[03:16] cyberanger: Welcome back [03:18] netsplit, heh [03:18] thanks Unit193 [03:31] Day going well? [03:32] Unit193: well enough [03:33] I found out that oddly enough, KDM works better in Xubuntu than LXDM does :P === wrst_ is now known as wrst [16:33] wb wrst [16:33] Unit193: that is odd [16:33] what about SLiM [16:52] cyberanger: thanks I really needa UPS [17:07] me too [17:07] but laptop battries do enough for now [17:08] the desktop needs it [17:09] cyberanger: Slim only loaded Xfce Session, not Xubuntu Session [17:11] Howdy locotn [17:12] hrm, that's kinda intresting, I think there might be a way to tweak that (idk if I'd want to though ;-)) [17:12] hey netritious [17:12] what's up [17:12] nada just hanging out [17:12] how are things with you cyberanger [17:13] netritious: intresting lately [17:13] cool cyberanger...interesting is always better than boring [17:13] nothing is too certain, small downside, considering the worst case is I stay local looking for work [17:14] and everything else is a relative upshot, a nice job [17:14] with a small downside, If I get (and accept) them, it'll be a move [17:15] nice...in your field or...? [17:15] some, not the majority though [17:16] gotta start somewhere though, right? [17:16] which is ok, not sure what my field is in some sense, I mean, young & flexable, something else might suit me better [17:16] or at least pay for the hobbies [17:17] yep, shame somewhere might not be TN, but pick your battles [17:18] cyberanger: I received an email about a new locotn mailing list. Do you know anything about that? Like why is there a new mailing list? [17:22] yeah, that notice can be disreguarded, a simple mistak [17:22] cool [17:48] bbl [20:22] wb netritious [20:23] ty wrst [20:24] netritious: you will understand but usually when I see netritious: bbl that usually means 3 weeks ;) [20:24] lol [20:25] I typically intend to come back a lot sooner than every three weeks, but you know, life has been keeping me busy :) [20:25] but glad your presence is back [20:25] yeah netritious I know the feeling all too well right now [20:27] some good news: I'm re-purposing all of my server equipment (six machines, with three additional (sub-par) standby's if needed) to create a lab here at the house [20:27] cool netritious what exactly is this lab going to do ? [20:28] security and performance testing [20:28] that's a lot of security and performance testing! [20:28] maybe some source code analysis/auditing so I can learn the procedures involved [20:29] hehe [20:30] the idea is to simulate some "real life" attack scenarios to see how different products stand up to the test, with docs and video of course [20:30] * wrst realizes netritious is in stuff way over my head [20:30] oh stop putting yourself down wrst :( if you can sudo apt-get install and have some time then you can do it too lol [20:30] ha ha yeah time... what is that again? :) [20:31] hehe [20:31] netritious: sounds like you are getting in cyberanger's crazy security domain ;) [20:32] security has always been my top priority, but it's harder to get paid for it ;) [20:33] I think that is changing now though with the feds looking to recruit blackhats (criminals) at defcon and all [20:34] blackhat=criminal, regardless of intention, and I hope I'm not pissing off some blackhat now by saying so, but it's true [20:34] :) [20:34] ha ha [20:37] seems to be some kind of Robin Hood syndrome associated with it, but I would prefer to just keep it localized to my home ;) [20:38] going back to New Horizons to finish up my CEH, well as high as you can go without taking a polygraph :D [20:40] *some of the more advanced/in-depth courses for CEH require security clearance [20:41] CEH? [20:41] Certified Ethical Hacker [20:41] ahh [20:41] gotcha [20:43] BackTrack :P [20:44] wrst: http://tinyurl.com/yayrxsa [20:44] hi Unit193...BT is a good tool, but it doesn't get me certified :) Besides, a lot more out there than just BT [20:45] * wrst has a lot to read now :) [20:45] netritious: Oh yes, but it's a good way to get started from what I know [20:47] Unit193: agreed [20:47] wish it was around when I started pen testing :/ [20:48] I used nessus back in the day as an auditing tool, but then they went all commercial and stuff [20:48] I heard there is a fork out there somewhere but I have no idea what the name of it is [20:48] Eh, I've done WEP once, but not a ton more [20:48] Metasploit or something like that [20:49] hehe a buddy of mine use to be into war driving [20:49] yeah Metasploit is a good tool to, but also went commercial... [20:49] still a free version, but crippled [20:49] *there is still a free version I meant [20:50] I have yet to successfully crack WPA2 using BT, but I think it might be my wireless adapter... [20:50] can't go into master mode [20:53] I have a spare wireless router and laptop with a linksys USB 802.11b/g/n adapter, left running for days and nothing [20:55] Unit193: you into security testing/research? [20:56] netritious: Nope :P Just keeping my SSH away from others (Differ the port) [20:56] +disable pass and force keyfile [20:56] using keys and password logins disabled? [20:56] :) [20:58] netritious: Router supports SSH with disabled pass and supportrs keyfiles :D [20:58] (Use it as a backup) [20:59] dd-wrt? [21:00] ^ Unit193 [21:00] Tomato [21:00] roger [21:01] I like it a bit better, but I also have a second one that needs micro [21:01] what type of device are you using for a router? buffalo, linksys, etc [21:01] Linksys WRT54GS v3 and WRT54G v6 [21:01] nice [21:03] wrst: btw, softball season ended finally..last weekend was the all star championship [21:03] how did your daughter do netritious? [21:03] b/w usage for the month of may: Down: 70.79 GB Up: 56.95 GB Total: 127.74 GB :P [21:03] and netritious was that a hint of relief? [21:04] her team placed first local out of 10 teams, placed third in state (MS), placed fourth in championship [21:04] good job [21:04] Unit193: nice [21:04] wrst: yeah she played her little hiney off this year [21:04] * netritious is a proud daddy :D [21:05] nothing wrong with that netritious! [21:05] not at all wrst! [21:05] I've found out these little girls get you wrapped up pretty early in life [21:06] indeed wrst :) [21:06] we haven't had one for a year and I think she knows she has me [21:31] you guys ever seen a velvet ant? [22:13] netritious: You're around Memphis area right? [22:38] orangeninja: yeah, you? [22:44] Nashville [22:45] I was wondering because your talking about stuff I am interested too. BUt I thought I read or heard you were way down in Memphis [22:45] It was the last meeting. [22:55] yeah just south of Memphis [22:55] cool [22:56] I'm less than 5 miles form the TN/MS border [22:56] too bad... I'd like to help in your lab. If you need any....heh [22:56] Nice area I hear [22:56] It's not to shabby :) [22:57] so you're into security? [22:59] I am into it, don't know much. BUt interested. [23:01] I know a bit, but wouldn't call myself an "expert" exactly...there is a lot of stuff I don't know too [23:03] Yeah. I am trying to set up a little "lab" with a couple of old desktops. Just to mess around with. [23:04] that's all you really need...two PCs and a switch and/or router...really depending on what you want to research, a crossover cable might be all you need (connect directly from one PC to another) [23:06] *if you are using Gb ethernet you don't need a crossover cable, but you said older desktops :) [23:08] I wrote a multi-threaded http client a few years ago where it takes a text file of IPv4 addresses and URLs and queues them up...it was to learn multi-threading... [23:09] the point is, I can start from there and write some other clients, and try to bombard different server softwares with known exploits [23:09] wrst: yeah, netritious and I have kinda been that way, netritious probally has more reasons than I do [23:09] (at least, if he didn't his wallet could hurt more) [23:09] cyberanger: are you calling me paranoid? oh wait, am I being paranoid now? :D [23:10] * cyberanger wishes more of it was paid, personally I just do it for habit [23:10] netritious: is it paranoia, if it's still held in reality [23:11] and I'd say no, if it is a risk, anylize or purge the risk [23:11] cyberanger: I guess not :) [23:11] if it's an exploit patch it [23:11] so on [23:11] now, do I go a little further than alot of people (perhaps you even) oh yeah [23:11] wrst & I banter & rant over that [23:12] cyberanger: have you read about the tools out there that find 0-day exploits? [23:13] all custom written stuff, usually by the security researcher [23:13] and closed of course :P [23:13] yeah, they kinda have to be [23:13] Hi MootBot [23:13] some aren't too closed (including all in Metasploit) [23:13] ::snicker:: [23:14] Metasploit is OSS? [23:14] (I was snickering at MootBot btw, not what you said) [23:14] depends on view, not GPL, but BSD, yep [23:15] the exploits in the framework I think can be many licenses due to that too [23:15] does it reply? [23:15] I focus more on the patches than the exploits I guess, well more the defensive angle [23:15] cyberanger: where is the source code? Looking but can't seem to put my finger on it [23:15] Hi MootBot [23:16] orangeninja: yep, but only meeting related [23:16] ha [23:16] orangeninja: sometimes MootBot talks, but like cyberanger said only in meetings [23:16] hey, dee-nor is served...bbl (shutup wrst! lol) [23:17] ha ha netritious [23:17] enjoy the dinner :) [23:17] or dee-nor :P [23:17] netritious: http://www.metasploit.com/download/ the tarball under unix? [23:17] I bet there is other places, bazar branch or git repo [23:17] cyberanger: i think the dinner plate called ;) [23:17] but not finding it quick [23:18] wrst: well, best not ignore it [23:19] when your plate calls, you best answer it, it might be important (and perhaps fix the faulty ringer in your phone) ;-) [23:20] cyberanger: lots of activity this afternoon [23:20] wrst: yeah, shame I didn't catch it all [23:20] me either i did download backtrax or backtracks or however that is [23:21] backtrack linux [23:21] good distro [23:21] yeah that's it [23:21] curious what that is all about going to fire it up in a VM [23:22] netritious: there is some great code, for wpa & wpa2 bruteforcing, runs on Amazon's EC2 instances, the High GPU instances [23:22] it's kinda neat, worth a try to highlight why security matters a little more [23:22] yeah that's why i'm looking at it [23:24] ok my dinner is done too!. see ya in a few. [23:24] nice jingle [23:25] later orangeninja :) [23:51] back [23:55] netritious: http://www.linux.com/learn/tutorials/479960-the-six-best-linux-community-server-distributions [23:55] and how was dinner? [23:55] cyberanger: checking out the source now for msf4 (which looks to be msf3?) [23:56] wrst: good..chicken, stuffing, green beans [23:56] sounds mighty good to me [23:57] feel like hee haw asking grandpa jones what's for dinner [23:57] * wrst fears he just aged himself