Page 6 of 6 FirstFirst ... 456
Results 51 to 59 of 59

Thread: Learning to Hack

  1. #51
    Senior Member imported_spankdidly's Avatar
    Join Date
    Feb 2006
    Posts
    1,031

    Default

    Quote Originally Posted by Mortifix View Post
    P.S. Hot Rod sucked.
    WTH is hot rod?
    I felt like bending the bars back, and ripping out the window frames and eating them. yes, eating them! Leaping, leaping, leaping! Colonics for everyone! All right! You dumb*sses. I'm a mental patient. I'm *supposed* to act out!

  2. #52
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by spankdidly View Post
    WTH is hot rod?
    Hey, you could always be Milton.

    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #53
    Member Mortifix's Avatar
    Join Date
    Nov 2006
    Posts
    113

    Default

    For BT do you guys use Ettercap for ARP poisoning?

  4. #54
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default

    Dude seriously the best thing you can do is to start reading about what it is you want to do!
    Learn as much as you can about the subject and then learn something else if you are trying to learn how to crack wep keys then study that information. If it is running an apache server then go learn about apache servers.
    This forum has so much information that it is almost unbelievable. You have to hit the search key and then enter something else just read random threads and see where it leads you.

  5. #55
    Junior Member
    Join Date
    Nov 2007
    Posts
    97

    Default

    IMO, aside from the technical side of things, check out purehate's sig. as true as it gets.

    When I was working for a college doing network maintenence (Novell anyone?), a few of us had a bet. see how many passwords we can collect (Not for anything bad, just verify them, then reset them and inform the user to change it). The other guy's had way more technical skills than me, so I used my old favourite, social engineering.

    I won. By a large margin.

    If you put the right spin on it, people will tell you damn near anything. I got over 100 passwords, and involved about 6 hours "work" and the only thing I used on a computer was a word processor.

    Your network is only as secure as the people using it.

  6. #56
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by InSanCen View Post
    IMO, aside from the technical side of things, check out purehate's sig. as true as it gets.

    When I was working for a college doing network maintenence (Novell anyone?), a few of us had a bet. see how many passwords we can collect (Not for anything bad, just verify them, then reset them and inform the user to change it). The other guy's had way more technical skills than me, so I used my old favourite, social engineering.

    I won. By a large margin.

    If you put the right spin on it, people will tell you damn near anything. I got over 100 passwords, and involved about 6 hours "work" and the only thing I used on a computer was a word processor.

    Your network is only as secure as the people using it.
    You probably worked too hard to get those 100 as well. You probably should have just sent an email to all users from "admin" requesting that all users email their password to you.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  7. #57
    Junior Member
    Join Date
    Nov 2007
    Posts
    97

    Default

    Quote Originally Posted by streaker69 View Post
    You probably worked too hard to get those 100 as well. You probably should have just sent an email to all users from "admin" requesting that all users email their password to you.
    Nope... a simple form for my "IT Project", and buried in amongst meaningless questions was "what is your favorite password" . Of course, your name class/dept and network logon were there to fill out at the top...

    3 of the 7 IT teachers replied, which was really really worrying.

    took me longer to round up completed ones than it did to make it (And included in the 6 hours figure)

    One of the rules was that you wern't allowed to "net send" or any other form of mass network broadcast (Email etc).

  8. #58
    Jenkem Addict imported_wyze's Avatar
    Join Date
    Jul 2007
    Posts
    1,543

    Default

    Quote Originally Posted by Mortifix View Post
    For BT do you guys use Ettercap for ARP poisoning?
    So exactly what kind of information are you trying to acquire from your work network by performing a mitm or an arp cache poisoning attack?

    Is it the information you're after? Are you trying to completely screw up the network? Or are you just planning on getting your face on the wall at your job as the 'l337 Employee of the Month'?

    Whichever is the truth, I have to go with purehate in that you're a douchebag, because the only thing your going to accomplish is fu{king up some network, where someone will have to put in the extra effort to clean up your mess
    dd if=/dev/swc666 of=/dev/wyze

  9. #59
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Closing this thread.

    Its outlived its usefulness a long time ago.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 6 of 6 FirstFirst ... 456

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •