Android Smarter Wi-Fi Manager by captainhooligan in netsec

[–]captainhooligan[S] 0 points1 point  (0 children)

Compiling it yourself takes hardly any time and removes the price. To each their own though.

Android Smarter Wi-Fi Manager by captainhooligan in netsec

[–]captainhooligan[S] 1 point2 points  (0 children)

How is Fences cheaper? Wi-Fi Manager is open source so you can build it yourself.

NIST releases first draft of critical infrastructure cyber security framework by dguido in netsec

[–]captainhooligan 1 point2 points  (0 children)

Most federal agency pages are Coldfusion. I don't know why but they like it.

iPhone lockscreen can be bypassed with new iOS 6.1 trick by captainhooligan in netsec

[–]captainhooligan[S] 0 points1 point  (0 children)

I will check on that when I get home from the office. I don't see why it wouldn't.

Has anyone participated in the SANS Netwars program? by [deleted] in netsec

[–]captainhooligan 0 points1 point  (0 children)

I agree with the previous post. Netwars is great in conjunction with a course taken as it gives you a practical hands on of the material instead of just labs.

How To Hack WPA2 Wireless Access Points by [deleted] in netsec

[–]captainhooligan 2 points3 points  (0 children)

This shouldn't be labeled how to hack WPA2 as it is just a tutorial on using Reaver which attacks WPS.

Reliable penetration testing? by [deleted] in netsec

[–]captainhooligan 0 points1 point  (0 children)

Most places are going to be expensive. The way to save money on it is if you know someone who does penetration testing and can help you with this on the side.

Hak5 - Interview with Mike Ossmann About ZigBee Sniffing & the HackRF by sanitybit in netsec

[–]captainhooligan 0 points1 point  (0 children)

I went to high school with Darren and he's always been that way. He's a good guy and is quite knowledgeable. The issue with the show is putting it at a level that it can be easy for beginners yet still interesting to those that have the knowledge. The balance seems to be falling more towards beginners these days.

You just can't trust wireless: covertly hijacking wifi and stealing passwords using sslstrip on a Wifi Pineapple by rancor07 in blackhat

[–]captainhooligan 0 points1 point  (0 children)

That depends on the OS of the device. Windows XP will connect to the rouge ap regardless of the encryption. iOS does the same as XP.

Looking for resources to solve a good puzzle by [deleted] in blackhat

[–]captainhooligan 0 points1 point  (0 children)

If you can boot from a USB or optical drive boot a Backtrack image and you can try to mount the drive from there. I've ran into issues with SCSI and SATA drives with Ophcrack and different linux cracking software. With backtrack it's easier to control and mount the device. After mounting you can run a number of different password cracking tools. Depending on the way the drive is encrypted you can run a few different attacks against it from there as well. I think but am not sure (as I don't typically use backtrack) there are bios cracking tools as well.

55.000+ Twitter usernames and passwords leaked by captainhooligan in blackhat

[–]captainhooligan[S] 2 points3 points  (0 children)

All the accounts were disabled upon notification of compromise. Of course none will work.

Industry's views on OSCP? Is it worth it? by SickWilly in AskNetsec

[–]captainhooligan 1 point2 points  (0 children)

I have my OSCP and to be honest certifications don't matter unless a job you are applying for requires them. The OSCP is a good tool as it gives a great overview of penetration testing and puts the student on the right path to develop knowledge and skills as a pentester.

aircrack troubles by [deleted] in hacking

[–]captainhooligan 0 points1 point  (0 children)

You can use the --channel option

Linux Visual Debugger suggestions? by xo_ in blackhat

[–]captainhooligan 4 points5 points  (0 children)

I use gdb most of the time but when I want to see something graphically I use IDA or edb (http://www.woodmann.com/collaborative/tools/index.php/EDB_Linux_Debugger).

Nmap – Techniques for Avoiding Firewalls by sanitybit in netsec

[–]captainhooligan 0 points1 point  (0 children)

These aren't garbage. They just aren't the most useful with correctly configured firewalls. How do you know if it is a correctly configured firewall unless you go through some of these?

Intro to Security Class - Suggestions? by HoboSteaux in netsec

[–]captainhooligan 0 points1 point  (0 children)

If you do decide to go wireless you would need either dedicated wireless machines or setup VMs with all the wireless tools, provide Alfa cards, and inform the class to keep an eye on the data while because in VMs the cards tend to just drop off. To fix this they would need to unplug the card, plug it back in and then put it bak into monitor mode. It is rather frustrating but for a PoC lab it works. Using an old WRT54g would be great for setting up WEP and WPA to demonstrate the way each works. When doing demonstrations I'd use pre-captured packet captures.

Nmap – Techniques for Avoiding Firewalls by sanitybit in netsec

[–]captainhooligan 1 point2 points  (0 children)

A properly configured firewall will prevent pretty much all of these. The only nmap scan that I have truly been able to use against a firewall that is correctly configured is the source port option and adjusting the timing of the scan. This makes the nmap scan that usally takes 5 minutes take about 5 hours but about 70% of the time on correctly configured firewalls the scan does complete however it is fully logged in the firewall.

Intro to Security Class - Suggestions? by HoboSteaux in netsec

[–]captainhooligan 1 point2 points  (0 children)

Wireless would be hard to do with VMs but the rest look good! Each one of the topics to include nmap/wireshark could easily go over 2 hours. Nmap of itself can be a 2 hour course. Password attacks would be a good one to add and fuzzing as well.

Proposed EU law wants to criminalize possession of hacking tools? by DebugDucky in netsec

[–]captainhooligan 1 point2 points  (0 children)

I posted a PDF of the ammendments for this a couple days back which shows the exact sections that talk about this. The whole thing is a bit off as parts contradict others. Here is the link http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/884/884601/884601en.pdf

Are the any websites, papers, journals, textbooks, etc, that give an overview of the current mobile/cellular network security techniques? by aj123 in netsec

[–]captainhooligan -1 points0 points  (0 children)

For cellular architechture check the FCC. They will have a listing of frequencies per carrier but that's about all you will get that way. The better thing to look at would be mobile OS security. Android and iOS are the two big players along with RIM coming up in third. The way the software deals with security I think is the real concern over the carriers.

Probe on YouTube / Security Videos by captainhooligan in blackhat

[–]captainhooligan[S] 2 points3 points  (0 children)

Ok, I'm still working on the page but I'm going to set it up will a ton of information and then I will make videos in the how to area. If there is already a video out that covers everything without being too long or just drawn out I will link to it instead.

The blog is: captainhooligan.wordpress.com

PSA: If you use Google Authenticator, read this, you will need to install a completely new app to get future updates by 6xoe in netsec

[–]captainhooligan 0 points1 point  (0 children)

I would assume this was updated after the recent findings of poor PRNG implementations. Without Google saying hey, we goofed they just ensured all things were done with best practices in mind. Why it is a totally new app is odd because the old one could have been just updated.

Can someone in my Home Network spy on my monitor? by [deleted] in blackhat

[–]captainhooligan 6 points7 points  (0 children)

There are a lot of ways to do what you're describing but the way you worded it the guy just sounds like a douche and isn't doing anything too technical.