User Controls

Posts by notreal

  1. notreal Yung Blood


    Easy isn't Easy-E? I have no long term memory, so I... what?

    If Easy-E is dead, YEAH! Especially that Sohp is so upset! Easy-E, you know me.

    HG is in jail, Easy-E (not Easy) is dead, and I'm still crazy. Damn. Fat fuck ate himself to death, hah.


    Ziplock full of kush, are you plugged in by chance?


  2. notreal Yung Blood
    You can also use a spoon to cut shit, but unless I'm in prison I prefer to use things for what there made for.

    AT is used to schedule a task once, cron schedules a time for something to run in perpetuity. Use the right tools for the job, learn to see things like that, and become a better programmer.

    I'm not tryin to be an ass, I just am one. Nigger shit. Do things the right way. Nigger shit.

    Do it the right way, become a better programmer. Fail, suck at it, makes you a better coder. But learn the right way.

    Nigger shit right here. Nigger shit.
  3. notreal Yung Blood
    Does anyone remember OD?

    I am so secluded, I am drowning in confusion, I am substance abusive, I am feeling so secluded, so secluded

    https://www.youtube.com/watch?v=_tCe8r93HWM

    Waka flocka taco chain flame
  4. notreal Yung Blood
    Selling cocaine from the cell phone rang

    https://www.youtube.com/watch?v=-504g71bBE0
  5. notreal Yung Blood


    We need less chicks with dicks






  6. notreal Yung Blood
    you don't use psudorandom numbers to generate the new MAC, and rather than parsing ifconfig or ip for the hardware mac you 'manually' assign it.

    You don't know how to use cron jobs.

    I mean you were even going to use a proxy to outline the website, when you could view the source, use the devel tools in all modern browsers. You look at the html and recreate it in Python, C, Java, C++, C, Assembly, C, C++, Lua, C, C use C


    Wrire the curl portion of the site, and use GNU macchanger like a real man

    times like this i need to masturbate furiously
    bahhh humbug
  7. notreal Yung Blood
    There are plenty of network security tutorials: http://bfy.tw/3wwl and http://bfy.tw/3wxC

    This is a good outline: http://w3-o.cs.hm.edu/mediapool/soceanu/pmcio/Network_Security_Vulnerabilities_Threats_Attacks.pdf

    Use one of those systems as an IDS (like snort, ossec, ossim*) maybe even a honeypot (honeyd) once you learn more.
    Setup a dedicated firewall if your router isn't capable. Install custom firmware on router (openwrt, ddwrt) might be able to use ipv6 with router you have..

    Read as much as possible, try and fail and learn. Learn more about os security, maybe open bsd look into debian or rhel.


    Definitely use tor, for everything if possible. I use it for a lot of automated functionality like this: https://github.com/EtiennePerot/parcimonie.sh

    'night
  8. notreal Yung Blood
    "Now i was wondering, since we own the router and firewall what would be the next logical step in securing the rest of the network? "

    Get us some more info on the clients, see whats diddling around, what services, oses they like etc

    gj

    https://www.youtube.com/watch?v=cIzM9p3dUm8
  9. notreal Yung Blood
    It's 7AM and i've been up all night, so I don't really want to type a bunch of code but fuck it.

    By the way, if anyone wants to learn shell scripting and pen testing check outhttps://overthewire.org/wargames/bandit/

    do not use ifconfig it is soon to be deprecated.
    Highly recommended to use macchanger

    run this, or macchanger as a cron job: http://www.unixgeeks.org/security/ne...ix/cron-1.html

    [FONT=Trebuchet MS]1. IDGAF (I Don't Give A Fuck) what you do with my code*.[/FONT]
    [FONT=Trebuchet MS]2. If you claim my code as your own, you will probably just be embarrassing yourself.[/FONT]
    [FONT=Trebuchet MS]* As long as you don't use my code to make gay pronz[/FONT]
    #!/bin/sh

    # add me to cron job
    #released under IDGAF licence
    #1. IDGAF (I Don't Give A Fuck) what you do with my code*.
    #2. If you claim my code as your own, you will probably just be embarrassing yourself.
    #* As long as you don't use my code to make gay pronz.

    if [ "$(id -u)" != "0" ]; then
    echo "This script must be run as root nigga" 1>&2
    exit 1
    fi
    interface="wlan0"
    #uses IP as ifconfig is soon to be depricated
    old_mac=$(ip link show wlan0 | awk '/link\/ether/ {print $2}')
    new_mac=$(dd bs=1 count=5 if=/dev/random 2>/dev/null |hexdump -v -e '/1 "%02X-"';echo -n 00)
    echo "($interface) Changing mac [$old_mac] to [$new_mac]\n"
    # not the best
    ip link set dev $interface down
    ip link set dev $interface address $new_mac
    ip link set dev $interface up
    # better to use
    # macchanger -r $interface # fully random mac
    # macchanger -e $interface # changes device info, leaves vendor as is.
    # macchanger -p $interfaxe # go back to hardware defined value

    use curl or curl.

    Write a program that does the website part of things, and just call macchanger and all will be good for spectraL
  10. notreal Yung Blood
    I had a pretty bomb set up behind a super Walmart, gotta get some pics. If you have internet and a dry warm place to sleep your pretty much set. Thats what Richard Stallman been doing.
  11. notreal Yung Blood
    How are you going to power them though? Battery?


    You could easily run it from any rechargeable battery, the pictures in the link use a portable USB "bullet" charger sold at must grocery stores.
Jump to Top