Search:

Type: Posts; User: Thorn; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    4
    Views
    13,796

    Re: Autopsy Digital Forensics

    You're welcome.

    Recovery is about getting back those files that have been deleted or otherwise lost.

    Computer forensics really is about finding evidence items in a consistent and repeatable...
  2. Discussioni: Tethering APs

    by Thorn
    Replies
    3
    Views
    2,936

    Re: Tethering APs

    OK, so it sounds like you're legal.

    What an aggregation unit does is take several different connections into one. You'd actually need a box with multiple WLAN NICs that would then pipe it all...
  3. Discussioni: Tethering APs

    by Thorn
    Replies
    3
    Views
    2,936

    Re: Tethering APs

    First, what you want to happen, won't work. Bandwidth aggregation won't work across multiple APs unless there is a common aggregation controller behind them.

    Secondly, and more importantly, if...
  4. Replies
    4
    Views
    13,796

    Re: Autopsy Digital Forensics

    I've only played with Autopsy and found it very lacking, so I stick with costly commercial Windows tools for forensic work. Having said that, I can't be positive, but Autopsy probably doesn't have...
  5. Replies
    14
    Views
    10,265

    Re: Supercomputers - The cheapest route.

    Wait. William Gibson is THAT Gibson?

    BTW, have you been to the pool on the roof? :D
  6. Replies
    14
    Views
    10,265

    Re: Supercomputers - The cheapest route.

    I like William Gibson's idea: A 3D grid of scaffolding holding several hundred Sinclair ZX-81's. :D
  7. Replies
    7
    Views
    7,969

    Re: Wireshark capture filters are kicking my ass

    Don't use "&" and "!". Use "and" and "not". Look at the examples that are on the page Archangel-Amael posted. Again: http://wiki.wireshark.org/CaptureFilters

    It should be

    not dst...
  8. Discussioni: Pentesting

    by Thorn
    Replies
    13
    Views
    3,759

    Re: AW: Pentesting

    To be sure, there are a lot of networks that have touchy machines, and those details should be worked out ahead of time. In fact, my contracts specifically exclude deliberate DoSing as a technique,...
  9. Replies
    1
    Views
    2,466

    Re: speed of hydra login cracker

    Look at the help files for timing. Reducing the threads may improve the performance of hydra.

    Medusa is a comparable tool.

    By the way, it is a stupid move to use a tool over the Internet, if...
  10. Discussioni: Pentesting

    by Thorn
    Replies
    13
    Views
    3,759

    Re: AW: Pentesting

    Noise is only an problem if you're running a "black ops" test against both the actual network as well as the security abilities of the admins. Otherwise, concern over noise isn't even a...
  11. Replies
    6
    Views
    7,566

    Re: AW: Re: Master Default Password List

    No, these sites are not for creating password lists. They are for quickly looking up the default password for a given device.
  12. Replies
    9
    Views
    7,817

    Re: Kismet gps and wardriving

    The NS Forums are being revised; aFR just sent me an email informing me of the fact. Apparently, he's switching the forums software to PHP-BB. I have no idea what prompted the sudden change or when...
  13. Replies
    11
    Views
    11,275

    Re: How to get a compatible USB GPS to work with Kismet.

    Yeah, around 2003-2005, gpsd would completely munge the NMEA output and just would not play nice with kismet. IIRC, the development had forked for some reason circa 2003, and what ended up out in...
  14. Replies
    4
    Views
    5,507

    Re: Why can't all wireless cards inject packets?

    Aside from driver issues, in a lot of cases it's also hardware related, in that the card lacks either computation power and/or the memory registers, etc., to perform the needed operations. You have...
  15. Replies
    3
    Views
    4,597

    Re: Use of cell phone hardware with backtrack.

    As far as I know, there aren't any devices or software tools that allow you to do this, in the manner you describe, although there may be specific proprietary applications that allow SMS when a phone...
  16. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    Yes, IF you capture the 802.11 Frames, which is what encases packets when they're being broadcast over the radio frequency (RF) portion of the network. Since most 802.11 clients strip the frames off...
  17. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    Actually, that article is inaccurate. It comes close, but it still is spreading some confusion about the subject. "SSID Broadcast" is a misnomer. It is really a "Disable the response to SSID...
  18. Replies
    2
    Views
    5,745

    Re: what if ssid has a space?

    Use quotes.
  19. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    /me smacks forehead.

    No, you might know about a single tool, but you fail to understand how wireless works. If you want to understand, I would again suggest you do some basic reading on the...
  20. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    No, of course not. People who know the "hidden" SSID can connect to it, merely by typing it into their wireless client. As I previously stated, "hiding" the SSID merely tells AP to be unresponsive...
  21. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    You're missing something.

    Hiding the SSID makes no sense, as "hiding" only makes the AP in question unresponsive to SSID query beacons. However, the SSID is still broadcast every 0.1 seconds,...
  22. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    You've hit it right on the head. Due to the fact that almost every crime has some electronic/computer element nowadays, for a PD it's a matter of either adapting or potentially lose huge amounts of...
  23. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    /me crosses kidn3ys off the Xmas card list.
    :p
    There's no question about the fact that the police and the law always lag behind technology, but they are getting better. I've been pleasantly...
  24. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    True on all counts. I do have an "in" with most of the LEOs in the area, and a lot of threads like this do come in here. However, more and more PDs are getting "cyber units" by shear necessity. ...
  25. Replies
    44
    Views
    9,834

    Re: Somebody is attacking my network! How do I track them?!

    The Prosecution rests!
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4