Active Topics

 



Notices


Reply
Thread Tools
Posts: 89 | Thanked: 4 times | Joined on Jun 2010
#321
wen i rouched the top menu bar line i can see only twp applets in my n900 i.e volume option and battery percentage option... i cant see the all applets like fm transmetter,shortuts,internet,clock,bluetooth etc... the default also went off...how to get it back

and one more....
when i went to setting and then cssu tuner i got dis popup mesg "could not detect community ssu being installed
you may still try to use the cssu tuner
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#322
How the *holy f.u.c.k* Your totally broken system is supposed to be related to Yamas? 0_o
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 

The Following User Says Thank You to Estel For This Useful Post:
Posts: 83 | Thanked: 142 times | Joined on Jun 2011 @ Paris, France
#323
^ This. We might be missing the point though...
__________________
http://comax.fr/
"I like to dissect girls. Did you know I am utterly insane ?"
 
Posts: 6 | Thanked: 1 time | Joined on Oct 2010 @ Switzerland
#324
Aaaaaaaaaaaaaaaaaaaaaaaaaaah, I'm freaking out! I have just flashed my N900 and installed only the most necessary applications, but that (censored) (censored) (censored) of a (censored) still gives me the Dissector "dns" not supported (etter.conf line 70) error!

Please, I'm desperate :P
 
Posts: 83 | Thanked: 142 times | Joined on Jun 2011 @ Paris, France
#325
Hi guys ! It's nice and all to play hackers, but what about network security ?!

So, I decided to do a little write up on how to protect yourself or your visitors from this type of attack. You'll find it here : http://comax.fr/yamas.php and then by clicking "how to protect". Not done yet, but it should be done quite soon !

I'll prolly make a copypasta here
__________________
http://comax.fr/
"I like to dissect girls. Did you know I am utterly insane ?"

Last edited by comaX; 2011-07-28 at 20:43.
 

The Following 5 Users Say Thank You to comaX For This Useful Post:
Posts: 529 | Thanked: 194 times | Joined on Aug 2010 @ UK
#326
Originally Posted by comaX View Post
Hi guys ! It's nice and all to play hackers, but what about network security ?!

So, I decided to do a little write up on how to protect yourself or your visitors from this type of attack. You'll find it here : http://comax.fr/yamas/ and then by clicking "how to protect". Not done yet, but it should be done quite soon !

I'll prolly make a copypasta here
just tryed to go toy you site an this is what i was faced with ??

Code:
Error 403 - Forbidden

L'accès au fichier requiert une autorisation.
__________________
METASPLOIT INSTALL N900
Keep the forums clean
Dont forget to say thanks
 

The Following User Says Thank You to stevomanu For This Useful Post:
Posts: 83 | Thanked: 142 times | Joined on Jun 2011 @ Paris, France
#327
[QUOTE=stevomanu;1060205]just tryed to go toy you site an this is what i was faced with ??

Code:
Error 403 - Forbidden

L'accès au fichier requiert une autorisation.
F*ck, my bad... I put / instead of .php... bad habits ! It's fixed now !

http://comax.fr/yamas.php !
__________________
http://comax.fr/
"I like to dissect girls. Did you know I am utterly insane ?"
 

The Following User Says Thank You to comaX For This Useful Post:
Posts: 83 | Thanked: 142 times | Joined on Jun 2011 @ Paris, France
#328
Here's the intro :

"Introduction -- How it works.

In the attack Yamas uses, the vector is the poisonning of the victim's ARP cache. ARP is the protocol that will "translate" physical mac adresses into IP adresses on the local network. When an equipement wants to connect to the network, it will ask for the mac of the router's IP, eg : "Who has 192.168.1.1 ? Tell 192.168.1.2". The router then responds "198.168.1.1 [router] is at 11:22:33:44:55:66 [router]". This will be written in the ARP cache of the client. And this is where we come in play. We send spoofed ARP responses : "192.168.1.1 [router] is at 00:11:22:66:66:66 [attacker]". The client will then modify its cache to set the attacker as the router. We then forward the traffic to the real router, which allows us to read, and manilipulate the traffic on-the-fly. That's how we get the passwords. Thanks to sslstrip, we force the clients to send the credentials as clear text, so that we can simply read them.
All right, but now, how do you protect yourself from that to happen to you ? "

Yeah, I'm a cheap bastard, you'll have to click this http://comax.fr/yamas.php?frame=protect.php to know what's next
__________________
http://comax.fr/
"I like to dissect girls. Did you know I am utterly insane ?"
 

The Following 2 Users Say Thank You to comaX For This Useful Post:
Posts: 146 | Thanked: 39 times | Joined on May 2010
#329
ArpON 2.7
will work on n900?
 
Posts: 83 | Thanked: 142 times | Joined on Jun 2011 @ Paris, France
#330
Originally Posted by q6600 View Post
ArpON 2.7
will work on n900?
Dunno... You'll have to see for yourself or wait for someone to try !
If you read the article, could you give me feedback of any sort in PM please ?

Cheers
__________________
http://comax.fr/
"I like to dissect girls. Did you know I am utterly insane ?"
 
Reply

Tags
pentesting, tester of pens


 
Forum Jump


All times are GMT. The time now is 16:17.