This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Silent Infiltrator

Pages: [1]
1
C - C++ / Re: What do you guys think of drag and drop GUI's c++?
« on: February 14, 2014, 01:27:59 PM »
Drag and Drop is fine. When you can code GUI's manually. If you can understand how to code GUI's and could write one yourself, then it's your decision. Me personally. I say Fuck coding those annoying pieces of shit lol.

2
Hacking and Security / Re: to block facebook in office
« on: February 12, 2014, 08:53:32 PM »
No I was not aware of that. But security is not a major factor here, is it?

Also as for that example you just gave, no fucking idea what it is. I am a newcomer to networking, still studying it.

3
Hacking and Security / Re: to block facebook in office
« on: February 12, 2014, 08:46:07 PM »
No I dont ?
Setting up a VPN is more work than an SSH tunnel , that is basically one command,  pretty much unbeatable.
Not to mention that VPN traffic is more likely to be blocked.

True about the VPN traffic, however if you use a PPTP VPN, it is very simple and is as easy as entering a username and password. And obviously the address for the first use.

Everyone to their own :)

4
Hacking and Security / Re: to block facebook in office
« on: February 12, 2014, 08:41:27 PM »
But do you not agree using a VPN would be "easier"?

5
Hacking and Security / Re: password AfXNtpa38x
« on: February 12, 2014, 07:00:32 PM »
I have literally 0% with IP cams. But my personal instincts would say that a certain brand must use this password, or a certain model?

6
Hacking and Security / Re: Unban from a physical network
« on: February 12, 2014, 06:56:40 PM »
Yeah proxx said prett much everything, do you even obtain a local IP from the DHCP server? If not try to assign a static one... Worked for me once!  ;D I'll check back here when there is something more to go on :)

7
Well, 10/1 they have everything logged and also have passwords enabled. I would not suggest trying to bruteforce/use dictionary attacks trying to obtain it. Your best bet would be to keylogg a teachers' laptop or desktop in the hope of them entering the password.

8
Hacking and Security / Re: hackcheck
« on: February 12, 2014, 06:51:44 PM »
Pretty much what DarkVision said... What Kernel are you using? I know for a fact that that plays a very big part in root exploits.

9
Hacking and Security / Re: Signals Disrupted
« on: February 12, 2014, 06:49:40 PM »
NSA watchin' you son. Prepare your anus...

Not too sure to be honest. Does this prevent wifi devices from reaching the gateway also? When it is next down, ping your gateway(in my experience usually either 192.168.(0/1).(1/254) from a wifi-enabled device and report back here what is going on...

10
I am not sure I understand what you're asking. A MAC address is a unique address or "identifier" assigned to your network device when it is in production.

But when you're on a network, such as your home network or school network, for packets etc to travel to their destination they need to know where to go, so they find their destination essentially through IP address.

The way it works is:

You, the client connect to the network.
You request an IP address from the router
Router gives you an IP address and stores what MAC address is assigned to that IP address
When data comes through that is destined to you, it checks it up with the router and sees what MAC address is asgined to your IP. Data delivered!

There are many ways to essentially "change" or "spoof" your MAC address. As always Google is your friend for such tools, I use "mac changer".

11
Hacking and Security / Re: to block facebook in office
« on: February 12, 2014, 06:42:42 PM »
VPN would probably be best. Or you could use SSh tunneling but that would not be the "simplest" method...

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.