User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 134
  6. 135
  7. 136
  8. 137
  9. 138
  10. 139
  11. ...
  12. 154
  13. 155
  14. 156
  15. 157

Posts by SBTlauien

  1. SBTlauien African Astronaut
    -SpectraL isn't one of bots though.
  2. SBTlauien African Astronaut
    My my goal that surrounds this question, would be to set-up a router that has the same SSID as another nearby router and wait for the owner to accidentally attempt to log into it, thus giving me the password. Is this possible?

    Also, is it within the software that does this logging, or is it something that has to be configured within the hardware? In other words, could I take a router that doesn't have this function, rewrite the software, and then have this function?
  3. SBTlauien African Astronaut
    I was wondering why no new episodes were coming up on Kickass, so I did a search and some asshole said that the show wasn't airing anymore. Then, like a week ago, bamm, 5 new episodes ready for download. Although I have to admit, the show keeps getting shittier.
  4. SBTlauien African Astronaut
    Scary stuff. I like the idea of a P2P network though. I've wanted to build/get a long distance AP and run some type of server on it, just for my neighborhood. Like a small forum or something.
  5. SBTlauien African Astronaut
    I had this problem not to long ago and just waited. Now I can actually make new threads and view my PM. Apparently this is something that isn't being worked on by Lanny. I think Lanny may want to look into having someone work on these issues.
  6. SBTlauien African Astronaut
    Does the original Xbox servers still get supported?

    I wouldn't doubt it if they do. I remember playing way old PC games back in the day and people were still online playing. I'm assuming that he game actually has it's own server set-up for it. Not sure if that's how the console stuff works though.
  7. SBTlauien African Astronaut
    Lanny banned me over 30,000 times on Zoklet. Then he got banned by zok for doing it. lol

    Good times…

    You don't scare me.
  8. SBTlauien African Astronaut
    These cards are so small though. A person could just slide them up their sleeve and then go to the bathroom to do business. I don't think any crime could be proven by loss prevention if the product hasn't been removed from the store. They legally can't(without an easy lawsuit) watch you in the restroom.
  9. SBTlauien African Astronaut
    My friend noticed something while out spending gift cards this last holiday season. He went into a decent steakhouse and bought a $19.99 meal(no alcohol because he didn't want to show his ID), ate the delicious meal, paid with a visa gift card that only had $20 on it, but tipped $10 because he's a bad ass. The transaction went through because the rang it up for $19.99 but he was able to tip because after they rang it up, they brought him the slip to sign and that's were he got to write down how much he wanted to tip.

    Later my friend logged into the account that he registered the card in and noticed that the gift card did have a negative balance of $9.99. I know from another little scheme that these little cards can end up with a negative balance, but I was wondering if there could be anyway to profit from an outrageous tip.

    One way I know of, would be for a person to go to a restaurant where their friend is working, buy a $20 meal, pay with the gift card that has $20 on it, but tip $500, lol. There friend would get a nice bonus for that night.

    Are there any other services out there that could be taken advantage of with this?
  10. SBTlauien African Astronaut
    I'm talking about stores like big name retail stores that have they type of gift cards that aren't wrapped up. A person could grab a handful, go to the restroom, scan each card with a mag. reader, carefully cut back the little scratch-off, write down the digits under it, rub it back on, do this for all of the cards, and then place them back on the shelve. The person could then check the cards online about a week later to see if the cards have any funds loaded onto them. And then of course, spend.

    I wouldn't doubt it if there is fraud protection via flagging unactivated cards that are being checked for balance. My friend has gift card cloned the last couple of holiday seasons and every single card he checks, that hasn't been activated, never is activated at all. So maybe the person could check back to see if the cards have been bought. Possibly mark them in some way(UV-ink maybe) or just check whatever last digits are visible as long as it isn't the same on other cards.

    It a person did this at a lot of stores, they could make quite a bit.
  11. SBTlauien African Astronaut
    Who got banned?
  12. SBTlauien African Astronaut
    I was thinking back of when my friend use to commit identity theft. He always had to check mailboxes to see if the card came and would sometimes have to check the mailbox several times until the mail carrier would deliver the mail. If he had put a small tracking device onto the mail carries truck, he would know exactly when the mail was delivered and would be able to retrieve the mail before the real owner of the mailbox could.

    Another thing a person could do, is place one of these onto a car of someone that they're going to rob and/or kill, and be able to track them down to the perfect secluded spot. Placing one of these on an armored truck to get it's route, or even a bunch of these on police cars to keep track of where they are, could benefit a criminal.

    Making a homemade tracking device using a cheap prepaid cellphone, a cellphone battery pack, and a small plastic case with strong magnets, would be less than $200. An app on the phone could send the location of the vehicle to an email address, and another app on another phone(kept with the criminal) could read this email message and display the location on Google maps.

    What else could be done?
  13. SBTlauien African Astronaut
    Is it possible to create a wireless access point that requires a password, that will log all attempted log ins? I think I've read that it's not possible due to the way the password is sent(encrypted) but I wanted to ask anyways. This question is assuming that the person that owns this access point has root access and completely open source software.

