Author

Topic: Basic Hacking-ish question (Read 1334 times)

sr. member
Activity: 266
Merit: 250
The king and the pawn go in the same box @ endgame
February 07, 2012, 09:51:27 PM
#12
not be there when you pinged.
legendary
Activity: 1834
Merit: 1020
February 07, 2012, 09:48:50 PM
#11
Might of been a leech on your network who is no longer there, or someone war driving, who is also not there

It's possible.  I really don't know a lot about this stuff so I have my work cut out for me.

Should be fun tho.  Especially when I can figure out how to boot this prick.

Question:  If someone was leeching, what could they do to prohibit me from pinging or tracing them?
sr. member
Activity: 266
Merit: 250
The king and the pawn go in the same box @ endgame
February 07, 2012, 09:36:40 PM
#10
Might of been a leech on your network who is no longer there, or someone war driving, who is also not there
legendary
Activity: 1834
Merit: 1020
February 07, 2012, 09:31:44 PM
#9
ZodiacDragon84 - Yes.

Deepceleron - Awesome and thank you.
sr. member
Activity: 266
Merit: 250
The king and the pawn go in the same box @ endgame
February 07, 2012, 09:27:41 PM
#8
Download LOIC, point at fbi.com, now you are an 31337 haxor!

or

Read this:
http://www.nruns.com/_downloads/advisory28122011.pdf.

Then read this:
http://www.openssl.org/news/secadv_20101202.txt

Everything you don't understand, learn. Learn until you can explain every word to someone else. Don't know what PHP is? Learn it. Don't understand the C code diff commit? Learn C until you could write the patch yourself. Then write an exploit for the ciphersuite cache issue yourself. Now go find your own 0-days.

or


More practically, read this to learn about how the browser service works in Windows and why you are resolving stale NetBIOS machine names. And check this out from your local library.
hAXOR PORN, I just got hard
legendary
Activity: 1512
Merit: 1036
February 07, 2012, 09:16:51 PM
#7
Download LOIC, point at fbi.com, now you are an 31337 haxor!

or

Read this:
http://www.nruns.com/_downloads/advisory28122011.pdf.

Then read this:
http://www.openssl.org/news/secadv_20101202.txt

Everything you don't understand, learn. Learn until you can explain every word to someone else. Don't know what PHP is? Learn it. Don't understand the C code diff commit? Learn C until you could write the patch yourself. Then write an exploit for the ciphersuite cache issue yourself. Now go find your own 0-days.

or


More practically, read this to learn about how the browser service works in Windows and why you are resolving stale NetBIOS machine names. And check this out from your local library.
sr. member
Activity: 266
Merit: 250
The king and the pawn go in the same box @ endgame
February 07, 2012, 09:09:24 PM
#6
are you on a wi fi network?
legendary
Activity: 980
Merit: 1003
I'm not just any shaman, I'm a Sha256man
February 07, 2012, 09:02:10 PM
#5
Its probably just windoes picking up on its own workgroup network or somthing of that nature.... maybe login to your modems admin panel and looking at all the dhcp listings?
hero member
Activity: 532
Merit: 500
February 07, 2012, 08:58:35 PM
#4
Run nmap on them  Grin
legendary
Activity: 1834
Merit: 1020
February 07, 2012, 08:58:22 PM
#3
Take two of these Ubuntu's and a drop of Linux and call me in the morning.....

That was helpful.
legendary
Activity: 980
Merit: 1003
I'm not just any shaman, I'm a Sha256man
February 07, 2012, 08:56:15 PM
#2
Take two of these Ubuntu's and a drop of Linux and call me in the morning.....
legendary
Activity: 1834
Merit: 1020
February 07, 2012, 08:07:24 PM
#1
So, I've been trying to learn a bit about hacking simply because I want to know the plethora of methods used so I can better understand security vulnerabilities.

I opened cmd.exe and typed command "net view" and I'm seeing a PC that I don't recognize.

For whatever reason, it won't let me use commands "ping" or "tracert" to try to isolate the IP address.  I get the messages "Ping request could not find host server.  Please check the name and try again" and "Unable to resolve target system name xxxxxxxx"  where 'xxxxxxxx' is the computer's name.

What gives?  I can ping all the others.
Jump to: