User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 119
  6. 120
  7. 121
  8. 122
  9. 123
  10. 124
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158

Posts by SBTlauien

  1. SBTlauien African Astronaut
    Here is one from South Korea.

    211.192.43.253 ... Korea Telecom?

    These are in my proc/net/tcp file. Why?
  2. SBTlauien African Astronaut
    I'm not so concerned with the 198.0.* addresses anymore. I had thought those were on my LAN and didn't realize that they were public IP address.

    So what does each, the 'local address' and the 'remote address', mean within "proc/net/tcp"?

    This is where I am getting these IP addresses that point to these proxies.

    Post last edited by SBTlauien at 2017-01-21T00:17:53.934617+00:00
  3. SBTlauien African Astronaut
    Would you be willing to help me finish up a little Python/Bash program I had started? Basically it's suppose to disconnect from a wifi network every 55 minutes, spoof the NIC mac address, reconnect to the wifi network, login either using existing credentials(only if they haven't been used in the last 32 days) or login by creating new credentials(and store these with the current date in a file).

    It is to be ran on a Linux system(rPI preferably), but Ubuntu is what I was testing it on.
  4. SBTlauien African Astronaut
    It's possible. I've actually wondered if Lanny does this. Like right now as I'm typing this post, but haven't hit the 'submit' button yet, Lanny could have a script running that logs in what I type.

    I don't know if it would be possible without javascript though.
  5. SBTlauien African Astronaut
    Originally posted by Sophie Isn't WebProxy Pre-Alphe just the name of the server/type of service they have running on that port? Also it would seem it's a bunch of IoT nodes connected to the network you are on. AirOS and the PowerBeam bullshit seems to be some type of repeater.

    https://www.ubnt.com/airmax/powerbeam-ac-iso/

    Here is an idea, try some default credentials. See what the control panels say if anything.

    Yes, but I am noticing a whole bunch of them. I'm looking in /proc/net/{tcp, tcp6, udp, upd6} files. I have a bunch of IP addresses that lead me to this type of server. Are these enhancementing proxies set up by Sprint?

    Like this one, that's in Germany...213.9.111.23..."port-213-009-111-022.dsl.getacom.de"
    Or this one that's in Europe...136.173.229.192..."European Parliament"

    When you connect to these on port 80, and send a basic "GET" request(requesting /), do you also get a server type of "WebProxy/1.0 Pre-beta"?

    I'm trying to figure out why my socket connections return this type of server on many of my open ports. It could be something with my connection though. If I connect to the IP of this site(niggasin.space...167.88.112.49), I get a "set up your server" page, but if I change the host parameter to "niggasin.space", I get this site. So my raw connections seem to be working, but I want to know what these "WebProxy/1.0 Pre-beta" servers are.
  6. SBTlauien African Astronaut
    What about this WebProxy/1.0 Pre-beta?
  7. SBTlauien African Astronaut
    Originally posted by Parker Brother I use Kdenlive for video editing in Linux. You might also give Blender a try. I've never used its video editing capabilities, but I've heard good things.

    Same here. It's free and runs on Linux. I've used Blender but not for editing video. Blender is more for animation and 3D art.
  8. SBTlauien African Astronaut
    lol I want to be a voice over guy to video game and movies like that chick in beyonetta 3 who complained in twitter she wasnt paid enough. who showed white and female privilege right jig? or entitlement? which of the two would you call it?
  9. SBTlauien African Astronaut
    test
  10. SBTlauien African Astronaut
    %25 of all Mongo DB on the net. Damn.
  11. SBTlauien African Astronaut
    I never learned lambdas but I started. It didn't seem like something needed. Correct my if I'm wrong.
  12. SBTlauien African Astronaut
    Somebody is working on a banning.

    Anyways, this one works...

    https://github.com/m0nad/ARP-Poison

    but, what I'm getting isn't that great. I ran the attack against my PC, with my LG Tribute, using my HTC phone as a hotspot for internet connection. After clicking through a bunch of pages here(on my PC), all I found that was somewhat readable was this...


    ----------------------------------------------------------------
    TCP Packet
    Ethernet Header
    |-Destination Address : 00-10-41-C1-11-31
    |-Source Address : 00-20-C2-52-32-32
    |-Protocol : 8
    IP Header
    |-IP Version : 0
    |-IP Header Length : 0 DWORDS or 0 Bytes
    |-Type Of Service : 144
    |-IP Total Length : 19653 Bytes(Size of Packet)
    |-Identification : 4664
    |-TTL : 202
    |-Protocol : 82
    |-Checksum : 14134
    |-Source IP : 8.0.69.0
    |-Destination IP : 1.203.50.246
    TCP Header
    |-Source Port : 144
    |-Destination Port : 19653
    |-Sequence Number : 305660096
    |-Acknowledge Number : 3394385718
    |-Header Length : 0 DWORDS or 0 BYTES
    |-Urgent Flag : 0
    |-Acknowledgment Flag : 0
    |-Push Flag : 0
    |-Reset Flag : 0
    |-Synchronize Flag : 0
    |-Finish Flag : 0
    |-Window : 17664
    |-Checksum : 459
    |-Urgent Pointer : 63026
    -----------------Data Pay Load-------------------
    ..L..8...R76..E...2.@.@.w......e4....PGi.....F€...............Z.
    ..GET /hyI8Qctb.png HTTP/1.1..Host: i.imgur.com..Connection: kee
    p-alive..User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit
    /537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36..
    Accept: image/webp,image/*,*/*;q=0.8..Referer: http://niggasin.s
    pace/thread/5217..Accept-Encoding: gzip, deflate, sdch..Accept-L
    anguage: en-US,en;q=0.8..Cookie: __cfduid=c0212345f665fa1234508a
    .ff..b....f..............
    ----------------------------------------------------------------


    and this...


