Page 2 of 2 FirstFirst 12
Results 11 to 20 of 20

Thread: How to hacking modem router?

  1. #11
    Member
    Join Date
    Oct 2006
    Posts
    130

    Default

    I'm with tparent...... As soon as I read "Hack" Even from example B.... BTW you'd be social engineered right out of your CC, Sirens go off.

    First... He's CRACKING not hacking, and you get better resualts with suger than vinager! And second... he seems intelligent which is evn more dangerous!

    That quote from the MIM should be awake up.

  2. #12
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by Paton View Post
    I'm with tparent...... As soon as I read "Hack" Even from example B.... BTW you'd be social engineered right out of your CC, Sirens go off.

    First... He's CRACKING not hacking, and you get better resualts with suger than vinager! And second... he seems intelligent which is evn more dangerous!

    That quote from the MIM should be awake up.
    UUmm..ok, Im an idiot..I hear MIM all the time and my best friend in the world,Google...told me that its either

    1. Maoist Internationalist Movement (A Collection of revolutionary vanguard parties leading the proletarian communist struggle against imperialism)

    2. A MIM or MME file is a file in the Multi-Purpose Internet Mail Extensions (MIME) format that is created by some e-mail programs, including that of America Online (AOL), to encapsulate e-mail that contains image or program attachments.

    OR.....

    3. Malaysian Institute of Management (I really don't think its this one)

    So what is MIM?? Men In Mauve??
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #13
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by Xploitz View Post
    So what is MIM?? Men In Mauve??
    Usually phrased as MITM meaning "Man in the Middle".
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  4. #14
    Member
    Join Date
    Oct 2006
    Posts
    130

    Default

    Quote Originally Posted by theprez98 View Post
    Usually phrased as MITM meaning "Man in the Middle".

    Hehehe oppsie... My bad... What theprez sez!

  5. #15
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    OK Im a profiling racist Bastard. Im just trying to explain that in this field a suit, good grammer and a sporty haircut will get you a lot closer to where you want to go. OH YES you must have skills too.

  6. #16
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by purehate View Post
    OK Im a profiling racist Bastard. Im just trying to explain that in this field a suit, good grammer and a sporty haircut will get you a lot closer to where you want to go. OH YES you must have skills too.
    Unfortunately, I agree. A suit, good grammar and a sporty haircut will get you a lot closer to where you want to go.

    BUT BE AWARE!!!

    THERE ARE A LOT OF WOLVES HIDING IN SHEEP'S CLOTHING!

    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  7. #17
    Member
    Join Date
    Oct 2006
    Posts
    130

    Default

    Exactly........ Look at politicians

  8. #18
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    Ive just been reading up on social enginering this week and doing some testing and I was amazed at the results. I realized I could remote attack a network for weeks and may or may not get any where but some times you can just waltz right in like you own the place and jack in or say "excuse me miss ,can I check my E mail" this is actually called red team testing when a company hires you to enter their network by any means possible. this is where the shamen version of bt on usb is really handy

  9. #19
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by purehate View Post
    Ive just been reading up on social enginering this week and doing some testing and I was amazed at the results. I realized I could remote attack a network for weeks and may or may not get any where but some times you can just waltz right in like you own the place and jack in or say "excuse me miss ,can I check my E mail" this is actually called red team testing when a company hires you to enter their network by any means possible. this is where the shamen version of bt on usb is really handy
    I know a Redteam member, and if you met him, you'd have no idea that he knows the first thing about a computer. I like to describe him as "terminally looking like he just got out of bed".
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  10. #20
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    I think this thread has run its course...several times.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •