User Controls
Posts by SBTlauien
-
2016-01-27 at 8:51 AM UTC in Router Hacking (OpenWRT n stuff)
They cost 10$ a pop from ebay so you buy a dozen an just drop them in a few spots around the hood and let them do whatever you want them to do. I'm tempted to get like 6 and create a simple mesh network or try to do some outdoorsy stuff with them.
How are you going to power them though? Battery? -
2016-01-27 at 8:36 AM UTC in Help a brother create a script/programHere's what I have so far. I can spoof my MAC to a random address with this and I can return it back to the original(but it does require me to enter it in before hand).
#!/bin/bash
hexchars="0123456789ABCDEF"
rndMAC=
origMAC=00:00:00:11:23:11
function help() {
cat << EOF
Usage: $0 [args]
-h, --help - Print this help and exit
-r, --run - Spoof MAC every 55 minutes and connect/login to hotspot
-s, --spoof - Spoof MAC address to a randomly generated address
-u, --unspoof - Return spoofed MAC address to original MAC address
EOF
}
function genMac() {
end=$( for i in {1..10} ; do echo -n ${hexchars:$(( $RANDOM % 16 )):1} ; done | sed -e 's/\(..\)/:\1/g' )
rndMAC=00$end
}
function changeMac() {
MAC="$1"
service network-manager stop
ifconfig wlan0 down
ifconfig wlan0 hw ether $MAC
ifconfig wlan0 up
service network-manager start
}
function run() {
genMac
changeMac $rndMAC
#should automaticall connect due to previous connections
#login is next
#wait 55 minutes
run
echo "TODO"
}
if [ $UID -gt 0 ] ;then
die "RUN AS ROOT NIGGA"
fi
while [ $# -gt 0 ]
do
case "$1" in
"-h"|"--help")
help
die
;;
"-r"|"--run")
run
;;
"-s"|"--spoof")
genMac
changeMac $rndMAC
;;
"-u"|"--unspoof")
changeIface $origMAC
;;
*)
help
die
;;
esac
shift
done
I'll use BurpSuite when signing up for a new session and see what kind of HTTP requests will be needed to be sent. I'm assuming it'll be a GET to receive a cookie, and then one POST with the need parameters(Zipcode and Email address, along with the check of a terms button), although there may be another GET when first requesting a guest session.
As far as the request go, from my searches it looks like cURL is the way to go. Is this correct? -
2016-01-26 at 8:48 AM UTC in stimulant bath sawltsBitcoin is the standard now days. Every fake ID vendor I come across requires Bitcoin.
-
2016-01-26 at 8:45 AM UTC in here's a new forum for you spuds
A lot of things don't pay the bills. Did it pay the bills to run a BBS? Back when a BBS setup cost upwards of 5000+$ 1985's dollars (worth 11013.80$ of today's dollars). Do you think the userbase became washed out? Or did those people move onto other things like hackerspaces or something else?
I've been on dozens of different forums for about 15 years now(low-life lol), and I've learned that people usually eventually move on to other things in life(getting married and having kids, getting busy with school and making new friends, etc). It's not always that they move onto another forum/community. And then of course there are those that get incarcerated, die, or whatever. It does seem like lot of people post a lot while in school(middle - college) and then stop once they find a job.
Long term internet people are those that are more into technology. You'll see these people around longer and when they do disappear, they are usually not to far. -
2016-01-26 at 8:30 AM UTC in Niggasinspace the albumNone of these songs are about us. :(
-
2016-01-26 at 8:22 AM UTC in I've taken a gram of bundy every day for a whileI remember when I was younger, I would take a gram of it and get really high. But I was only able to get high a dozen or so time and it led up to the gram dosage level, and then when I took it, I didn't high, I just itched and puked.
I suggest weed over bundy. -
2016-01-25 at 8:57 AM UTC in here's a new forum for you spuds
Incase this forum gets obliterated or shit goes FUBAR
We could all meet up on DocumentingReality.com -
2016-01-25 at 8:55 AM UTC in 2016 homeless is easy if you have WIFI
I'm already doing that and its not enough. I am the blob and I consume entire empires
You're winning big time. -
2016-01-25 at 6:49 AM UTC in Help a brother create a script/program
Yeah, or just use bash like i mentioned above. That would be the easiest option.
