Results 1 to 10 of 10

Thread: check this non-sense out

  1. #1
    Just burned his ISO
    Join Date
    Oct 2006
    Posts
    24

    Default check this non-sense out

    I don't think this is ohh soo easily possible. To get someone screen feed you need access to their remote desktop or install some kind of back door both of which are 100% out of wireless security scope. And lets not forget the claimed "readily available software". I haven't heard one which will crack WEP and show me someone screen feed. Geez..bad example of how media will spoon feed propaganda to make some quick buck and stir controversy. Someone keep a check on them for god sake.

    video link:

    youtube.com/watch?v=pgBHjZUKW54

  2. #2
    Member elazar's Avatar
    Join Date
    Sep 2007
    Posts
    217

    Default

    Aside from a BoF attack which could run some shellcode and then install VNC like software, this is would be technically impossible. Assuming at least one is running XP SP2 with the firewall enabled, you will not be able to use open shares or connect to RPC to execute files. Remember, HKLM\SYSTEM\CurrentControlSet\Control\Lsa is you best friend and worst enemy...

  3. #3
    Junior Member wvdmc's Avatar
    Join Date
    Jul 2007
    Posts
    32

    Default

    What about using the remote browser plugin for Ettercap? All the information they gathered was his web activity and e-mail. All they needed to do was get into the network and run Ettercap.

  4. #4
    Member elazar's Avatar
    Join Date
    Sep 2007
    Posts
    217

    Default

    From the look of the video, it looks like they were doing a screen scrape, which is impossible with ettercap.

  5. #5
    EnculeurDePoules
    Guest

    Default

    Quote Originally Posted by theboss View Post
    I don't think this is ohh soo easily possible. To get someone screen feed you need access to their remote desktop or install some kind of back door both of which are 100% out of wireless security scope. And lets not forget the claimed "readily available software". I haven't heard one which will crack WEP and show me someone screen feed. Geez..bad example of how media will spoon feed propaganda to make some quick buck and stir controversy. Someone keep a check on them for god sake.

    video link:

    youtube.com/watch?v=pgBHjZUKW54
    ha its very easy, if you exploit the official security flaws!
    im not sure if im allowed to post that but we installed a "fake os" with WMware? (virtualisation) and a XP unpatched, and we tried the flaw with a software called metaxploit!
    its amazing what you can do! My friend even created an account with admin privileges on my computer, "under my nose"!!
    We could also download and execute a .exe without the firewall or antivirus to notice!
    I mean the point is, you need to always keep up to date with security! thats the "scope" you are talking about?

  6. #6
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by EnculeurDePoules View Post
    ha its very easy, if you exploit the official security flaws!
    im not sure if im allowed to post that but we installed a "fake os" with WMware? (virtualisation) and a XP unpatched, and we tried the flaw with a software called metaxploit!
    its amazing what you can do! My friend even created an account with admin privileges on my computer, "under my nose"!!
    We could also download and execute a .exe without the firewall or antivirus to notice!
    I mean the point is, you need to always keep up to date with security! thats the "scope" you are talking about?
    Unless you installed a thirdparty firewall on the machine, then the XP wouldn't have a firewall installed unless you upped it to Sp2.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  7. #7
    Member elazar's Avatar
    Join Date
    Sep 2007
    Posts
    217

    Default

    Quote Originally Posted by EnculeurDePoules View Post
    ha its very easy, if you exploit the official security flaws!
    im not sure if im allowed to post that but we installed a "fake os" with WMware? (virtualisation) and a XP unpatched, and we tried the flaw with a software called metaxploit!
    its amazing what you can do! My friend even created an account with admin privileges on my computer, "under my nose"!!
    We could also download and execute a .exe without the firewall or antivirus to notice!
    I mean the point is, you need to always keep up to date with security! thats the "scope" you are talking about?
    Sadly, there are a lot of those out there...

  8. #8
    Junior Member
    Join Date
    Jan 2010
    Posts
    66

    Default This will do it!

    eeye.com/html/products/iris/ will sniff the network and re-assemable the packets in near real-time.

    I heard about this product years ago and it looks like now they've got a free trial.

    Quote Originally Posted by iris
    Complete Packet Reconstruction

    Reconstruct files and web-browsing sessions back into their original format on the local network, capturing a clear and concise image of the integrity of the network and associated traffic.
    You'll see their "web window" is running inside another program but not a VNC session.

  9. #9
    Just burned his ISO
    Join Date
    Oct 2006
    Posts
    24

    Default

    Quote Originally Posted by EnculeurDePoules View Post
    ha its very easy, if you exploit the official security flaws!
    im not sure if im allowed to post that but we installed a "fake os" with WMware? (virtualisation) and a XP unpatched, and we tried the flaw with a software called metaxploit!
    its amazing what you can do! My friend even created an account with admin privileges on my computer, "under my nose"!!
    We could also download and execute a .exe without the firewall or antivirus to notice!
    I mean the point is, you need to always keep up to date with security! thats the "scope" you are talking about?
    We all are well aware of it and experienced it at some point in life. Thats how all the nasty adware & malware gets installed on your computer after visiting unsafe site. However, all of that falls in a universe other than wireless security. You can show off hacked screen feeds to highlight vulnerability of some OS however network medium has least to do with it.

  10. #10
    EnculeurDePoules
    Guest

    Default

    Quote Originally Posted by theboss View Post
    We all are well aware of it and experienced it at some point in life. Thats how all the nasty adware & malware gets installed on your computer after visiting unsafe site. However, all of that falls in a universe other than wireless security. You can show off hacked screen feeds to highlight vulnerability of some OS however network medium has least to do with it.
    haa I realize now that I have seen some urls looking exactly like in metaxploit, for the "url exploits"!!

    aha bastards!
    I actually never thought it was used except for simple hackers!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •