It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

NSA to hackers: We’re not prepared for major attack

page: 4
6
<< 1  2  3    5 >>

log in

join
share:

posted on Jul, 31 2012 @ 01:42 AM
link   


Oh and your LPI claim is also bs... not that its impressive its a linux intro course... its pretty much "Linux for dummies.."


You don't have to write code or be a NOCC to educate yourself and be able to read it. Most code is not original anyway. It is recycled. People post their code on github and other repositories so that others can use it and improve it, if necessary. It's all a collective effort. That makes it powerful.

So, you are not unique and I'm still not impressed. Being a good programmer doesn't mean that you are able to write proper specs and vice versa.

edit on 31-7-2012 by Stiglitz because: (no reason given)

edit on 31-7-2012 by Stiglitz because: (no reason given)



posted on Jul, 31 2012 @ 02:11 AM
link   


You can't even write a BASIC PERL SCRIPT YOURSELF!!!!!!! you didn't write this # again... This has nothing to do with a Honey Pot... Those codes doesn't even have anything to do with wifi... the only place this could be used is in a MITM/Evil AP setup to force HTML queries redirected through some lame ethercap filters...


Yes I can. I just don't like to write scripts and code. It bores me. Why should I reinvent the wheel?



posted on Jul, 31 2012 @ 02:18 AM
link   


PS: I'm a unix system admin and I don't use windows really other than for gaming... I use my own homebrew distro...


You and a zillion others... LFS?
You think you're the only one who can configure and compile a kernel, write init and cron scripts? Yawn. Anybody who can read and has a little common sense can do it.

Man, the more I read your posts, the more I realize how pathetic you are.

I will, and many others with me, keep informing people for free what the risks are on this insecure Internet and what they have to do to protect their basic rights to privacy against criminals like yourself. You are the criminals. You spy on people. You have no right whatsoever to do that. And in the end, people like you will be stopped.



posted on Jul, 31 2012 @ 02:26 AM
link   
reply to post by Ophiuchus 13
 


Here are some good links as well, if you're interested:

HTTPS everywhere
addons.mozilla.org...

Image of some nice FF privacy plugins:

www.2shared.com...
edit on 31-7-2012 by Stiglitz because: (no reason given)



posted on Jul, 31 2012 @ 02:41 AM
link   
reply to post by Ophiuchus 13
 


And another one. This guy gives interesting lectures about computer security. Some are available on youtube.

thoughtcrime
edit on 31-7-2012 by Stiglitz because: (no reason given)



posted on Jul, 31 2012 @ 02:52 AM
link   
reply to post by _R4t_
 


Ever considered that some people keep their SSH keys on a separate medium?
Ever considered that some data may be hidden in plain sight? Steganography. Does that ring a bell? Ever considered that several keys may be needed to decrypt data?
Do you think I am stupid enough to keep my data in my home directory?



posted on Jul, 31 2012 @ 02:56 AM
link   
reply to post by _R4t_
 


Thank you for calling him out - aside from the use of "ur" too much, you're a champion of our craft. When i saw his first post about the "super-open" server, my initial thought was, "Meh, looks like an internal application server for a low budget IT department, and resides behind multiple hardware firewalls and proxy system.".

I bet that poster's looking up the OSI right now.



posted on Jul, 31 2012 @ 03:00 AM
link   
reply to post by Stiglitz
 


Computer security is a bit of an oxymoron because all software is vulnerable in some way, depending on the resources available to who's attempting to crack into the box. If it's connected to the DMZ, someone with enough computing power, time and knowledge can get into it.



posted on Jul, 31 2012 @ 03:02 AM
link   
reply to post by tothetenthpower
 


Never thought of it that way, but your right in a sense. Also the way the current infastructure is designed its like a model A Ford trying to out run a Lotus Turbo. It just can't keep up, thats how old it is. The set up for Americas system is based off of old tech with few if any real hardware upgrades to make it operate more securely.

And those hackers you speak of.....the resources needed to pull off a large scale hack would be immense. They would truely have to have government backing to do so as it would take multiple hackers working it the same time to present any real threat that could not be stopped.



posted on Jul, 31 2012 @ 03:07 AM
link   
reply to post by Evil_Santa
 


All the computing power you need is online. It's called a botnet.



posted on Jul, 31 2012 @ 03:10 AM
link   
reply to post by Evil_Santa
 


Rather than posting nonsense, check out that server. It is still operational.
That server was already blacklisted as an open relay in 2000.

