User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 116
  6. 117
  7. 118
  8. 119
  9. 120
  10. 121
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158

Posts by SBTlauien

  1. SBTlauien African Astronaut
    Is there a bounty for niggasin.space?
  2. SBTlauien African Astronaut
    Wish I had a facebook...
  3. SBTlauien African Astronaut
    Guess I'm going to have to start learning about some these tools(Metasploit specifically). Bufferoverflows as well.
  4. SBTlauien African Astronaut
    I think I found my answer. It looks like I would have to find a vulnerability for what ever service is running on that particular port.

    Is it a dead end if Lanny open had port 80 open?
  5. SBTlauien African Astronaut
    ^Oh gawd.

    New rule, no DOS type attacks. Actual, real attacks that require at least a small amount of skill.
  6. SBTlauien African Astronaut
    Originally posted by -SpectraL I have intent. Don't you worry about that.

    I have a lot of intents as well. Some implicit, some explicit.
  7. SBTlauien African Astronaut
    Let's say hypothetically, that I was on a mission to attack niggasin.space. Lanny had rubbed me the wrong way(sexually) and I was going after his server for revenge. If I didn't want to attack his site via a potential web application vulnerability, what other options would I have?

    Let's split the question and say in one scenario that he had a bunch of port open(like 22, 25,X 80, 443, 631...all were for the default protocol), and the other scenario he only had 80 and 443 open.
  8. SBTlauien African Astronaut
    Don't most people use fake info on these?
  9. SBTlauien African Astronaut
    Originally posted by Lanny You know blowing a federal agent's cover is a serious crime, right?

    Only if it's intentional.
  10. SBTlauien African Astronaut
    Originally posted by Sophie Dude… The benefits are pretty compelling.

    1. Free attendance at HackerCons.
    2. Travel. All expenses paid.
    3. Cutting edge gubmint spy technology.
    4. Get out of jail free card.

    I have been considering following CompSci and InfoSec courses in my free time to get some formal training and in-depth knowledge. Wonder if they'd approach me. Wonder what i would do. Being a spy for the intelligence community seems like a pretty dope job to be frank.

    Think about it more though. Organized crime groups are involved in cyber crime and that's who you'll be ratting on. If they were to find out who you are...

    It's been well known that different forms of law enforcement don't really care about the safety of informants.

  11. SBTlauien African Astronaut
    Originally posted by Hash Slinging Slasher sudo rm -rf /

    Damn you!
  12. SBTlauien African Astronaut
    Originally posted by -SpectraL The local ports are sequentially opened, starting from whatever, right up to 65535, but usually not that high.

    On my phone they skip a few ports each time.
  13. SBTlauien African Astronaut
    Originally posted by SCronaldo_J_Trump I figure when some cool hacker dude is showing me some encrypted chat program he's actually recording everything we say and building a case on me.

    Case on you? In order to do that, you must be doing something. What is it you do? Maybe we could chat privately or meet somewhere is person to discuss these things you do. I have an friend(always wearing a suit with tie) that also would like to meet you and listen to you talk about some of these things that you do.
  14. SBTlauien African Astronaut
    The correct answer...

    .replaceFirst
  15. SBTlauien African Astronaut
    Originally posted by aldra yeah I remember reading this article back when it was written, I think it's always been the case, really - most of the 'hackers' they're referring to are in it for their ego which doesn't suggest loyalty is high on their list of priorities, and considering the aggressive nature of attacking systems many seem to neglect more general skills

    I bet most weren't flipped. They're probably just pussies looking for a little reward cash.
  16. SBTlauien African Astronaut
    Originally posted by TreyGowdy When you connect to a website at say niggasin.space:80 (wtf lanny no ssl?), your computer will pick a random source port to use. I don't know how it works, but these don't show up as open. I'm not really sure how it works and how these don't show open but still recieve packets.

    Actually, they do show up as open in /proc/net/{tcp, tcp6}, not with 'netstat' though.

    It appears as if the browser checks to make sure the port isn't aleady open and then uses it. It also seems that browsers likes to start in the 5xxx range. "Keep-alive" will actually use the same port for multiple requests, up to a specific time(this is based on the server and I read somewhere that there is a general time limit but can't remember. It's like 10 seconds or something).