    I also just learned that 'log in' is two words...
  14. SBTlauien African Astronaut
    Cool thanks for the update, do yopu know though if it would locate it back to an exact computer, for example if the IP address was to a workplace, an exact company with say 20 employees coul someone locate it to an exact computer or will it just come back that office?

    We already said 'yes', it can be.
  15. SBTlauien African Astronaut
    We should spam Facebook with links to this site. Only then will be defeat Facebook.
  16. SBTlauien African Astronaut
    And IPPROTO means just what you'd think it means, it has to do with the protocol, you could set it to IPPROTO_TCP or IPPROTO_UDP.

    These are the other protocols I can use...


    enum
    {
    IPPROTO_IP = 0, /* Dummy protocol for TCP. */
    #define IPPROTO_IP IPPROTO_IP
    IPPROTO_ICMP = 1, /* Internet Control Message Protocol. */
    #define IPPROTO_ICMP IPPROTO_ICMP
    IPPROTO_IGMP = 2, /* Internet Group Management Protocol. */
    #define IPPROTO_IGMP IPPROTO_IGMP
    IPPROTO_IPIP = 4, /* IPIP tunnels (older KA9Q tunnels use 94). */
    #define IPPROTO_IPIP IPPROTO_IPIP
    IPPROTO_TCP = 6, /* Transmission Control Protocol. */
    #define IPPROTO_TCP IPPROTO_TCP
    IPPROTO_EGP = 8, /* Exterior Gateway Protocol. */
    #define IPPROTO_EGP IPPROTO_EGP
    IPPROTO_PUP = 12, /* PUP protocol. */
    #define IPPROTO_PUP IPPROTO_PUP
    IPPROTO_UDP = 17, /* User Datagram Protocol. */
    #define IPPROTO_UDP IPPROTO_UDP
    IPPROTO_IDP = 22, /* XNS IDP protocol. */
    #define IPPROTO_IDP IPPROTO_IDP
    IPPROTO_TP = 29, /* SO Transport Protocol Class 4. */
    #define IPPROTO_TP IPPROTO_TP
    IPPROTO_DCCP = 33, /* Datagram Congestion Control Protocol. */
    #define IPPROTO_DCCP IPPROTO_DCCP
    IPPROTO_IPV6 = 41, /* IPv6 header. */
    #define IPPROTO_IPV6 IPPROTO_IPV6
    IPPROTO_RSVP = 46, /* Reservation Protocol. */
    #define IPPROTO_RSVP IPPROTO_RSVP
    IPPROTO_GRE = 47, /* General Routing Encapsulation. */
    #define IPPROTO_GRE IPPROTO_GRE
    IPPROTO_ESP = 50, /* encapsulating security payload. */
    #define IPPROTO_ESP IPPROTO_ESP
    IPPROTO_AH = 51, /* authentication header. */
    #define IPPROTO_AH IPPROTO_AH
    IPPROTO_MTP = 92, /* Multicast Transport Protocol. */
    #define IPPROTO_MTP IPPROTO_MTP
    IPPROTO_BEETPH = 94, /* IP option pseudo header for BEET. */
    #define IPPROTO_BEETPH IPPROTO_BEETPH
    IPPROTO_ENCAP = 98, /* Encapsulation Header. */
    #define IPPROTO_ENCAP IPPROTO_ENCAP
    IPPROTO_PIM = 103, /* Protocol Independent Multicast. */
    #define IPPROTO_PIM IPPROTO_PIM
    IPPROTO_COMP = 108, /* Compression Header Protocol. */
    #define IPPROTO_COMP IPPROTO_COMP
    IPPROTO_SCTP = 132, /* Stream Control Transmission Protocol. */
    #define IPPROTO_SCTP IPPROTO_SCTP
    IPPROTO_UDPLITE = 136, /* UDP-Lite protocol. */
    #define IPPROTO_UDPLITE IPPROTO_UDPLITE
    IPPROTO_RAW = 255, /* Raw IP packets. */
    #define IPPROTO_RAW IPPROTO_RAW
    IPPROTO_MAX
    };



    import socket

    target = "222.173.190.239"
    port = 1337

    # Packet data
    data = 'f1a525da11f6'.decode('hex')

    # Create socket object (IPv4 and UDP)
    client = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)

    # Connect to client
    client.connect((target, port))

    # Send our data
    client.send(data)

    # Recieve our respone
    response = client.recv(4046)

    print response

    I don't know much about Python, but this looks like it's just a raw socket connection, which I already am doing in Java.
  17. SBTlauien African Astronaut
    but if you're using php now, you might as well just use coldfusion or cgi or whatevs*.

    Some .gov sites DO.
  18. SBTlauien African Astronaut
    Sweet deal.
  19. SBTlauien African Astronaut
    I think Facebook still has better numbers that those.
  20. SBTlauien African Astronaut
    Long story short, I volunteer if Lanny trusted me to do it.

    I volunteer as well, but I don't know much about PHP, so that might be the best thing for the site.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 134
  6. 135
  7. 136
  8. 137
  9. 138
  10. 139
  11. ...
  12. 154
  13. 155
  14. 156
  15. 157
Jump to Top