+],
sans giac [+],
root [+],
rhce [+],
request [+],
registry [+],
quot [+],
quirk [+],
questio [+],
pwb [+],
public library system [+],
protection mechanism [+],
project ideas [+],
project [+],
problem [+],
poor attitude [+],
policy [+],
playstation [+],
phillip torrone [+],
paul e. black [+],
patch [+],
panel [+],
output [+],
orleans [+],
open source hardware [+],
new orleans [+],
new member [+],
network security [+],
network discovery [+],
need [+],
national [+],
msf [+],
mouth [+],
metasploit [+],
malicious code [+],
mac [+],
literature [+],
list [+],
linux source [+],
laptop [+],
jacob appelbaum [+],
jack of all trades [+],
iraq [+],
ip list [+],
internet explorer [+],
internet [+],
infosec [+],
information systems management [+],
information [+],
import [+],
hypervisor [+],
hurricane katrina [+],
https [+],
houston [+],
hey everyone [+],
hey [+],
hdd [+],
hacker web [+],
hacker [+],
hacked [+],
group [+],
greetings [+],
google [+],
good resources [+],
generico [+],
free education [+],
farmacia [+],
exposition [+],
export limits [+],
export [+],
explorer [+],
example source [+],
everyone [+],
everybody [+],
entire system [+],
drive [+],
domain admin [+],
distro [+],
disaster [+],
dhcp [+],
dell inspiron [+],
dell [+],
deb [+],
dd wrt [+],
day [+],
database servers [+],
database [+],
cryptography [+],
conclusive answer [+],
con groups [+],
computer science [+],
com [+],
co workers [+],
clicks [+],
class [+],
cipher strength [+],
case [+],
cannot [+],
buzz [+],
business [+],
building a shed [+],
budget [+],
bt4 [+],
book [+],
board [+],
bit [+],
bios settings [+],
bios boot [+],
bios [+],
bin [+],
band [+],
audio panel [+],
audio [+],
assistance [+],
assignement [+],
analysis [+],
alot [+],
alfa [+],
ahci [+],
advice [+],
administration side [+],
admin [+],
acquistare [+],
access [+],
ability [+],
Newbie [+],
Hackerspaces [+]
-
-
21:36
»
SecDocs
Authors:
Jacob Appelbaum Tags:
social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: A discussion about technology, culture, the Creative Commons and the media with regards to disaster areas and warzones. A discussion about technology, culture, the Creative Commons and the media with regards to disaster areas and warzones. Jacob Appelbaum traveled from Turkey into Iraq in April of 2005. He documented his trip with a focus on photography, blogging and video interviewing. After hurricane Katrina, he traveled into Houston, Baton Rouge and finally New Orleans. The discussion will cover issues from safety, technology, documentation, sensitivity to local cultural issues, techniques for entry, methods for networking in remote parts of the world, helping other travelers and how new media such as blogging helps us to address issues worldwide. It will be a discussion about modern techniques for disseminating information in a wide spread manner. The speaker will discuss the programs, protocols, and methods he has used in his recent experiences in New Orleans and Iraq. The speaker will also discuss methods for bypassing authority figures that may wish to restrain or monitor a person disseminating information. Further subject manner will include: Finding uplinks in obscure or distant parts of the world or destroyed areas directly after a disaster. The use of cryptography and stenography, when and where it's useful. Finding a core audience of people that are interested in the subject matter. Being helpful and knowing when to say what. Staying safe and being prepared.
-
-
13:52
»
SecDocs
Authors:
George Dafermos Tags:
economy Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Discussion premised on the intersections of information feudalism, free software and open sources, piracy, cracking, volunteer and unwaged labour, class reconfigurations, and tainted myth. Discussion premised on the intersections of information feudalism, free software and open sources, piracy, cracking, volunteer and unwaged labour, class reconfigurations, and tainted myth. The discussion will take a hard look at the radical potentialities that the transition to cognitive-informational capitalism has brought about, as well as the reactionary forces that set in motion the imaginary of intellectual property law in order to regulate immaterial labour. A question is central to the discussion: what strange world reveals itself when Capital cannot maintain the pace or character of the historical magnification which has been defining it since the 15th century? When the commodity-form turns inward, facing itself in the mirror of production, in effect appropriating the flows of cultural heritage and social knowledge, what new myths arise to phisosophise reality?
-
13:52
»
SecDocs
Authors:
George Dafermos Tags:
economy Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Discussion premised on the intersections of information feudalism, free software and open sources, piracy, cracking, volunteer and unwaged labour, class reconfigurations, and tainted myth. Discussion premised on the intersections of information feudalism, free software and open sources, piracy, cracking, volunteer and unwaged labour, class reconfigurations, and tainted myth. The discussion will take a hard look at the radical potentialities that the transition to cognitive-informational capitalism has brought about, as well as the reactionary forces that set in motion the imaginary of intellectual property law in order to regulate immaterial labour. A question is central to the discussion: what strange world reveals itself when Capital cannot maintain the pace or character of the historical magnification which has been defining it since the 15th century? When the commodity-form turns inward, facing itself in the mirror of production, in effect appropriating the flows of cultural heritage and social knowledge, what new myths arise to phisosophise reality?
-
-
21:47
»
SecDocs
Authors:
George Dafermos Tags:
economy Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Discussion premised on the intersections of information feudalism, free software and open sources, piracy, cracking, volunteer and unwaged labour, class reconfigurations, and tainted myth. Discussion premised on the intersections of information feudalism, free software and open sources, piracy, cracking, volunteer and unwaged labour, class reconfigurations, and tainted myth. The discussion will take a hard look at the radical potentialities that the transition to cognitive-informational capitalism has brought about, as well as the reactionary forces that set in motion the imaginary of intellectual property law in order to regulate immaterial labour. A question is central to the discussion: what strange world reveals itself when Capital cannot maintain the pace or character of the historical magnification which has been defining it since the 15th century? When the commodity-form turns inward, facing itself in the mirror of production, in effect appropriating the flows of cultural heritage and social knowledge, what new myths arise to phisosophise reality?
-
-
21:30
»
SecDocs
-
-
7:45
»
Hack a Day
[Phillip Torrone] has started a discussion about a possible upgrade to the public library system in the US and wants to know what you think. His name should be familiar (Hackaday founder, Open Source hardware advocate, and Tron costume model) and he’s definitely got his finger on the pulse of today’s electronics enthusiasts. He poses [...]
-
-
18:08
»
remote-exploit & backtrack
Hi folks
I'm not an expert here but I have used backtrack many time to learn linux in the most fun way (hack to learn and not learn to hack). I have been using your tools since the early remote-exploit and I want to thank you very much.
Now sorry for the dump question. But I have seen an AP router on the net with usb that can be used in conjunction with the Alfa wireless like a bridge.
Now I got a friend who is building a shed at about 900mt 1km (clear line of sight and no other wifi to interfear with) away from he's house and I was thinking to put wrt54g on one side with a pannel antenna and on the otherside an Alfa wireless 1w attached to this bridge AP.
Now before we spend any money I would like to know if it's possible to make it works with my WRT600n router with DD-WRT. Why ? because I got everything and I could try that tommorow. I asked our friend google but he doesn't know eather.
Does any one know if it's possible use my WRT600n usb to work with Alfa?
Also if you had to plan something like that would you use the band B/G or the Band A? I had look around and apparently Band 5.8mhz travel futher?
p.s
Excuse my english :-)
-
-
13:45
»
remote-exploit & backtrack
Hello, friends.
Do you know about any manner to increase the (allways short: 10 or so) number of Static DHCP List that routers use to have?
I am talking about the IP assignement that a certain MAC connecting to the local network will have.
Thanks :).
-
-
18:45
»
remote-exploit & backtrack
Hi!
This is a simple request, can we please have the ability to use https with the forum?
I like this place, I'ld like it to be safe from sniffing.
Thanks :)
-
-
11:44
»
remote-exploit & backtrack
Hello guys I just needed some advice as I know alot of profesionals live on these forums and may be able to help me.I was looking to get into it security and i am lucky enough to get free education in order to pursue that.I was researching and I would like to know if going for a degree in computer science and information would be a good start for this.Thanks in advance for any help.
-
-
5:12
»
remote-exploit & backtrack
How you find ideas for articles, I am always lack of new ideas for articles. Some tips would be great
-
-
23:13
»
remote-exploit & backtrack
Not sure where to post this but I wanted to ask if anyone has heard of National Clicks?
Can someone help me find it?
Overheard some co-workers talking about it all week but didn't have time to ask so I thought I would post it here to see if someone could help me out.
Seems to be getting alot of buzz right now.
