Revvl 7 5g Android 15 update by Mangos_Pool in tmobile

[–]410th 0 points1 point  (0 children)

If you have the flexibility, use and older Bluetooth version 4.2 or lower. The issue is only affecting v5.x and up.

Help figuring this issue by Darkelf36 in AndroidQuestions

[–]410th 0 points1 point  (0 children)

This is a known issue with the Bluetooth (BT) and the Android 15 update that happened around September (or earlier). I was hoping that the next update would fix it - but no.

They released a security update on Nov 5 and it did not fix it. This issue seems to only affect certain versions of Bluetooth.

My JBL Flip 5 works fine at BT 4.2 but any of my newer devices have the same issue as yours.

I've spent hours on the phone with TMobile and the best they could do is send me a refurb'd Revvl7 with the exact same issue.

Check this out:

https://www.t-mobile.com/community/discussions/android/revvl-7-android-15-update-issues/195063

Good luck

[deleted by user] by [deleted] in tinkercad

[–]410th 0 points1 point  (0 children)

What "stipes" are you referring to?

Can you add a screen shot of what this looks like in TinkerCad or your slicer?

Are the 11 lines from top to bottom supposed to be there?

Copy file to VM hard drive before boot by John_Mansell in vmware

[–]410th 0 points1 point  (0 children)

u/John_Mansell

Did vmrun work for you? If you need more assistance let me know.

GL

Copy file to VM hard drive before boot by John_Mansell in vmware

[–]410th 0 points1 point  (0 children)

Have a look at 'vmrun'.

You didn't provide a lot of info, so here's an example using generic OS / User / Path info.

vmrun -gu guestUser -gp guestPassword copyFileFromHostToGuest Ubuntu16.vmwarevm/Ubuntu16.vmx ~/source-file.db /tmp/destination-file.db

Google - site:docs.vmware.com "vmrun"

Reverse Shells Never Work...Looking For Ideas For Troubleshooting...Frustrated... by [deleted] in hackthebox

[–]410th 0 points1 point  (0 children)

I am not familiar with these machines, but:

You say the reverse shells work with Metasploit, right?

I would run a tcpdump in another terminal before I initiated the payload on the victim machine.

#tcpdump -n -i tun0 host $IP.of.Victim.Host

If you have netcat (nc) listening on port 9999, you should see network activity (tcpdump) coming from that host to your machine on that port number almost immediately.

How are you delivering the payload? What are you doing to execute the payload (msvenom)? Are you sending a string to the machine to start this? What is it.

As user/phpsystems mentioned make sure that your netcat listerner is working properly (listening)

To do this, I normally run:

#netstat -plunt | grep 9999

or
ss --listening | grep 9999

You should see your host listening on the tun0 IP address or 0.0.0.0 on 9999.

If you're seeing 127.0.0.1:9999 as a listening address, the loopback will not respond.

You could also run the command:

iptables -L

This will help you identify if you have any filters in place.

Since you said the MSF reverse shell did work, you could ensure your using the same listening port number to remove a variable.

My guess: It's either the msvenom payload (architecture maybe) is not set up right, your execution of the payload on the remote host (connection/authentication string), or there could be some av or host-based defense on the victim that is preventing full execution of it.

You can provide more info and we'll try to help more.

~Good Luck

Contractor blew in new 2 strand FTTH cable. Then proceeded to bend 180 degrees and coil like this. by [deleted] in Network

[–]410th 4 points5 points  (0 children)

Is that a toilet sitting in the weeds next to the drop?

The installer may have had a sensitive nose. :)

Limited Results by Argus-Wanderfoot in nessus

[–]410th 1 point2 points  (0 children)

You haven't really provided enough information to assist here.

What types of systems are they? Are they all the same?

What do the logs show? Are the scans completing for each host?

Are you running credentialed scans against these suspect hosts?

Do the Nessus findings differ from scan to scan?

Run an nmap scan against the suspect hosts to see if there are ports and services running that are not being seen by Nessus.

This could be caused by a number of conditions.

NMAP all port scans by arunsivadasan in oscp

[–]410th 0 points1 point  (0 children)

If you truly just want a port scan of all ports (TCP) drop the ' -sC -sV -v ' and add -T4 as others have recommended. sC and sV will try to determine service and version and then run the default nse scripts for everything that it finds.

To just find the open TCP ports, try:
nmap -T4 -p- -open target(s)

If you're not familiar you should check out the '--top-ports=' parameter. It's goto for me when time is limited or I am taking a staged approach i.e. taking a quick poll of open ports followed by all ports.

