Slavi 94 Master Poster Featured Poster

This smells like gcat implant but UPX for obfuscation ..
For the password, you can AES encrypt it and only decrypt during runtime in memory so whatever touches disk will awalys be encrypted. Add anti-debug techniques otherwise using ollydbg would take 10 seconds to run ur executable and get to the point where the password is decrypted

Slavi 94 Master Poster Featured Poster

int(s) ?

Slavi 94 Master Poster Featured Poster

You declare metters in here but you don't set it to anything. Then you pass it as a parameter to setRadius. Basically you pass nothing in here? I think this is where James points out that you need a numeric value

SettingsActivity sa = new SettingsActivity();
        int metters;
        sa.setRadius(metters);
        // Creating circle around marker
        circle = mMap.addCircle(new CircleOptions()
            .center(latLng)
            .radius(sa.apply()) // Not alowed like this
            .strokeColor(Color.RED)
            .fillColor(Color.GREEN)
        );
Slavi 94 Master Poster Featured Poster

He has obviously forbidden this topic.
I bet he doesnt have MS office and thinks it's made by office 2010 cos of the extension.

Anyway, for those who don't have ms office and need to open point points, you can import them to google drive and convert to google slides. Then you'll have it and be able to edit it as well

Slavi 94 Master Poster Featured Poster

Awesome, although lolwindows10, here's a quick overview of it from a privacy/security point of view

Click Here

Slavi 94 Master Poster Featured Poster

My guess is that a malicious file has been injected to the real msiexec.exe and now is trying to send information about your system to a domain in russia, which a real microsoft process would have no intention in doing so. To prove that, check the checksum of the file on your system and the one provided by microsoft(or on a clean system). If there is difference in that, it is indeed malicous. I would recommend you using SHA1 or better, don't use MD5 or any of the family for computing the checksum

Slavi 94 Master Poster Featured Poster

Use Eclipse, it is a Java IDE, generally adapted to Android and has everything that you'd need. There's long guides on how to set up your environment and start creating apps and in case you don't have an android device, you can test them on a virtual simulator which Eclipse can start as well

Slavi 94 Master Poster Featured Poster

You can use a hashmap, where you have pairs of key->value

For example, you can set the key to be the nickname and because key's cannot exist more than once, that will restrict users to have unique nicknames( as you'd expect it to be). Here's an example of what it would look like:
{Nickname : (name, lastname, other info)}

example
{Slavi : (Slavi , SlavisLastName, welovejava)}
etc ...

then what you do is, you search someone by the nickname and you get the values stored to that nickname

or ... if you insist on using arraylists .. you could create a class that stores all the information and then create object for each customer and store the objects in an array list.

Though I think hashmap is the way to do it as look ups require significantlly less time(As far as I remember)

Slavi 94 Master Poster Featured Poster

By erasing them from bash_history, but if you want to delete a folder called "myFolder" and everything in it, just use sudo rm -rf myFolder then even if you recall the command later on, it will just give an error that the folder was not found

hefaz commented: Thanks! +2
Slavi 94 Master Poster Featured Poster
Slavi 94 Master Poster Featured Poster

type ipconfig , the physical address is your mac

Slavi 94 Master Poster Featured Poster

or instead you could
from __future__ import division =))

Slavi 94 Master Poster Featured Poster

Whatever is in the ram should be on the image afterwards unless a corruption of some kind has occured(which is not that uncommon). You seem interested in volatile memory as you've asked stuff about volatility and now ram images. I would suggest you to take a look at a book called "The Art of Memory Forensics". It is by the developers of volatility, so the tool is used throughout the book. Moreover, the book covers ram images of different Windows operating systems, Linux and Mac as well. It is an incredable read and I am pretty sure if you want to get deeper in the field you would love it

Slavi 94 Master Poster Featured Poster

excuse me good sir, but I do believe you're not a windows hacker,

WRONG .. in fact I am ..

your beloved MS

Only time I run MS OS is when I need to test an exploit or reverse engineer usually malware(IDA PRO and few others dont run on linux)

(if anything tries to run, it has to get through me, Avast, and Comodo)

You are joking right?

Internet Explorer

You're right, quite some exploits and zero days but good thing is most of them are not available to skiddies like you(yet)

I've spent years looking into this stuff, so don't think I don't know ;)

say what? Seems like you would need to spend some more years

Slavi 94 Master Poster Featured Poster

Oh, this is a good one. I remember it when my high school teacher was telling us the story!

