User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 1032
  6. 1033
  7. 1034
  8. 1035
  9. 1036
  10. 1037
  11. ...
  12. 1897
  13. 1898
  14. 1899
  15. 1900

Posts by -SpectraL

  1. -SpectraL coward [the spuriously bluish-lilac bushman]
    User was struck down for saying the taboo phrase "god"!
  2. -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by MORALLY SUPERIOR BEING V: A Cat-Girl/Boy Under Every Bed

    Every single financial donor should have sued him for their money back in 2016. He never had any intention of delivering for his supporters. He's nothing but a lousy fraud.
  3. -SpectraL coward [the spuriously bluish-lilac bushman]
    He "climbed" the tallest mountains in a multi-million-dollar helicopter. Same way they "hunt" animals in cages. These clowns are ridiculous. First it's full-blooded Indians, now it's Sir Edmund Hillarys.
  4. -SpectraL coward [the spuriously bluish-lilac bushman]
    Bernie threw the last election for Hillary for a house for himself and defrauded all his donors. Now, he's "running" again. Pretty comical shit.
  5. -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by vindicktive vinny is lanny running shellcodes on our machines ?

    He's given psychomanthis free reign of the server, so there's no doubt in my mind psycho's been trying to run malicious scripts, and of course psycho now has everyone's IP addresses.
  6. -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by vindicktive vinny so in short, we're raped irregsrdless ?

    If you are allowing all two-way traffic on an TCP-IP port, then that's a given risk right there. Legitimate companies are now using shellcode to compromise your device to hijack your CPU to mine bitcoin. Nothing is sacred these days, because there's really no solid legal restrictions in place.
  7. -SpectraL coward [the spuriously bluish-lilac bushman]
    What they basically do is run some shellcode on you when you connect through standard HTTP, which creates a shell within your system they can then launch from. Then they delete everything and you're none the wiser. All of this occurs in seconds. The best way to defeat this is to use a rule-based firewall which can also handle process control. If the attacker attempts to start a process, the rule detects it and blocks it, however, if you don't approve it, you will not be able to make the connection properly.
  8. -SpectraL coward [the spuriously bluish-lilac bushman]
    The Republicans are just as inept and corrupt and just as much a threat as the Democrats, just in different ways. The Republicans had control of both the House and Senate and chose to do absolutely shit squat about anything. They also backstab any kind of progress at every turn. The crony capitalist pigs also have them in their back pocket. Both parties are a complete sham and an insult to the American people. They only give you two parties to give you the illusion of choice, but you don't really have any. They're all just a giant pack of despicable crooks.
  9. -SpectraL coward [the spuriously bluish-lilac bushman]
    TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote machine's operating system (aka, OS fingerprinting), or incorporated into a device fingerprint.

    Certain parameters within the TCP protocol definition are left up to the implementation. Different operating systems, and different versions of the same operating system, set different defaults for these values. By collecting and examining these values, one may differentiate among various operating systems, and implementations of TCP/IP. The TCP/IP fields that may vary include the following:

    Initial packet size (16 bits)
    Initial TTL (8 bits)
    Window size (16 bits)
    Max segment size (16 bits)
    Window scaling value (8 bits)
    "don't fragment" flag (1 bit)
    "sackOK" flag (1 bit)
    "nop" flag (1 bit)

    These values may be combined to form a 67-bit signature, or fingerprint, for the target machine. Just inspecting the Initial TTL and window size fields is often enough in order to successfully identify an operating system, which eases the task of performing manual OS fingerprinting.

    https://en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting
  10. -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by MORALLY SUPERIOR BEING V: A Cat-Girl/Boy Under Every Bed What's a Paki? I thought you were American.

    A Paki is a race, isn't it?

    Race isn't real.

    He's Captain Falcon.
  11. -SpectraL coward [the spuriously bluish-lilac bushman]
    Of course. Another excellent avenue is SOCKS4/5 proxies. They, too, can be configured to cycle through rotating IP addresses, although browser identifiers would have to be spoofed, which is very easily accomplished.

    http://fastproxyservers.org/socks5-servers.htm
  12. -SpectraL coward [the spuriously bluish-lilac bushman]
    What works best is CGI proxies. They're free and plentiful. Many of them have rotating IP addresses, where every connection you make gets a new IP, often from a different country, so the only way you can be pinpointed is by the fingerprint identifiers from the browser and device you are using.

    https://en.wikipedia.org/wiki/Device_fingerprint

    Active vs passive collection

    Fingerprinting methods range from passive to active. Passive fingerprinting refers to techniques which do not involve the obvious querying of the client machine. These methods rely upon precise classification of such factors as the client's TCP/IP configuration, OS fingerprint, IEEE 802.11 (wireless) settings, and hardware clock skew. Active fingerprinting assumes the client will tolerate some degree of invasive querying. The most active method is installation of executable code directly on the client machine. Such code may have access to attributes not typically available by other means, such as the MAC address, or other unique serial numbers assigned to the machine hardware. Such data is useful for fingerprinting by programs that employ digital rights management.

    OSI model fingerprints

    Passive collection of device attributes below the web-browser layer may occur at several OSI model layers. In normal operation, various network protocols transmit or broadcast packets or headers from which one may infer client configuration parameters. Sorted by layer, some examples of such protocols are:

    OSI Layer 7: SMB, FTP, HTTP, Telnet, TLS/SSL, DHCP
    OSI Layer 5: SNMP, NetBIOS
    OSI Layer 4: TCP (see TCP/IP stack fingerprinting)
    OSI Layer 3: IPv4, IPv6, ICMP, IEEE 802.11
    OSI Layer 2: CDP
  13. -SpectraL coward [the spuriously bluish-lilac bushman]
    His hair is messy at times because he's actually a President who's out there getting shit done. If his hair was all neat and not a hair out of place, he'd probably be a useless President like Obama, who just hid out in the Oval Office and never really did anything but a lot of damage to the country. The crazy liberal loons only care about looks, whereas the sane people just care about results.
  14. -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by vindicktive vinny but you already mentioned it,

    its only appropiate to show it,

    now.

    We'll use it as an appetizer.
  15. -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by vindicktive vinny should i show them the exhibit ?

    Not yet. We will spring it as a surprise piece of discovery near the end.
  16. -SpectraL coward [the spuriously bluish-lilac bushman]
    We're watching two tyrants subtly battle it out between the lines.
  17. -SpectraL coward [the spuriously bluish-lilac bushman]
    It's here because even psychomanthis, a known Zoklet tyrant, card-carrying lifetime member of the Fun Bunch himself, agrees infinityshock shouldn't have been off'd the way it went down.
  18. -SpectraL coward [the spuriously bluish-lilac bushman]
    All the liberal radicals can do is froth at the minutia, like hair, hand size, diet, weight... all the stuff nobody in their right mind would even care about. I mean, who in their right mind really gives two flying fucks how another guy combs his hair if he's doing a great job? Only an idiot liberal, really. Eating Tide pods, sticking condoms up their noses, wearing pussy hats. They really are a running joke.
  19. -SpectraL coward [the spuriously bluish-lilac bushman]
    And just imagine the amount of trauma Lanny has suffered, after being de-modded and booted for life from Zoklet. It was all the kid had, really. Banished by his peers. People who he always thought were his true friends. That's really gotta damage a person. Which brings up the obvious question: would Lanny attempt to transfer, or shed, if you will, redirect, that angst onto a member like vindictive vinny? This strikes directly at the heart of this prosecution, Your Honor.
  20. -SpectraL coward [the spuriously bluish-lilac bushman]
    Bill would have been the first First Gentleman.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 1032
  6. 1033
  7. 1034
  8. 1035
  9. 1036
  10. 1037
  11. ...
  12. 1897
  13. 1898
  14. 1899
  15. 1900
Jump to Top