I most likely will start there, but I'd like to know how much time the connect has left. Either way, this is a good project for me and at a good time. I'm ready to move on from Java/Android(even though I like it a lot) and learn more of the lower level stuff. I'll post post what I come up with here... -
2016-01-25 at 4:36 AM UTC in Starting a new forums (lanny et al)
I'm sorry, but this thread is an insult to Lanny.
I do agree. As long as Lanny keeps this forum running, there's no need for an alternate. It also looks to me like all of the other totse-clones have shut down. -
2016-01-25 at 4:34 AM UTC in Starting a new forums (lanny et al)I actually put a forum on my Raspberry Pi about a year ago, it wasn't hard at all. It was BB bulletin. I also own a couple of domain names which is basically just finding and buying.
You'll need a static IP unless you buy from a place like NoIP that'll redirect your domain to whatever IP you have at the time. You'll also need an ISP that wont block ports(you may have to set up some kind of service with them).
It's cheap, but the liability would be the biggest burden. Cost-wise, including electricity to run the server, maybe $100 a year. I've actually thought about running my own for a while now. -
2016-01-25 at 4:27 AM UTC in ALL COUNTRY CC FULLZ DUMPS PAYPAL BANK LOGINS UBERS WU TRANSFER !
Any Seriously buyer here need
That's as far as I read. -
2016-01-25 at 4:16 AM UTC in Help a brother create a script/programI've looked into Python a little but not much. I have compiler on my RaspPi. I'll look into it a bit more, although C is something I'd prefer.
-
2016-01-25 at 1:14 AM UTC in The Outlook Could Be Bleak
Nah it would get picked up and these ppl are based in other offices in the country
Have you seen this before though? http://www.nirsoft.net/utils/mailpv.html
According to the details this should be what i want, but it comes up blank
I have not. For something like that though, I think phishing would be your best bet. You could try a brute force or password recovery like Spec mentioned. There's always malware as well(software key logger via trojan). -
2016-01-25 at 1:01 AM UTC in Help a brother create a script/programIn my area, the most popular internet provider seems to have these public hot spots everywhere. I'm not sure if the are part of legit customers routers that they 'maybe get' when signing up for the service, but these all have a captive portal that allows people to sign up for a complimentary session that'll last for one hour. After the hour is up, you can't sign up for another session until 24 hours has passed, and you can only get like two sessions in a month.
The good part, is that these keep track of the users via MAC address, and there are a bunch very close to me(like ten or so). I can spoof my MAC and connect over and over again, giving me 100% free internet, although I wont do banking or anything like that on the connection.
Anyways, I'd like to create a small script that will spoof my MAC address every 55 minutes, reconnect to the access point, and then sign up for a session. I also wouldn't mind some type of interface that would show how much time I have left on the current session, just in case I want to download a large file(to prevent an interruption).
Edit: I'm running Ubuntu 14.04
Any links would be appreciated. -
2016-01-25 at 12:52 AM UTC in TCPDUMP
By "On this network, there was a password required to browse the internet" do you mean that there's a captive portal that asks you for a password before you can connect to the web?
Yes. But even with the captive portal set, I was still able to ping other nodes on the network. When I use my Android app to create a captive portal, then conenct to it with another phone of mine, and then use my app to ping the network, I don't get anything because I have DNS set up to forward all packet to a specific IP address and IPTABLES set to redirect all packets sent to that IP address to a specific port at that IP address.
So maybe their captive portal isn't set up correctly. I've noticed other places that have captive portals will redirect all traffic just like the ones I create on my phone. This one is different though. -
2016-01-24 at 10:12 AM UTC in The Outlook Could Be BleakHardware key logger for someone of your caliber, unless you took my advice and started learning about computers.
-
2016-01-24 at 8:17 AM UTC in Stop Jabbering on...https://register.jabber.org/
[FONT=Helvetica Neue]June 25, 2013: We have temporarily disabled account registration at the [/FONT]jabber.org IM service[FONT=Helvetica Neue] while we migrate the account database to a new machine. We will enable the web registration form again as soon as possible! In the meantime, you can create an account at any other [/FONT]public XMPP service[FONT=Helvetica Neue].[/FONT]
-
2016-01-23 at 9:09 AM UTC in TCPDUMPSo I did some arp poisoning and TCPdump and got a bunch of packets like this...
192.168.33.103.47915 > 224.0.0.251.5353: [udp sum ok] 49 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.c155cba214b389d11489f34ccc12d0c2.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.c155cba214b389d11489f34ccc12d0c2.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=57" "upcv4=47915" (213)
02:19:38.696652 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 240)
192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 1 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=1" "upcv4=53813" (212)
02:19:38.696983 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 233)
192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 2 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "n_1=org.alljoyn.sl.*", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=2" "upcv4=53813" (205)
02:19:41.765351 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 240)
192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 1 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=7" "upcv4=53813" (212)
02:19:41.765483 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 233)
192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 2 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "n_1=org.alljoyn.sl.*", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=8" "upcv4=53813" (205)
02:19:41.765551 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 51)
192.168.33.103.9956 > 224.0.0.113.9956: [udp sum ok] UDP, length 23
02:19:41.765614 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 51)
192.168.33.103.9956 > 192.168.33.255.9956: [udp sum ok] UDP, length 23
02:20:07.078385 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 241)
192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 1 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=11" "upcv4=53813" (213)
02:20:07.078461 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 234)
192.168.33.103.53813 > 224.0.0.251.5353: [udp sum ok] 2 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "n_1=org.alljoyn.sl.*", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=12" "upcv4=53813" (206)
02:22:08.525020 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 241)
192.168.33.103.36911 > 224.0.0.251.5353: [udp sum ok] 13 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "i_1=net.allplay.MediaPlayer", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=13" "upcv4=36911" (213)
02:22:08.525563 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 234)
192.168.33.103.36911 > 224.0.0.251.5353: [udp sum ok] 14 [2au] PTR (QU)? _alljoyn._tcp.local. ar: search.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "n_1=org.alljoyn.sl.*", sender-info.5b9a024aea5fc7b9419f393ae058e0b3.local. TXT "txtvers=0" "ajpv=12" "ipv4=192.168.33.103" "pv=2" "sid=14" "upcv4=36911" (206)
02:22:08.526502 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 51)
192.168.33.103.9956 > 224.0.0.113.9956: [udp sum ok] UDP, length 23
02:22:08.528570 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 51)
192.168.33.103.9956 > 192.168.33.255.9956: [udp sum ok] UDP, length 23
02:22:08.529550 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 51)
192.168.33.103.9956 > 224.0.0.113.9956: [udp sum ok] UDP, length 23
02:22:08.531408 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 51)
192.168.33.103.9956 > 192.168.33.255.9956: [udp sum ok] UDP, length 23
02:22:08.536775 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto UDP (17), length 241)
What's it mean? On this network, there was a password required to browse the internet but I was still able to ping other nodes before I had entered the password. The server was NANOHTTPD which I thought was kind of strange since I haven't seen any yet but I actually use it myself(for SSLSTRIP).
RIght now this is how I am running TCPdump...
We'll say I want to capture for IP address "192.168.33.121"
tcpdump -nn 192.168.33.121 -vv -s 0
Should I be using -vvv instead? I'd like more data.
Edit: I can see that "org.alljoyn.sl" is https://allseenalliance.org, so it must be someone connected to the router via their phone... -
2016-01-23 at 7:21 AM UTC in 2016 homeless is easy if you have WIFIHang out in laudrymats. There's usually free wifi, free coffee, free electricity, and free shelter. Libraries are good for homeless as, free wifi, free electricity, free shelter, and free books to read. You'll be winning all your life getting all that free stuff.