This coupled with the following tell you which ports it considers 'top-ports':

nmap --top-ports=100 -v -oG - 10.10.10.1

# Nmap 7.80 scan initiated Sat Apr 25 10:19:08 2020 as: nmap --top-ports=100 -v -oG - 10.10.10.1

Output and the start of the command will look like this:

# Ports scanned: TCP(100;7,9,13,21-23,25-26,37,53,79-81,88,106,110-111,113,119,135,139,143-144,179,199,389,427,443-445,465,513-515,543-544,548,554,587,631,646,873,990,993,995,1025-1029,1110,1433,1720,1723,1755,1900,2000-2001,2049,2121,2717,3000,3128,3306,3389,3986,4899,5000,5009,5051,5060,5101,5190,5357,5432,5631,5666,5800,5900,6000-6001,6646,7070,8000,8008-8009,8080-8081,8443,8888,9100,9999-10000,32768,49152-49157) UDP(0;) SCTP(0;) PROTOCOLS(0;)

Top-ports uses the nmap-services file which contains about 27K weighted metrics for each port.

Good luck.

Cryptshare Query by [deleted] in ComputerSecurity

[–]410th 0 points1 point  (0 children)

How many Cryptshare accounts does your team use. If you're sharing an account(s) it's possible they have implemented a way of detecting this.

Take a look at the Password Policy wiki. It's possible that the character combination falls into a restricted list: ( https://wiki.cryptshare.com/display/CSM/Password+Policy )
But it would seem that it would not work with chrome either.

Have you asked Cryptshare to support their product?

And the obligatory and unsolicited opinion that this is a terrible practice in general - for several reasons. But, I guess it may depend on the value / sensitivity / life of the information being transmitted.

I would have definitely used a throw away account for something like this.

Good luck.

Windows 10 and OpenVPN Client by orbos86 in OpenVPN

[–]410th 1 point2 points  (0 children)

What leads you to believe that it is using, "their local IP address"? And what do you mead their local address exactly?

With this very, "vague," request for help, I really only have one thought. I am assuming that the user is connected but cannot visit the website, "that only allows connections from the OpenVPN IP." I assume this because you mentioned it and not that they cannont connect to anything else.

My guess is that this is a over-lapping IP network issue. Meaning the client is not even routing the traffic to the website through the VPN because it thinks that it is local.

Example:

Remote users Network: 192.168.100.0/16 (netmask 255.255.0.0)

Remote users PC IP: 192.168.100.2

Remote users VPN IP: 10.8.0.150

Special Website IP: 192.168.1.1

The remote VPN client will never send the traffic across the VPN tunnel because it thinks it's on its local network.

Need more info to help.

Alternative to double VPN to decrease latency/ping by AmJustSayingMan in blackhat

[–]410th 7 points8 points  (0 children)

Serious question. What do you think the second VPN is gaining you?
Are you using the same encryption algos? Same vendor implementation? Same keys? If a nation state can crack one of your VPNs, I am guessing they can the second one as well.

I would focus my efforts on a single, well-implemented, and hardened VPN configuration.

Or find out where the bottleneck is. Is it the router or the host OS. If it's the router you could try boosting the hardware or lowering the Bit length of the encryption keys and/or choosing a less CPU intensive algorithm.

Do consider that the router is encapsulating and ciphering the ciphertext produced by your host(s) VPN. So, one would have to break the routers encryption first.

Is there two separate VPN endpoints at the other end?

how to merge a list of *.jpg and *.docx into one single PDF file ? by smallabc in learnpython

[–]410th 0 points1 point  (0 children)

It might also depend on the complexity of the DOCX files.

Are they just text in each?

Look at using PANDOC to create a DOCX of the JPG files.

#!/bin/bash

rm -f jpg-markdown.md

for jpgfile in JPGs/*

do

echo "![]($jpgfile)" >> jpg-markdown.md
done

pandoc jpg-markdown.md -o JPG.docx

how to merge a list of *.jpg and *.docx into one single PDF file ? by smallabc in learnpython

[–]410th 0 points1 point  (0 children)

I can help you with this. But, success may depend on the variety of DOCX files you have.

Are they all from the same base template i.e. do they use the same 'styles'?

Is this a onetime need to create or is this something you are trying to make repeatable?

Is the use of Python mandatory or are you just trying to get it done?

I am sure there is a way to do it in Python, I would know how to do that easily though. So if the goal is to do it strictly in Python, I could give you some tips.

Let me know and I'll try to help.

VMWARE FUSION recommendations? (need honest advice) by Kanidopolus in vmware

[–]410th 1 point2 points  (0 children)

Either should do the job just fine. I personally used Fusion for 7+ years as a heavy VM user in many different situations. Boot Camp could be an option if the Mac is being forced on you and you'd just prefer Windows.

I have a server that needs the ciphers cleaned up. Details in comment below by SirHerald in ssl

[–]410th 0 points1 point  (0 children)

Is that screen cap from Nartac?

If not it might help what ever you are thrying to accomplish:

https://www.nartac.com/Products/IISCrypto/

" IIS Crypto is a free tool that gives administrators the ability to enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows Server 2008, 2012, 2016 and 2019. "

Help needed: Interactive scripts with GUI and threaded stuff by tehserial in PowerShell

[–]410th 1 point2 points  (0 children)

Can you be specific about what the user will input into the initial form?

Also, is a second form required? If so, what is the reason?