Search:

Type: Posts; User: JazzHans; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    5
    Views
    3,440

    Re: How to set a lower txPower in RTL8187?

    Just out of interest why do you want to lower the power of your card?
  2. Replies
    1
    Views
    1,059

    RTL8187 Injection Issues.

    Hi. I am having injection issues using the AWUS036H (RTL8187 driver). It works for about 30 seconds, on a wep network, but the card will quickly drop out then back on giving a "network is down"...
  3. Replies
    1
    Views
    3,534

    Forensic Tools & Keylogger

    Hi, my sister's fiancÚ has been cheating on her and she has asked me to dig up some dirt on him from her computer. I was wondering if there are any forensic tools, that come with backtrack, that can...
  4. Discussioni: VPN through TOR

    by JazzHans
    Replies
    3
    Views
    4,079

    Re: VPN through TOR

    Thanks for the reply. i thought tor used UDP? i thought the data sent between each node was encapsulated?


    Thanks.
  5. Discussioni: VPN through TOR

    by JazzHans
    Replies
    3
    Views
    4,079

    VPN through TOR

    Is it possible to encrypt the data between two endpoints running through tor? I know there is one level of encryption between two nodes, but from end to end, is it possible?
  6. Replies
    15
    Views
    4,260

    Re: Rogue AP + revealing wireless credentials.

    i was just asking if it were possible, without digging through 2 hours of information, not for instructions.

    I know it is possible to setup a rogue AP to sniff http traffic; but to clone an access...
  7. Replies
    15
    Views
    4,260

    Re: Rogue AP + revealing wireless credentials.

    Thanks for the replies. i am essentially a beginner and i was just wondering if it were possible. I will give that script a try later on this week, i will play about with some tools and see what i...
  8. Replies
    15
    Views
    4,260

    Rogue AP + revealing wireless credentials.

    I have my own small lab setup at home and i was wondering if i could 'spoof' ( in a sense ) my access point with a rogue AP, in order to reveal the wireless credentials?

    example, have my own box...
  9. Replies
    2
    Views
    2,354

    WPA Brute Forcing with CUDA.

    Hi, i was going to build a new system, with a quad core phenom II, and 2x280 GTXs in SLi. I was wondering if brute forcing 8-15 random character WPA keys is even doable, and what kind of time scale...
  10. Discussioni: db_autopwn

    by JazzHans
    Replies
    1
    Views
    1,755

    db_autopwn

    hey, so i have db_autopwn working fine, but is there a way to launch exploit modules for the target platform?

    example, the target is XP, can i avoid running the linux exploit modules at all?
    ...
  11. Replies
    2
    Views
    796

    IP Tables, Forward Chain.

    Hey, so i wanted to set up some arp cache poisoning and forward some traffic from port 80, to port 8080.

    i cannot seem to append the forward chain. i have written my own IP Table rules before,...
Results 1 to 11 of 11