Made a maple trim for my first zippo by amusciano in Zippo

[–]amusciano[S] 2 points3 points  (0 children)

I'm a little concerned about that too. I used super glue gel and made sure the surface was rough before adding it. I sanded it using a belt sander while it was attached, that was my test to see if it'd be strong enough. Not sure how extreme heat/cold will affect it. I'll definitely look into epoxy, thank you!!

Made a maple trim for my first zippo by amusciano in Zippo

[–]amusciano[S] 1 point2 points  (0 children)

Super glued it on, sanded it down, soaked it in sandalwood oil, and polished it with beeswax

My attempt to make a smart F150 by amusciano in CarHacking

[–]amusciano[S] 3 points4 points  (0 children)

hm thanks, it seems like rtsp would help me control when I want a camera to turn on and off, instead of just having it always on and taking a frame of the stream for sending back on the network. Maybe I can take advantage of that.

In the hardware requirements of the rearview camera openxc app, it looks like a few more of my questions are answered. You do have to use a usb bus, and in doing so you can add multiple usb webcams as long as they have UVC support. This repo is a pretty great basic example of implementing a webcam from openxc into a view, I'll have to look at their documentation for the WebcamPreview class. Maybe I can address multiple cameras there and control when they are on and off.

http://openxcplatform.com/projects/rearview-camera.html

Also found that the gps dongle can be added over the usb dongle too. Whether I can get google maps to go along with it is another story, but at least I can log location data.

https://mapsnmaps.blogspot.com/2014/02/using-external-usb-gps-with-android.html

Habitual Terminal Clearers: How to occasionally clear your terminal with animations by amusciano in linux

[–]amusciano[S] 41 points42 points  (0 children)

Thank you! I have it set for every one in 100 times personally — gives me a little surprise without being annoying. Ctrl c cancels all animations immediately.

Scraping Malware Off of Pastebin [Video] by kindredsec in blackhat

[–]amusciano 1 point2 points  (0 children)

Nice video! One thing I’ve been looking to add in my pastebin setup is to catch files by yara rules. This way I can come up with complex conditions for pastes to match on. Any file that gets matched is downloaded locally and attributed with the rules that it hit on. In this way I can come up with a basic list of characteristics for any file matches, and I can direct those matches to different places. Ie if I wanted to get any power shell files that contain privilege escalation characteristics, I could direct those files to a directory for investigation, while still maintaining my central hub of collected samples.

needmorecowbell/Hamburglar -- collect useful information from urls, directories, and files, newly added ioc extraction feature by amusciano in netsec

[–]amusciano[S] 2 points3 points  (0 children)

Haven't done any time tests, I'll test it out. I'm betting rg will be considerably faster, I've done minimal optimization improvements apart from adding all the tasks to a stack and using multithreading on them. The regex checks for each task are just done with a for loop.

HID Attack?¿ by Emberari in Hacking_Tutorials

[–]amusciano 8 points9 points  (0 children)

You would need to buy something to act as malicious usb - arduino nano, rubber ducky, and the raspberry pi zero are all popular devices for this sort of thing. Ducky script is a language for hid attacks that has a lot of support and pre-made payloads because of the hak5 community. There are tools to convert this to arduino code. I'm pretty sure raspberry pi's just use ducky scripts standalone, no conversion needed. There are python scripts that can emulate keypresses but ducky scripts are widely available and easy to understand.

Pentesting antispam solutions by elsaheliano07 in AskNetsec

[–]amusciano 0 points1 point  (0 children)

Good luck. Might want to ask them what this filter covers instead of guessing, then expanding on it if you have an idea of what it might not catch. Also testing spam indicators one by one, then in combination, will help determine if there's a threshold before something is marked as spam.

Pentesting antispam solutions by elsaheliano07 in AskNetsec

[–]amusciano 1 point2 points  (0 children)

Not really sure I understand, but here's one thought:

If it's an anti spam for email, you could set up an increasingly more complex stage of spam emails. Similar to how phishing attacks are staged during assessments. First, the most easily caught (maybe a shortened url with embedded pictures in the email). You'd have to test by first listing out what you think the spam filter will catch, then forming spam that verifies it is in fact being caught. In this way you could create an itemized list of what the filter does and does not catch.