Thanks
-
-
18:00
»
remote-exploit & backtrack
Hello, could somebody please tell me how I'm able to totally reset my password? My laptop conveniently saved my password but I cannot remember it so now I need to totally reset it.
Regards
AssosutsmoosE
-
-
10:27
»
remote-exploit & backtrack
Hey guys!
I have to do some bachelor work at university and I thought about writing about "
Attacking Database Servers".
I mainly want to focus on Network Discovery, Common and Specified Attack Scenarios and Protection Mechanism.
I do
NOT want to focus on SQL Injection (I might add a little chapter on effects but not on how do SQL Inject an application), I really want to write about attacking the database servers as itself, not via an application.
I would be glad about every literature or input you know oh this topic, mainly about Oracle, MSSQL and MySQL.
I thought about The Database Hacker's Handbook: Defending Database Servers as main literature but everything else would be really appreciated since I need a lot of different literature.
Thanks in advance
-=R=-
-
-
12:10
»
remote-exploit & backtrack
I've been playing around for the last few hours trying to get this working.
I've read many forum posts on different forums, but I still haven't got it working.
It doesn't help that all of the Fast-track websites are down, both "Secure State" and "The Pen Test".
I've done all sorts of weird stuff like create a user called "postgres", and I can't count many ruby libraries I've installed.
Here's some of the guides I've followed:
Automate Your Pen Testing with Fast-Track and Linux - www.enterprisenetworkingplanet.com
The Bored IT Guy ยป How to install Fast-Track 4.0 on Ubuntu
[ubuntu] How to: metasploit with autopwn [Archive] - Ubuntu Forums
Here's the versions I'm working with:
Metasploit v3.3.4-dev
Fast-track v4.0
When I run Fast-track, it tests for dependencies and everything comes back OK except for
pymills. I searched the web for
pymills and it seems to have disappeared into a black hole, seems like the Russians came and kidnapped the developers.
If I do:
Code:
python fast-track.py -i
Enter 2 for Autopwn.
Enter the IP address.
Enter 2 for Reverse Binding.
Then it loads Metasploit but here's what I get, check out the errors in red:
Code:
msf > db_destroy pentest
dropdb: could not connect to database postgres: FATAL: Ident authentication failed for user "root"
msf > db_create pentest
createdb: could not connect to database postgres: FATAL: Ident authentication failed for user "postgres"
[-] Error while running command db_create: Failed to connect to the database: FATAL: Ident authentication failed for user "postgres"
Call stack:
/root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1552:in `db_create_postgresql'
/root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1078:in `send'
/root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1078:in `cmd_db_create'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:239:in `send'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:239:in `run_command'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:201:in `run_single'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:195:in `each'
/root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:195:in `run_single'
/root/metasploit/lib/rex/ui/text/shell.rb:144:in `run'
/root/metasploit/msfconsole:93
msf > db_nmap 192.168.1.111
[-] Unknown command: db_nmap.
msf > db_autopwn -p -t -e -r
[-] Unknown command: db_autopwn.
msf > sleep 5
msf > jobs -K
Stopping all jobs...
Anyone got any ideas?
-
-
19:58
»
remote-exploit & backtrack
ok, given the audience and the nature of my gripe, i have no doubt that there will be an open season on this post, but as the title says; enough is enough.
i've been on the boards for a while... mostly lurking, mostly learning. i used to post a bit here and there, when i thought i could actually contribute something. for the most part, i tend to keep my mouth shut because i feel that if i can't contribute to the thread, i should just hush. i try to learn what i can from the excellent tutorials and anecdotal stories.
this has been said before and i've read all the tired excuses for the poor attitude and general snobbish, elitist pain-in-the-arse behavior that is exhibited by certain members and more importantly moderators. fact of the matter, it's all crap.
don't get me wrong, if some moron posts "how do i hax0rz my neighbor's wifi?" or whatever, i say release the hounds of hell. i enjoy perusing the idiot's corner for just such posts and i always get a chuckle out of pureh@te's interception of an otherwise stupid thread. between him and streaker69, they probably instilled enough dread to make me think six or seven times before opening my mouth.
but that's not what i'm talking about here. i came back this evening after being away for a bit and i am saddened by the ridiculous behavior of certain mods. it is as though there is some sort of competition between them to see which of them can single-handedly destroy the largest amount of threads for the most banal of reasons (asking a question that the mod finds "ridiculous" for instance). i won't name anyone, a simple search will answer that quick enough and besides, you know who you are already.
you guys should really be ashamed of yourself. i have picked on a poster when they needed a dose of reality, but i have also been patient with people who knew far less than I and were obviously not "ready for prime time". News flash... THAT IS WHY THEY ARE HERE. i have asked some questions that at the time confused me but in retrospect were fairly basic. when i discovered the answer, no matter how much of a moron it made me out to be, i posted it in good humour...in the hopes that it would help someone else in the future.
you guys need to grow up. you need to put this back into perspective and perhaps remember that you are wardens of this community, not errant bullies. having been here longer or having more knowledge on a subject doesn't give you license to be a dick. if anything, it enjoins you to care more, not less. perhaps you have groupies that are impressed with how you put this or that n00b in their place, i am not one of them and i would sincerely hope that i am not alone.
look, i don't want to go off on a tangent here and write the 'great american novel' or anything, i'm just saying that many decent people would probably become more involved with this community (myself included) if there wasn't such a foreboding aura of arrogance and general prickishness. i may very well be wrong, but i'm not entirely sure that mother would approve of all of this.
if someone is being stupid or asinine, by all means call them on it and keep our standards high. but stop screwing with people for just being wrong or perhaps behind the curve. saying "use the search bar" 50 times a day has got to get old, but so does reading your self-important and unnecessary flames.
speaking of flames, i guess i'm ready for what i strongly suspect happens next.
i'm done. go for it.
~b
-
8:57
»
remote-exploit & backtrack
So our budget has allotted for 3 business related certs per IT employee this year.
My current role is the jack of all trades IT guy (1 of 8) with most of my responsibilities falling in the realm of security. I have a INFOSEC BAS degree.
What 3 security minded certs are actually worth the money? Cost is an issue but we have a negotiable price depending on the cert. So In your experience what is worth having?
I was thinking SOX, Hippa and Sans Giac/GSNA .... any thoughts?
I have been thinking about an RHCE but it is not work related as we use UNIX and Windows primarily. Only a few of our systems are Redhat....
-
-
18:47
»
remote-exploit & backtrack
GrEeTiNgS, forums.remote-exploit.org!
-
-
17:08
»
remote-exploit & backtrack
Well, I wont say much about this computer I'm dealing with, needless to say I can't modify the hard drive contents and I don't have access to the internals.
Booted up a copy of BackTrack 4 Final onto a computer after acquiring BIOS rights. We got the password to the BIOS, changed the boot order to CD and first booted to windows normally. Then we restarted and booted into BT4 to see what we could do. I got called away and when I came back my partner in crime was pale and was looking at the BIOS. The first HDD was no longer in the BIOS boot options, we get an error (more info on that error later) when we don't have a disk in the drive.
Loading up BT4, the hard drive is still visible. It's just not being picked up by BIOS.
Tomorrow we'll be playing around, our ultimate plan is to upload a back door, fix it and give ourselves remote access from our own computers, though if it goes on erroring out like this the HDD and BIOS are sure to be flashed.
So... Any idea what might be doing this? Any BIOS settings or even a linux setting that may have somehow played with the hard drive?
-
-
12:02
»
remote-exploit & backtrack
hey everyone i am new to the board and wanted to introduce myself im rob and im a networking IT professional got 5 years exp and im trying to get my self fairly educated in infosec and penntesting.
-
-
15:51
»
remote-exploit & backtrack
Hi Everybody,
I'm a fresh member on this community. Just wanted to say hi! :)
-
-
13:17
»
remote-exploit & backtrack
I want to apply a patch to enable AHCI on my Dell inspiron.
I apply quirk-ich-force-ahci.patch patch to /usr/src/linux-source-2.6.30.9/drivers/pci/quirks.c
But now what to do next?
-
-
3:35
»
remote-exploit & backtrack
Hi ,
I have a book in winrar format which is protected with password .It takes a very great deal of time when it is usually used the standard softwares for removing the password , you know . Do you know if exists another way that is faster and more reliable for removing the password ?
thank you in advanced ?
-
-
8:05
»
remote-exploit & backtrack
This is related to backtrack because i use backtrack. And no one on yahoo answers answered. But if I major in Information technology, can I eventually land a job in network security. I realize i would have to get certificates but is this how one starts? is there a difference in IT and information systems management.