    I've since made my program so that I can press a little play button and it'll refresh the contents of the four files(/proc/net/{tcp, tcp6, udp, udp6} and keep track of what is opening and what is closing. I just don't understand why there is so much activity even though I'm not doing anything.
  17. SBTlauien African Astronaut
    It's an old article but I thought I'd share.

    The bureau is really amping up the war on hackers with informers.

    https://www.theguardian.com/technology/2011/jun/06/us-hackers-fbi-informer

    The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established.

    Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.

    In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as "carders" – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.

    So ubiquitous has the FBI informant network become that Eric Corley, who publishes the hacker quarterly, 2600, has estimated that 25% of hackers in the US may have been recruited by the federal authorities to be their eyes and ears. "Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation," Corley told the Guardian.

    "It makes for very tense relationships," said John Young, who runs Cryptome, a website depository for secret documents along the lines of WikiLeaks. "There are dozens and dozens of hackers who have been shopped by people they thought they trusted."

    The best-known example of the phenomenon is Adrian Lamo, a convicted hacker who turned informant on Bradley Manning, who is suspected of passing secret documents to WikiLeaks. Manning had entered into a prolonged instant messaging conversation with Lamo, whom he trusted and asked for advice. Lamo repaid that trust by promptly handing over the 23-year-old intelligence specialist to the military authorities. Manning has now been in custody for more than a year.

    For acting as he did, Lamo has earned himself the sobriquet of Judas and the "world's most hated hacker", though he has insisted that he acted out of concern for those he believed could be harmed or even killed by the WikiLeaks publication of thousands of US diplomatic cables.

    "Obviously it's been much worse for him but it's certainly been no picnic for me," Lamo has said. "He followed his conscience, and I followed mine."

    The latest challenge for the FBI in terms of domestic US breaches are the anarchistic co-operatives of "hacktivists" that have launched several high-profile cyber-attacks in recent months designed to make a statement. In the most recent case a group calling itself Lulz Security launched an audacious raid on the FBI's own linked organisation InfraGard. The raid, which was a blatant two fingers up at the agency, was said to have been a response to news that the Pentagon was poised to declare foreign cyber-attacks an act of war.

    Lulz Security shares qualities with the hacktivist group Anonymous that has launched attacks against companies including Visa and MasterCard as a protest against their decision to block donations to WikiLeaks. While Lulz Security is so recent a phenomenon that the FBI has yet to get a handle on it, Anonymous is already under pressure from the agency. There were raids on 40 addresses in the US and five in the UK in January, and a grand jury has been hearing evidence against the group in California at the start of a possible federal prosecution.

    Kevin Poulsen, senior editor at Wired magazine, believes the collective is classically vulnerable to infiltration and disruption. "We have already begun to see Anonymous members attack each other and out each other's IP addresses. That's the first step towards being susceptible to the FBI."

    Barrett Brown, who has acted as a spokesman for the otherwise secretive Anonymous, says it is fully aware of the FBI's interest. "The FBI are always there. They are always watching, always in the chatrooms. You don't know who is an informant and who isn't, and to that extent you are vulnerable."
  18. SBTlauien African Astronaut
    I tried lightly stretching and it help at first but now it still hurts. Slightest movement is painful.

    https://www.youtube.com/watch?v=lRuxedRI2q4?format=html&url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DlRuxedRI2q4

    https://www.youtube.com/watch?v=l?format=html;url=http://tizag.com/;

    Post last edited by SBTlauien at 2017-03-07T01:05:55.834681+00:00
  19. SBTlauien African Astronaut
    Originally posted by -SpectraL Yes, but you were talking about connecting to a remote machine and that port opening due to being scanned.

    I was? Where? The port scanning that I've been talking about, has been directed at my own device, simply to find out which ports are open.
  20. SBTlauien African Astronaut
    Is this another agent?
  1. 1
  2. 2
  3. 3
  4. ...
  5. 116
  6. 117
  7. 118
  8. 119
  9. 120
  10. 121
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158
Jump to Top