Jump to content

chrisknight

Members
  • Posts

    581
  • Joined

  • Last visited

Posts posted by chrisknight

  1. If you don't want to look at my cock.

    Don't look.

    End of story.

    Exactly. If I'm in my house, I'm walking around naked if I want to. No one else was IN the house.

    If I went out to get the mail, that's a different story.

    Unless he was tapping the glass with his d1@k and licking the glass, hes not guilty.

    What if he wasn't making coffee? What if he was having sex with someone? Same described situation. Still not guilty unless their standing IN the window trying to get attention.

  2. I know there are a bunch on tech type people on here. Thought Id check here first. These are working devices with no functional issues.

    I have an older Cisco core set switch. 4006 with supervisor engine, 10/100 Blade. GBIC Blade with 4 installed SC Fiber Duplex GBICs. $100ish.

    switch1.jpg

    Also a Dell PowerEdge 2600 server. Two 2.4 Xeons. 8.5 Gig of RAM. Perc 4 RAID 0/1/5/10 with 6 installed 36 gig SCSI hard drives and 1 spare.

    Dual Power supplies. Comes with No OS, or Fedora or CENT. $650ish.

    net1.jpg

    net2.jpg

  3. So today, I was doing some pen testing at home may have accidentally poisoned the company ARP table during a man in the middle attack session. I was doing some man in the middle attack, dns spoof and session hijacking testing between some Virtual machines, another laptop, and my router at home and sniffing the traffic at the same time to validate the session, and all of a sudden I noticed company IP's coming across my sniffer. Thats when I realized I was VPN'd into work. <Insert O-Shit scream here> No idea how the arp poisoning attack and dns spoof broke out of my local network. big woops. I called and put in a ticket just to make sure in case it caused problems and they actually think I was doing something. Try explaining that one to tech support. So Note to self for everyone, make sure VPN is not connected when doing pen testing on home network. Better yet.. make damn sure you know exactly where your network traffic can go because murphys law says its going to go all the places you dont want it to.

    For the non computer geeks. I was practicing breaking into stuff and intercepting network traffic for in transit changes and may have caused issues with the company network. Big no-no.

    Was your sniffer set to listen on all interfaces? More than likely, you just saw some broadcast traffic from your PPTP (or whatever your using) VPN tunnel you had to work.

    If you specifically directed your attacks to a specific subnet, they stayed on that sunbet. Of course, I don't know exactly what your using. (backtrack?)

    Your probably cool @ work. If not, flush your arp table, & move on. I wouldn't even tell anyone. Or, just wait. Once the ARP poisoning is over the clients will sort themselves out in time.

×
×
  • Create New...