Slavi 94 Master Poster Featured Poster

Practically implemented (limited to) the address space is 2^48 as far as I remember in numbers, which was something like 400TB?(can't remember) but will definitely be enough for awhile (y)

rubberman commented: Probably until the heat-death of the universe! :-) +13
Slavi 94 Master Poster Featured Poster

What I've done is install unix commands to CMD, i think the packet is called gnu commands for windows or something similiar, and as far as I remember I actually made a post about it in the geeks lounge some time ago(I am a terminal kind of guy, that pack came as a miracle to me for those times when I have to go to windows)

Although cygwin is the ultimate solution so to speak, I've been trying to avoid it

EDIT: Found the link Click Here

Slavi 94 Master Poster Featured Poster

Out of the blue my guess would be manage-bde -status (Drive Letter): , this should include bitlocker version in the response (don't have windows nearby to test it right now but you can and get back if doesn't work)

Example: manage-bde -status C:

Slavi 94 Master Poster Featured Poster

If you are into that kind of stuff (^Advanced AI) I recommend reading Superintelligence by Nick Bostrom

Slavi 94 Master Poster Featured Poster

I agree with rubben, could be cost issue and they'd rather not deal with it until its too late, thats why #DFIR is becoming so popular (Hey I got hacked, come and fix everything as it didn't happen)

Although it's understandable to not spend money on top of what has already been, I guess it's better to do spend some rather than be left out of business, some of those organisations' web servers are quite popular and are visited tens of thousands of times daily. That really exposes a lot of customers and the company as well, i mean even a simple XXS can be catastrophic, such as redirect user to a similiar looking page with a big red text saying please download our new protect's update it has awesome features .. well you could imagine what those features are :D

Slavi 94 Master Poster Featured Poster

They either don't understand the risks or they just don't care about protecting sensitive data. Think heartbleed is ranked #1 critical flaw for 2014 followed by shellshocker

Slavi 94 Master Poster Featured Poster

I never catch anything

You never catch anything that you/your AV software knows of ;)

and I have a windows partition, using Avast on it as well. Seems to be one of the best choices currently out there now especially that it is free

Slavi 94 Master Poster Featured Poster

int average = ((sum of Numbers)/lengthOfNumbers)

Example:

(1+2+3+4+5)/5 = 15/5 = 3

Slavi 94 Master Poster Featured Poster

Hello everyone!
As some of you may know, Eclipse Luna appears to be broken for users of Kali Linux. There is a simple fix for that

Assuming that you have installed Eclipse Luna

locate eclipse.ini

sudo nano eclipse.ini

add the following 2 lines before --launcher.appendVmargs

--launcher.GTK_version
2

press ctrl + x then press y and finally press Enter
That should fix it and you should be able to run eclipse.

Now, next thing to do is we want to include Eclipse in Applications Menu for easier access or for dock users(like me on xfce) we can dock Eclipse.

sudo nano /usr/share/app-install/desktop/eclipse.desktop //if this file does not exist on your system, just make an empty file and copy the content

paste this inside and FIX Icon and Exec to match your path!

[Desktop Entry]
X-AppInstall-Package=eclipse-platform
X-AppInstall-Popcon=1699
X-AppInstall-Section=main

Type=Application
Name=Eclipse
Comment=Eclipse Integrated Development Environment
Icon=/home/Slavi/Development/eclipse/icon.xpm
Exec=/home/Slavi/Development/eclipse/eclipse
Terminal=false
Categories=Application;Development;IDE;Java;
X-AppInstall-Architectures=amd64,armel,armhf,i386,ia64,mips,mipsel,powerpc,sparc

press ctrl + x then press y and finally press Enter

next step is to copy this file to the applications location, and it will automatically pop up in the Applications Menu
sudo cp eclipse.desktop /usr/share/applications/

There you go, this process can be repeared with software such as Teamspeak 3 to add it to Applications Menu, though note that Icon and Exec have to be changed to match your desired application

Slavi 94 Master Poster Featured Poster
rubberman commented: The Cplusplus.com web site is a great one! I use it all the time. +13
Slavi 94 Master Poster Featured Poster

What error do you get and where?
Also it seems like you are implementing methods inside the method main, perhaps that is your error and what you should do instead is implement them before calling the method main and then make method call to the implemented methods from within main such as:

rollADice()
return random number 1 to 6

main()
   print rollADice()
Slavi 94 Master Poster Featured Poster

Try using Tor, it is a special onion network technology, which keeps users anonymous. The traffic you generate is bounced by different nodes in the network before reaching the server that you are accessing, so it might take a bit longer for things to load but it gives you some privacy

Slavi 94 Master Poster Featured Poster

shouldn't address and phone number be fields of the person class?

