User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 113
  6. 114
  7. 115
  8. 116
  9. 117
  10. 118
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158

Posts by SBTlauien

  1. SBTlauien African Astronaut
    Originally posted by ACE Make your own from steak knives and a dremel/cutting wheel. Anything like that should be disposable anyway. Trying to pick a lock is aggravating as fuck though…then again anything like that is. I wonder about these though:


    I've never actually made one of these and personally wouldn't want one, but you could make one from an electric toothbrush(see the video below). I hear they are loud and usually used by the skillless.

    https://www.youtube.com/watch?v=OipPU2la6Tk
  2. SBTlauien African Astronaut
    Originally posted by Totse 2001 Problem is in post 9/11 (thanks to Bush) this sets off alarms. anything goes down in your neighborhood and you suddenly get a visit. but that might be amusing.

    If they can't prove to a jury that you're guilty beyond a reasonable doubt, let alone collect enough evidence, then they really can't do much aside from harass you and detain you. They could illegally frame you, and/or illegally beat you, but legally they can't do to much. Unless it's illegal to pocess lockpicks where you live or you're on probabation/parole.
  3. SBTlauien African Astronaut
    Originally posted by Lanny So are PoC or technical descriptions part of the exploits part of the leak or do it just have documents suggesting such things exist?

    I only see documents showing names of exploits. Although I did find a couple PDF books that look like nice reads.

    Edit: And a lot of redacted documents.
  4. SBTlauien African Astronaut
    The thing I find the most retarded about this, are the people that seem to be surprised that this can all happen. I mean, it's been known for a very long time that government agencies practice digital spying by using any electronic devices available.

    It's always good practice to know your devices and physically disable things you won't need(camera, mic, Bluetooth, wifi, NFC, even speakers). Most people don't need to worry though, they are nobody's, and don't exist in the eyes of these government agencies. But some need to know certain rules...
  5. SBTlauien African Astronaut
    What I read is that a certain cyber security firm that would only benefit greatly by saying that this particular hack by Russia happened, said that it happened but wasn't able to provide any proof what-so-ever.

    I think it would have exploded by now if it did actually happen.
  6. SBTlauien African Astronaut
    Originally posted by -SpectraL You don't scare me.

    Do I?
  7. SBTlauien African Astronaut
    Is it just me or is this site running slow. I know it's not my connection as other sites are loading fine, it's this one.
  8. SBTlauien African Astronaut
    Originally posted by Sophie I'm pretty sure you know but just to be clear, exploits on exploit-db aren't 0days, at least not anymore.

    For this VM it is.

    I'll tinker with it some more.
  9. SBTlauien African Astronaut
    Originally posted by Rhymin Hymen Nahhh dude. Just go to the hospital and say to the nurse "I want to kill a LOT of people"

    Hospitals cost a lot.
  10. SBTlauien African Astronaut
    Originally posted by SCronaldo_J_Trump Damn $60 for a hobby I wish, I can spend a few hundred $$ just buying the basics for mine


    I started off by just using paper clips and raking locks open. I was able to open a handful of locks, took the locks out, took back to my place, took apart, inspected the pins, made my own key, put the lock back together, went back to where the lock was originally, put the lock back in, and my projects turned out really well. Got out of that stuff though...
  11. SBTlauien African Astronaut
    Originally posted by Bill Krozby man it happens dude, i've been accused of rape at least 10 times by girls and never actually raped any of them, just acted like a dick.
    I was even once taken to a svu detective unit by the pigs one night because a girl accused me of "mouth rape"

    I'd be really careful of that shit. Just be nice and slowly cut them off like a gentleman.
  12. SBTlauien African Astronaut
    Originally posted by Bill Krozby Does what itch? Having a beard? no.. not to me anyways. I scratch it and rub it because it feels good.

    Are you sure you're not scratching and rubbing it because it itches?
  13. SBTlauien African Astronaut
    Originally posted by Sophie Why can't you just make a soft metal alloy key blank and hammer into the lock so that it assumes it's shape.

    Hammer? You'd probably break/bend pins and possibly warp the cylinder(or whatever it's called). Might as well drill in that case.
  14. SBTlauien African Astronaut
    Originally posted by Sophie Uhuh, making choices is very scary. I had to call my therapist to ask her whether or not i should even make this post, she said and i quote "Yeah you should, fuck Bill Krozby".

    God you must be wealthy in order to afford a therapist.
  15. SBTlauien African Astronaut
    Originally posted by Lanny Oh, I see what you're saying. Hmm, I guess yeah, if you load the image by punching it into your address bar and the server responds with an html content type then yeah, maybe the browser will interpret it as a document, and maybe the parser will find some way to discard the binary slop. But it won't work if you embed it in another page. Content type is largely ignored when loading images from an img tag in some other page. Once you load it on a separate page then the page takes on that domain as its origin, so you can't like inject a malicious script to make posts on niggasin.space because that's now a cross-domain request.

    Is there a use case for this? XSS is out and if you have some exploit that requires JS execution you already have the user on the page, so you can just serve a regular document. Is the idea that it's easier to get a user to click an image than lure them to a shady webpage?

    I see. So it wouldn't work if it were cross domain, unless the user for some odd reason had that enabled. I was thinking that when my browser loads the page that your server serves, and it comes across that specific tag(<img src="http://i.imgur.com/Uht7g2R.png">), that it does a full request of the image's URL from that server.
  16. SBTlauien African Astronaut
    I was really hoping that it'd work. What are the reasons a 0day would work on one OS and not on another, asides from 32/64, amd/intel, and version? Could it be because I'm running an AMD processor?
  17. SBTlauien African Astronaut
    Originally posted by Lanny If it works as described then yes, but that couldn't be, every site that allows user embedded images would be exposed, if you can load JS then you can take arbitrary user actions, the whole browser security model is built around the assumption that only the host, client, and trusted parties can execute client scripts.

    http://niggasin.space/thread/8183

    So when the op in the above thread posted his giant image, the tag is...

    <img src="http://i.imgur.com/Uht7g2R.png">

    Doesn't this tag request that particular image from that server(i.imgur.com)? And wouldn't that mean that that server(if it were malicious) could serve that image as text/javascript?

    Right now on my server, if you request the image below, I have it set up to serve the image as "text/html". The URL shows it as a .png image, but when served from my server, the css shows a little box moving around and when it's clicked on, it displays "SBTlauien". You can see the css code within the image, I didn't hide it.

    http://www.angelfire.com/un/sbt/images/hat.png

    On AngleFire it obviously wont work because I can't choose to serve it as "text/html".

    Would you be willing to host this image so that I could try to display it on my AngleFire site to see if the css script works?
  18. SBTlauien African Astronaut
    Originally posted by Sophie Honestly if you can only work as a non-sudoer i think you need to look for a different exploit, are permissions lax on any other components to do with the kernel?. But, and i assume you are testing this against a VM, just for kicks, try to see what happens if you do indeed set the permissions so that the exploit can open the proper sockets.

    Again, like i said, i am just some random person on the internet i really am no expert on kernel exploits.

    lol, duh, found out what it was duh. I needed to set the file as executable =). After doing that it ran, but the exploit didn't work. It said "something went wrong =(" and then said "don't kill the exploit binary, the kernal will crash". So I tried killing it and it wont go away. Nothing crashed though.
  19. SBTlauien African Astronaut
    I currently work in retail and I had some kid call the store once saying that he was in the bathroom and there was no toilet paper. I told him I was one my way, and went back slacking.
  20. SBTlauien African Astronaut
    Originally posted by Totse 2001 Be careful.. the laws aren't clear. I wanted to take on this trade after my going no wear job had to have a lock replaced out next to my desk. I watched the locksmith.. he was showing me how he files keys down.. the pins rub against the blanks.

    Sounds like impressioning. https://mylockpickingworld.com/impressioning-3/ (I actually haven't read this page, it was the first thing that "Impressioning" showed via a Google search)

    It's basically putting a key blank into the lock(keyway has to match), turning it so that the pins bind, then forcefully pulling the key upwards so that the most bound pin will make a mark on the edge of the key blank. This is done in both directions. Then a file is used to slightly file off a bit of the key blank exactly where the marks were made. The process is repeated and you're suppose to end up with a working key. I've actually never successfully pulled it off though but also have never actually tried to finish the process.

    As far as books for a beginner goes, I would suggest, hands down, these two books...

    https://www.amazon.com/Practical-Lock-Picking-Second-Penetration/dp/1597499897

    https://www.amazon.com/Keys-Kingdom-Impressioning-Privilege-Escalation/dp/1597499838

    Both are written by Deviant Ollam and are actually enjoyable reads.

    You'll learn in the first book that you really are only going to need basic lock picks, but tension tools are what you'll usually want a lot of. Get a cheap, small, toolset. Don't get one of the "Master Locksmiths" kits that folds out like a binder.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 113
  6. 114
  7. 115
  8. 116
  9. 117
  10. 118
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158
Jump to Top