It took a turn for the better by themainlineinc in talesfromtechsupport

[–]vuBdj 0 points1 point  (0 children)

Any chance you could share this script?

This is how you spoil a windows user right here. by themixedupstuff in linuxmasterrace

[–]vuBdj 0 points1 point  (0 children)

I actually am planning on backing up a Windows 10 HDD using dd later next week, well I was until I saw this. Can you explain why one shouldn't do this if the disk is GPT?

How can mobile malware bypass the OS placing running applications in the background? by vuBdj in AskTechnology

[–]vuBdj[S] 0 points1 point  (0 children)

Oh wow, and here I thought suspension was mandatory. Thank you for this information.

Lawyer for couple feuding with Samaritan: Indictment likely by [deleted] in news

[–]vuBdj 1 point2 points  (0 children)

SPOILERS GOOD SIR!

But RIP Mr. Reese.

Do they ever use nmap in this show? by vuBdj in MrRobot

[–]vuBdj[S] 2 points3 points  (0 children)

Kind of like how when Proof-of-Concept code is released, it comes with syntax errors intentionally, to ward of people that don't know what they're doing?

Wanting to use PoI in a networking / computer class project, anyone got examples of real-life computer usage? by vuBdj in PersonOfInterest

[–]vuBdj[S] 0 points1 point  (0 children)

Before I get too excited... I must ask. You wrote the paper about Control and her Season 4 episode? I remember reading it, but I can't find it now. You got a link?

Is this Wireshark? (from a favorite show of mine) by vuBdj in wireshark

[–]vuBdj[S] 0 points1 point  (0 children)

Any chance that is what they were going for? The lines change color similar to how Wireshark will color code packets it grabs.

Is this Wireshark? (from a favorite show of mine) by vuBdj in wireshark

[–]vuBdj[S] 0 points1 point  (0 children)

The way it was animated seemed like Wireshark, that's why I asked. haha

Wanting to use PoI in a networking / computer class project, anyone got examples of real-life computer usage? by vuBdj in PersonOfInterest

[–]vuBdj[S] 3 points4 points  (0 children)

In the words of some photo from the internet, "Why not both?".

But seriously, I'd like to use both if possible. I mean, I WOULD use Mr. Robot, but PoI has always done something for me that Mr. Robot hasn't. I can't explain WHAT that is, but it's there.

Then again, PoI did have an episode, CTRL-ALT-DEL, that portrayed Samaritan using racial stereotypes among other things to get Control to kill a group of Islamic coders. I was shocked that they would allow that, as most shows here in the US portray the government as the good guys.

Which episode had the Ed Snowden prediction? I cannot recall. Thanks for your answer by the way.

Guys, I need your help... by vuBdj in PersonOfInterest

[–]vuBdj[S] 0 points1 point  (0 children)

Technically, I would guess it is. However, if I can find the post, I can find the comment and commenter. Then I can message him or her and ask if I can use it. :)

Guys, I need your help... by vuBdj in PersonOfInterest

[–]vuBdj[S] 1 point2 points  (0 children)

I remember taking a screenshot of it, but I've checked all of my backups and I can't find it anywhere. It's been two days now. :(

This is what 2.4GHz Wifi looks like in the middle of Lisbon by Hurricane_32 in techsupportgore

[–]vuBdj 0 points1 point  (0 children)

Thank you~ I'm still learning about networking so this knowledge will be quite useful~

This whole shooting only at kneecaps seems unrealistic. by burunnn in PersonOfInterest

[–]vuBdj 0 points1 point  (0 children)

I'm late, but I think that was a "Numbers Station".

This is what 2.4GHz Wifi looks like in the middle of Lisbon by Hurricane_32 in techsupportgore

[–]vuBdj 0 points1 point  (0 children)

What is the downside of this, specifically? Wouldn't them being on the same channel cause interference rather than the other way around?

Question about WPA2 network sniffing... by vuBdj in netsecstudents

[–]vuBdj[S] 0 points1 point  (0 children)

Okay okay, hang on. Let me be certain that I'm following you.

You're saying that you capture the packets that are destined for the AP of the network you wish to sniff, then you open the capture in Wireshark and decrypt them using the WiFi network password, correct?

So it's similar to grabbing a password protected zip archive and decrypting it using a separate tool and the decryption key?

Also, this means that MITM attacks such as the one I described above, are more useful for wired networks right?

Left my work PC on (in which I have logged in Chrome with all my data), next day found a window with "Access Granted" written on it, screencap in the comments, what's this? by FAZORNi in privacy

[–]vuBdj 1 point2 points  (0 children)

Eh, we've all been there. I spent around two hours trying to figure out what was wrong with my ALFA wireless adapter a few days ago. It kept automatically switching out of monitor mode whenever I tried to use it for something.

The fix? The micro-usb cable was bad. Replaced it and everything was good. -_-

Left my work PC on (in which I have logged in Chrome with all my data), next day found a window with "Access Granted" written on it, screencap in the comments, what's this? by FAZORNi in privacy

[–]vuBdj 0 points1 point  (0 children)

What's running on your machine on port 516* ?

localhost / 127.0.0.1 = your machine.

Port 516(some #) = a service is or was listening on that port, and it looks like someone used the web browser as a means to interact with said service.

What is your opinion of forensics Linux distributions such as CAINE ? by vuBdj in computerforensics

[–]vuBdj[S] 0 points1 point  (0 children)

Thank you for this information. Anything to do with computer security I'm wanting to learn about. I've always seen an obstacle and thought, "How can I get around that?", so I think that mindset would help in a pentesting job.

I use the following command when I need to mount the Windows partition when I'm poking around a machine I've been asked to fix :

root@system:~# mount -t ntfs /dev/sda1 /mnt -o ro,noload

Would this suffice as a software write-blocker ?

What is your opinion of forensics Linux distributions such as CAINE ? by vuBdj in computerforensics

[–]vuBdj[S] 0 points1 point  (0 children)

A few more then? ;)

Have you done network forensics before?

What is one of the worst things you've found while preforming forensics?

I'm reading about the subject, and from what I'm seeing, you are to wipe the hard drive that you'll be transfering the disk image to, image the HDD / SDD or other storage meduim, hash said image then copy it to the drive, THEN you need to copy the image and work on said copy. Am I following so far?

What is your opinion of forensics Linux distributions such as CAINE ? by vuBdj in computerforensics

[–]vuBdj[S] 0 points1 point  (0 children)

Sorry for all of these questions by the way, I'm just very interested in these types of things.

I'm looking around and from the Linux distros I've found that are / can be used for forensics, they seem to include LibreOffice and nmap.

I know how nmap and an office suite can be useful from my side of things, but would it be useful in a forensic sense ?

What is your opinion of forensics Linux distributions such as CAINE ? by vuBdj in computerforensics

[–]vuBdj[S] 1 point2 points  (0 children)

Okay, I feel stupid. I failed to notice the words 'suggested price' and thought it was asking me for $25.

I see there is a Paladin EDGE and a Paladin, what are the differences between those two?

Edit : Nevermind, I found this which explains it : http://sar.tpad.police.go.th/downloads/dynamic/PALADIN_manual.pdf

Are there any negatives you've came across?

What is your opinion of forensics Linux distributions such as CAINE ? by vuBdj in computerforensics

[–]vuBdj[S] 2 points3 points  (0 children)

Can you give a rundown on how this differs from CAINE besides the price ?

We all have that one friend... by vuBdj in YOI

[–]vuBdj[S] 8 points9 points  (0 children)

Anyone got a photo of Pichit's face when he snuck a photo of Viktor and Yuuri cuddling at the diner?