"The champion of our craft" has still not cracked my file. I'm still online and waiting for him to take over my desktop...
edit on 31-7-2012 by Stiglitz because: (no reason given)



posted on Jul, 31 2012 @ 03:12 AM
link   
reply to post by Stiglitz
 


All I had to do was google one line of your code.... to prove you're full of it


www.linksysinfo.org.../messing-with-wifi-stealers.28538/



posted on Jul, 31 2012 @ 03:12 AM
link   
reply to post by Evil_Santa
 


You should read all responses and the entire thread to make a sound judgment.



posted on Jul, 31 2012 @ 03:16 AM
link   

Originally posted by Evil_Santa
reply to post by Stiglitz
 


All I had to do was google one line of your code.... to prove you're full of it


www.linksysinfo.org.../messing-with-wifi-stealers.28538/


Again, read the entire thread. People just don't read anymore, do they? I never claimed that I wrote this code.

edit on 31-7-2012 by Stiglitz because: (no reason given)



posted on Jul, 31 2012 @ 03:29 AM
link   
To all of you: LOL

INPUT_IP = IP address tested (message injection point)
OUTUT_IP = Delivering IP address (message output point)

If there are multiple INPUT_IPs for a relay, the OUTPUT_IP
is shown only once. This makes machines with multiple IP
interfaces or which are smarthosting open relays readily visible.

When filing hosts as secured, only the OUTPUT_IP should be entered.

Entries more than 4 weeks old are automatically retested,
however please file these closed if they've been secured, as the
retesting cycle on hosts previously known open takes at least
2 weeks.

These updates are only sent when there are open relays in your
netspace known to ORBS. There may be other insecure hosts which
ORBS does not know about, as ORBS only checks IP addresses when
advised that they may be insecure. ORBS does not proactively scan.

ORBS' tester makes a variety of checks on each IP address to ensure
that machines are fully secured against all vulnerabilities known to
have been exploited for spam or mailbomb relaying in the past.
Hosts listed below have relayed for at least one of the tests
listed at www.orbs.org...

www.orbs.org...
shows the last relayed message for each input address listed.

OUTPUT_IP INPUT_IP LAST_VERIFIED(UTC) DISCOVERED
.....

Netblock = 129.

.....
129.246.226.95 129.246.226.95 2000-06-06 - 14:01:32 2000-03-12
.....

Source

host 129.246.226.95
95.226.246.129.in-addr.arpa domain name pointer www.idss.ida.org.

Domain ID
1226635-LROR
Domain Name:IDA.ORG
Created On:11-Aug-1988 04:00:00 UTC
Last Updated On:22-Jun-2012 18:25:53 UTC
Expiration Date:10-Aug-2017 04:00:00 UTC
Sponsoring Registrar:Network Solutions, LLC (R63-LROR)
Status:CLIENT TRANSFER PROHIBITED
Registrant ID:19939329-NSIV
Registrant Name:Institute for Defense Analyses
Registrant Organization:Institute for Defense Analyses
Registrant Street1:ATTN insert domain name here
Registrant Street2:care of Network Solutions

The US military does know how to spam. LOL



edit on 31-7-2012 by Stiglitz because: (no reason given)



posted on Jul, 31 2012 @ 03:39 AM
link   
reply to post by Evil_Santa
 


That's right. Like I said in the beginning of this thread...
That's why people should be warned and told. They have the right to know.



posted on Jul, 31 2012 @ 03:43 AM
link   

Originally posted by Evil_Santa
reply to post by Stiglitz
 

If it's connected to the DMZ, someone with enough computing power, time and knowledge can get into it.


No need to be connected to a DMZ. If you can access a router on the edge of a network or take over a connection of a client in its LAN, the entire network is compromised.

It is mostly through malware that networks are breached and information stolen. Again, "social hacking" remains the most widely used method.



posted on Jul, 31 2012 @ 03:50 AM
link   
I found an image of a NOCC.





posted on Jul, 31 2012 @ 05:51 AM
link   
And suddenly: silence.

edit on 31-7-2012 by Stiglitz because: (no reason given)



posted on Jul, 31 2012 @ 06:12 AM
link   

Originally posted by Evil_Santa
reply to post by _R4t_
 


Thank you for calling him out - aside from the use of "ur" too much, you're a champion of our craft. When i saw his first post about the "super-open" server, my initial thought was, "Meh, looks like an internal application server for a low budget IT department, and resides behind multiple hardware firewalls and proxy system.".

I bet that poster's looking up the OSI right now.


Hey dude, no prob... Kind of obvious when someone can't make the diff between the data and the application layer, or doesnt even know how a packet is put together yet claim to be the #...

Sorry for the "ur" part im replying from work on an ipad with a single hand in between two other tasks lol. I quit replying the guy's obviously a hormone raging teen thats new to this stuff and pasting stuff he reads on the net without really understanding the inner working of things...

We're flooded by those on IRC in security related chans...

Peace




top topics



 
6
<< 1  2  3    5 >>

log in

join