User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 138
  6. 139
  7. 140
  8. 141
  9. 142
  10. 143
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158

Posts by SBTlauien

  1. SBTlauien African Astronaut
    They cost 10$ a pop from ebay so you buy a dozen an just drop them in a few spots around the hood and let them do whatever you want them to do. I'm tempted to get like 6 and create a simple mesh network or try to do some outdoorsy stuff with them.

    How are you going to power them though? Battery?
  2. SBTlauien African Astronaut
    Here's what I have so far. I can spoof my MAC to a random address with this and I can return it back to the original(but it does require me to enter it in before hand).


    #!/bin/bash
    hexchars="0123456789ABCDEF"
    rndMAC=
    origMAC=00:00:00:11:23:11

    function help() {
    cat << EOF
    Usage: $0 [args]
    -h, --help - Print this help and exit
    -r, --run - Spoof MAC every 55 minutes and connect/login to hotspot
    -s, --spoof - Spoof MAC address to a randomly generated address
    -u, --unspoof - Return spoofed MAC address to original MAC address
    EOF
    }

    function genMac() {
    end=$( for i in {1..10} ; do echo -n ${hexchars:$(( $RANDOM % 16 )):1} ; done | sed -e 's/\(..\)/:\1/g' )
    rndMAC=00$end
    }

    function changeMac() {
    MAC="$1"
    service network-manager stop
    ifconfig wlan0 down
    ifconfig wlan0 hw ether $MAC
    ifconfig wlan0 up
    service network-manager start
    }

    function run() {
    genMac
    changeMac $rndMAC
    #should automaticall connect due to previous connections
    #login is next
    #wait 55 minutes
    run
    echo "TODO"
    }

    if [ $UID -gt 0 ] ;then
    die "RUN AS ROOT NIGGA"
    fi

    while [ $# -gt 0 ]
    do
    case "$1" in
    "-h"|"--help")
    help
    die
    ;;
    "-r"|"--run")
    run
    ;;
    "-s"|"--spoof")
    genMac
    changeMac $rndMAC
    ;;
    "-u"|"--unspoof")
    changeIface $origMAC
    ;;
    *)
    help
    die
    ;;
    esac
    shift
    done


    I'll use BurpSuite when signing up for a new session and see what kind of HTTP requests will be needed to be sent. I'm assuming it'll be a GET to receive a cookie, and then one POST with the need parameters(Zipcode and Email address, along with the check of a terms button), although there may be another GET when first requesting a guest session.

    As far as the request go, from my searches it looks like cURL is the way to go. Is this correct?
  3. SBTlauien African Astronaut
    Bitcoin is the standard now days. Every fake ID vendor I come across requires Bitcoin.
  4. SBTlauien African Astronaut
    A lot of things don't pay the bills. Did it pay the bills to run a BBS? Back when a BBS setup cost upwards of 5000+$ 1985's dollars (worth 11013.80$ of today's dollars). Do you think the userbase became washed out? Or did those people move onto other things like hackerspaces or something else?


    I've been on dozens of different forums for about 15 years now(low-life lol), and I've learned that people usually eventually move on to other things in life(getting married and having kids, getting busy with school and making new friends, etc). It's not always that they move onto another forum/community. And then of course there are those that get incarcerated, die, or whatever. It does seem like lot of people post a lot while in school(middle - college) and then stop once they find a job.

    Long term internet people are those that are more into technology. You'll see these people around longer and when they do disappear, they are usually not to far.
  5. SBTlauien African Astronaut
    None of these songs are about us. :(
  6. SBTlauien African Astronaut
    I remember when I was younger, I would take a gram of it and get really high. But I was only able to get high a dozen or so time and it led up to the gram dosage level, and then when I took it, I didn't high, I just itched and puked.

    I suggest weed over bundy.
  7. SBTlauien African Astronaut
    Incase this forum gets obliterated or shit goes FUBAR

    We could all meet up on DocumentingReality.com
  8. SBTlauien African Astronaut
    I'm already doing that and its not enough. I am the blob and I consume entire empires

    You're winning big time.
  9. SBTlauien African Astronaut
    Yeah, or just use bash like i mentioned above. That would be the easiest option.

    I most likely will start there, but I'd like to know how much time the connect has left. Either way, this is a good project for me and at a good time. I'm ready to move on from Java/Android(even though I like it a lot) and learn more of the lower level stuff. I'll post post what I come up with here...
  10. SBTlauien African Astronaut
    I'm sorry, but this thread is an insult to Lanny.

    I do agree. As long as Lanny keeps this forum running, there's no need for an alternate. It also looks to me like all of the other totse-clones have shut down.
  11. SBTlauien African Astronaut
    I actually put a forum on my Raspberry Pi about a year ago, it wasn't hard at all. It was BB bulletin. I also own a couple of domain names which is basically just finding and buying.

    You'll need a static IP unless you buy from a place like NoIP that'll redirect your domain to whatever IP you have at the time. You'll also need an ISP that wont block ports(you may have to set up some kind of service with them).

    It's cheap, but the liability would be the biggest burden. Cost-wise, including electricity to run the server, maybe $100 a year. I've actually thought about running my own for a while now.
  12. SBTlauien African Astronaut
    Any Seriously buyer here need

    That's as far as I read.
  13. SBTlauien African Astronaut
    I've looked into Python a little but not much. I have compiler on my RaspPi. I'll look into it a bit more, although C is something I'd prefer.
  14. SBTlauien African Astronaut
    Nah it would get picked up and these ppl are based in other offices in the country

    Have you seen this before though? http://www.nirsoft.net/utils/mailpv.html

    According to the details this should be what i want, but it comes up blank

    I have not. For something like that though, I think phishing would be your best bet. You could try a brute force or password recovery like Spec mentioned. There's always malware as well(software key logger via trojan).
  15. SBTlauien African Astronaut
    In my area, the most popular internet provider seems to have these public hot spots everywhere. I'm not sure if the are part of legit customers routers that they 'maybe get' when signing up for the service, but these all have a captive portal that allows people to sign up for a complimentary session that'll last for one hour. After the hour is up, you can't sign up for another session until 24 hours has passed, and you can only get like two sessions in a month.