    ----------------------------------------------------------------
    TCP Packet
    Ethernet Header
    |-Destination Address : 00-10-41-C1-11-31
    |-Source Address : 00-20-C2-52-32-32
    |-Protocol : 8
    IP Header
    |-IP Version : 0
    |-IP Header Length : 0 DWORDS or 0 Bytes
    |-Type Of Service : 144
    |-IP Total Length : 19653 Bytes(Size of Packet)
    |-Identification : 4664
    |-TTL : 202
    |-Protocol : 82
    |-Checksum : 14134
    |-Source IP : 8.0.69.0
    |-Destination IP : 2.56.40.56
    TCP Header
    |-Source Port : 144
    |-Destination Port : 19653
    |-Sequence Number : 305660096
    |-Acknowledge Number : 3394385718
    |-Header Length : 0 DWORDS or 0 BYTES
    |-Urgent Flag : 0
    |-Acknowledgment Flag : 0
    |-Push Flag : 0
    |-Reset Flag : 0
    |-Synchronize Flag : 0
    |-Finish Flag : 0
    |-Window : 17664
    |-Checksum : 568
    |-Urgent Pointer : 14376
    -----------------Data Pay Load-------------------
    ..L..8...R76..E..8(8@.@.6......Xp1.8.P.v..'/.V€..E&...........Z.
    ..GET /thread/5201 HTTP/1.1..Host: niggasin.space..Connection: k
    eep-alive..Upgrade-Insecure-Requests: 1..User-Agent: Mozilla/5.0
    (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chro
    me/53.0.2785.116 Safari/537.36..Accept: text/html,application/xh
    tml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8..Referer: htt
    p://niggasin.space/forum/24..Accept-Encoding: gzip, deflate, sdc
    h..Accept-Language: en-US,en;q=0.8..Cookie: sessionid=111111118v
    fybwac111111111sp073tf; csrftoken=11lEZwp4a111111111111111111111
    tb....
    ----------------------------------------------------------------


    Both of these I seemed to capture the exact packets multiple times. I'm not 100% sure, but these don't like right. The IP addresses in the IP header don't look legit to me. I am using my own packet capturing program, though. I think I'm also going to change the two seconds sleep in the arp-poison program to one second or maybe try 100 millisecond.

    Is an arp-spoofing/arp-poisoning attack suppose to only catch packets seldom?

    Post last edited by SBTlauien at 2017-01-08T07:11:05.299707+00:00
  13. SBTlauien African Astronaut
    ³
  14. SBTlauien African Astronaut
    Looking into it more, the arpspoof.c examples it uses, use pcap...
  15. SBTlauien African Astronaut
    Originally posted by a·nom·a·ly I dont by any means report on the depth of this book but looking at the index the networking chapter definitly seems to get into sockets to an extent. Specific socket topics I see are "Socket Functions" "Socket Addresses" and "Raw Socket Sniffing". Looking at the appendix TCP/IP is definitely brushed on and for ARP cache poisoning, redirection, reply messages, spoofing and request messages are all indicated.

    Again, I am not much of a computer guy but this appears to get into the thick of it and is what I would use as a primary resource if I ever planned on picking up programming again. At the very least it seems like it would give one a great base to build on.

    Oh, I stand corrected. I had thought the whole book was about exploiting software.
  16. SBTlauien African Astronaut
    That's more than a 360.
  17. SBTlauien African Astronaut
    Originally posted by SBTlauien At least he wasn't kidnapped and beaten. Good thing they caught them though. They cut his hair so it might be a mutilation charge. Kidnapping, torture, mutilation…hopefully 50+ year sentences.

    http://www.documentingreality.com/forum/f225/kidnapped-forced-say-fuck-white-people-170472/

    Oh shit it was the same video...my bad.
  18. SBTlauien African Astronaut
    Originally posted by -SpectraL That's not the way it works. You can be illegally hacked, but you're not permitted to hack back in retaliation. Fair is fair.

    Well, we can't legally hack back in retaliation.

    What I was thinking would work is...

    FBI > legally-hack > Criminal
    FBI < illegally-hack < Criminal

    FBI > illegally-hack > Citizen
    FBI < legally-hack < Citizen

    Looks fit.
  19. SBTlauien African Astronaut
    Originally posted by a·nom·a·ly The Art Of Exploitation I highly recommend it.

    I have it and started it and plan to finish it sometime soon. I don't think it'll go over socket programming, TCP/IP, and arp-poising attacks. It seemed to learn more towards assembly and the basic concepts of C(which I admit I need(:). I have decent programming skill but it's mostly in Java. C seems more beneficial.
  20. SBTlauien African Astronaut
    Originally posted by Sophie Haha, good idea. This sounds like Blackhat SEO to my ears for some reason. I will look into a way to copy text from a website, i think i will need a module that is better equipped for text/HTML/whatever processing than Mechanize, maybe Beautiful Soup? I will have a gander.

    Copying the text from a web page response would be easy but you'd have know where to split the response at, which would vary for different forums based on their HTML/JS/ETC.

    Originally posted by bling bling new youtubne downloder all the others got towed 4 idk reason

    This one works well for me.

    https://addons.mozilla.org/en-US/firefox/addon/download-youtube/

    https://github.com/gantt/downloadyoutube
  1. 1
  2. 2
  3. 3
  4. ...
  5. 119
  6. 120
  7. 121
  8. 122
  9. 123
  10. 124
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158
Jump to Top