-
7:21
»
remote-exploit & backtrack
Hey, just want to say hi. I'm new here.
-
-
20:26
»
remote-exploit & backtrack
Hi
Obviously I'm a newbie here. I found this site through google search and I found this forum interesting so I drop by.
Thanks for welcoming me in advance!
-
-
9:15
»
remote-exploit & backtrack
Hello,
did a search but found no answer.
Anyways.
On using aircrack-ng GUI with windows vista. I browse and find the capture file and then run aircrack-ng.
The output in the aircrack-ng shows all the packets from the capture file, but i cannot view the top of this output, only the last 150 lines.
I need to veiw the top, to find the target network with the most IV's
any help?
-
-
9:45
»
remote-exploit & backtrack
well, i just recommended pwb class to an info sec friend at work :) if all works he will get to sign for this soon :).
now to convince my wife that it would make a great b-day present for me (as programming line hard to figure out how to make work pay) :)
sin-cerely,
Trol
-
-
7:58
»
remote-exploit & backtrack
The ps3 has bin hacked, it is still a major work in progress, you can read more
here
On the PlayStation 3
-
-
8:04
»
remote-exploit & backtrack
В рекламе Ментоc, (где овцы на газонокасилках рассекают) играет песня, кто ее исполнитель и что это за песня?
-
8:04
»
remote-exploit & backtrack
В рекламе Ментоc, (где овцы на газонокасилках рассекают) играет песня, кто ее исполнитель и что это за песня?
-
3:56
»
remote-exploit & backtrack
Today i try install vlc (sudo apt-get install vlc).
But it did not install
Quote:
\/vlc_0.9.4-1ubuntu3.1_i386.deb[/url] 404 Not Found
E: Unable to fetch some archives, maybe run apt-get update or try with --fix-missing?
|
server error
this output after 50% download. What is the problem?
-
0:52
»
remote-exploit & backtrack
hi,
Code:
I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3.
geohotps3. blogspot. com
twitter. com/Geohot
Do you think its a fake?
-
0:39
»
remote-exploit & backtrack
As you know it's a great web application attacking and defending book, it has some example source codes included, the source of the contents is in somewhere that I can't post here right now due to the some reasons related to rules of this forum ... (15 posts needed to post links !)
unluckily it seems it's not available right now,
if anyone has it's source codes or find them with google or somewhere else please post them here, It's immediately for me .
thank you !
- Genius
-
-
12:36
»
remote-exploit & backtrack
Hi,
A quick question for our ubber security experts.
What is the best tool (or linux distro) for analyzing Windows Registry
(from live distro).
Sincerely,
Trol
-
-
14:01
»
remote-exploit & backtrack
I ran across a few articles about the Zero Day exploit on Internet Explorer.
From what I have read, the exploit gives the ability to insert malicious code in links and advertisements.
How does this exploit work exactly?
Any articles or explanations would be gladly appreciated!
-
-
14:10
»
remote-exploit & backtrack
A few years ago i did the A+ and recently i took the MCDST as i managed to get it free as we setup a micorsoft testing centre. i am now working as a desktop support technician in a hospital and am learning alot. i am however becoming frustrated as i really want to learn more about group policy and the server/administration side of things which comes into play alot.
A few years ago i got a complete set of books which is windows 2000 MCSE i was just going to dig them out however is it woth my while reading them or have things changed too much now since server 2003.
I have no more training resource available so i guess im looking for pointers from someone with systems experience to learn about domains, workgroup enviroments and admin/group policy.
-
8:40
»
remote-exploit & backtrack
hi guys,
i am in need of some ideas, i am currently doing my degree in networking and i need to produce a project.
i want to do my project on network security using backtrack e.g wep crack and pentesing the system.
this project has to be 15,000 words write up, so i need some ideas of what to do to pad it out to 15,000 words as i dont think just pentesting the system will be enough.
hope you can help guys all ideas would be most apprciated thanks
-
1:12
»
remote-exploit & backtrack
Hello,
I am currently doing research into cryptography export limits and have searched Google extensively but have not found a conclusive answer to my question.
A while back the United States relaxed it's import and export laws regarding encryption which is why software such as Firefox and Internet Explorer could provide 128-bit ciphers outside of the U.S. I have however heard that the same does not hold true for software that is not freely available. What if I were to use RSA encryption? Would I have to limit the cipher strength if I would want to communicate with the U.S.?
Thanks!