    The good part, is that these keep track of the users via MAC address, and there are a bunch very close to me(like ten or so). I can spoof my MAC and connect over and over again, giving me 100% free internet, although I wont do banking or anything like that on the connection.

    Anyways, I'd like to create a small script that will spoof my MAC address every 55 minutes, reconnect to the access point, and then sign up for a session. I also wouldn't mind some type of interface that would show how much time I have left on the current session, just in case I want to download a large file(to prevent an interruption).

    Edit: I'm running Ubuntu 14.04

    Any links would be appreciated.
  16. SBTlauien African Astronaut
    By "On this network, there was a password required to browse the internet" do you mean that there's a captive portal that asks you for a password before you can connect to the web?

    Yes. But even with the captive portal set, I was still able to ping other nodes on the network. When I use my Android app to create a captive portal, then conenct to it with another phone of mine, and then use my app to ping the network, I don't get anything because I have DNS set up to forward all packet to a specific IP address and IPTABLES set to redirect all packets sent to that IP address to a specific port at that IP address.

    So maybe their captive portal isn't set up correctly. I've noticed other places that have captive portals will redirect all traffic just like the ones I create on my phone. This one is different though.
  17. SBTlauien African Astronaut
    Hardware key logger for someone of your caliber, unless you took my advice and started learning about computers.
  18. SBTlauien African Astronaut
    https://register.jabber.org/

    [FONT=Helvetica Neue]June 25, 2013: We have temporarily disabled account registration at the [/FONT]jabber.org IM service[FONT=Helvetica Neue] while we migrate the account database to a new machine. We will enable the web registration form again as soon as possible! In the meantime, you can create an account at any other [/FONT]public XMPP service[FONT=Helvetica Neue].[/FONT]
  19. SBTlauien African Astronaut
    So I did some arp poisoning and TCPdump and got a bunch of packets like this...


    192.168.33.103.47915 > 224.0.0.251.5353: [udp sum ok] 49 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.c155cba214b389d11489f34ccc12d0c2.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.c155cba214b389d11489f34ccc12d0c2.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=57" "upcv4=47915" (213)
    02:19:38.696652 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 240)
    192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 1 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=1" "upcv4=53813" (212)
    02:19:38.696983 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 233)
    192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 2 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "n_1=org.alljoyn.sl.*", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=2" "upcv4=53813" (205)
    02:19:41.765351 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 240)
    192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 1 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=7" "upcv4=53813" (212)
    02:19:41.765483 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 233)
    192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 2 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "n_1=org.alljoyn.sl.*", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=8" "upcv4=53813" (205)
    02:19:41.765551 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 51)
    192.168.33.103.9956 > 224.0.0.113.9956: [udp sum ok] UDP, length 23
    02:19:41.765614 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 51)
    192.168.33.103.9956 > 192.168.33.255.9956: [udp sum ok] UDP, length 23
    02:20:07.078385 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 241)
    192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 1 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=11" "upcv4=53813" (213)
    02:20:07.078461 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 234)
    192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 2 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "n_1=org.alljoyn.sl.*", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=12" "upcv4=53813" (206)
    02:22:08.525020 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 241)
    192.168.33.103.36911 > 224.0.0.251.5353: [udp sum ok] 13 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=13" "upcv4=36911" (213)
    02:22:08.525563 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 234)
    192.168.33.103.36911 > 224.0.0.251.5353: [udp sum ok] 14 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "n_1=org.alljoyn.sl.*", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=14" "upcv4=36911" (206)
    02:22:08.526502 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 51)
    192.168.33.103.9956 > 224.0.0.113.9956: [udp sum ok] UDP, length 23
    02:22:08.528570 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 51)
    192.168.33.103.9956 > 192.168.33.255.9956: [udp sum ok] UDP, length 23
    02:22:08.529550 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 51)
    192.168.33.103.9956 > 224.0.0.113.9956: [udp sum ok] UDP, length 23
    02:22:08.531408 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 51)
    192.168.33.103.9956 > 192.168.33.255.9956: [udp sum ok] UDP, length 23
    02:22:08.536775 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 241)


    What's it mean? On this network, there was a password required to browse the internet but I was still able to ping other nodes before I had entered the password. The server was NANOHTTPD which I thought was kind of strange since I haven't seen any yet but I actually use it myself(for SSLSTRIP).

    RIght now this is how I am running TCPdump...

    We'll say I want to capture for IP address "192.168.33.121"

    tcpdump -nn 192.168.33.121 -vv -s 0


    Should I be using -vvv instead? I'd like more data.

    Edit: I can see that "org.alljoyn.sl" is https://allseenalliance.org, so it must be someone connected to the router via their phone...
  20. SBTlauien African Astronaut
    Hang out in laudrymats. There's usually free wifi, free coffee, free electricity, and free shelter. Libraries are good for homeless as, free wifi, free electricity, free shelter, and free books to read. You'll be winning all your life getting all that free stuff.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 138
  6. 139
  7. 140
  8. 141
  9. 142
  10. 143
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158
Jump to Top