Person
    Name
    Age
    Address
    PhoneNumber



Then if you want to have your objects in the arraylist
person1 = new Person(name,age,address,phonenumber)
person2 = new Person(name,age,address,phonenumber)
person3 = new Person(name,age,address,phonenumber)
arraylist.add(..)...
JamesCherrill commented: That's right. +15
Slavi 94 Master Poster Featured Poster

The problem is that your html variable is just a string containing this value
https://www.daniweb.com/software-development/python/threads/492669/how-to-print-only-the-content-of-all-tags-from-a-url-page
and not the actual HTML code ... the library that you have imported urllib2 .. use it to get the code from that page
Read urllib2
and also the example from there ..

import urllib2
response = urllib2.urlopen('http://python.org/')
html = response.read()

also.. should this >>> re.findall(r'<p>(.+),/p>', html)
be >>> re.findall(r'<p>(.+)</p>', html)?
and I am not sure if you read the link I gave you earlier about regular expression but the . matches any character including space. The + stands for that get all character that match the pattern stated which in our case was the . representing any character between <li></li> as in get all characters that match the pattern, as if it was only . without + it will simply return a single character that matches the pattern

Slavi 94 Master Poster Featured Poster

Yes we do! - > Click Here

Slavi 94 Master Poster Featured Poster

My choice for python is Sublime Text 3 with additional plugins such as Anaconda, it all makes the text editor a complete IDE for python, nice highlihting and its highly customizable, love it

Slavi 94 Master Poster Featured Poster

Byte of python and hacking ciphers with python is what I used, and I pretty much loved them. However, This is a great starting point and it is online, good examples and detailed explanations

Slavi 94 Master Poster Featured Poster

Try this:

re.findall('[\d.]+','2123.32321%')

outputs:
'2123.32321'

re is regular expressions module so you have to import re

Slavi 94 Master Poster Featured Poster

You can use an IDE as #djjeavons mentioned or a text editor(sublime is my favorite). If you do use IDE (such as eclipse) you can compile the code and run it from within there, while with a text editor you can compile the code from the terminal using 'javac filename.java' and run it using 'java filename' - note no extension at the 'java' command

Slavi 94 Master Poster Featured Poster

or Java RMI, where you can invoke methods implemented on the server from the client

Slavi 94 Master Poster Featured Poster

I think that knowledge needs to be shared among everyone willing to learn new things, I am nowhere nearly as good as some of the guys around here but I am trying to learn and improve myself and while doing it I do the same thing if I can share what I've learn so far. And by any means, it really isn't embarrassing, we are humans, we have been born with no knowledge other than basic instict for survival and we must go through that step of learning

ddanbe commented: Indeed! +0
Slavi 94 Master Poster Featured Poster

What is the name of the folder? Do you have "show hidden files" and show "system files" enabled? As if its a system folder you probably won't be able to, such as those that windows creates say on usb drives. If the folder has a hidden or something file that is still being in use, it won't let you either but if that is the case, a restart of your system will be enough to be able to delete it afterwards as I doubt it will be a start up application.
By the way, are you able to locate it using "cmd"? If so try deleting it from there

If those above don't help, well
As in the case of a computer virus, as on a windows system I highly suggest you using an antivirus program Avast or AVG, and scan your computer. If those don't work it might be nice to do some packet analysis using wireshark or a similiar tool to see whether the virus/a botnet zombie or any of the sort is being communicated to through a command and control server but if this is the case I think we could do into it later on

Slavi 94 Master Poster Featured Poster

well, I'd state my opinion as well "It's too big" >.>

Slavi 94 Master Poster Featured Poster

among the clients but I assume that your router is connected to ethernet cable, which's bandwidth is limited to 100mbps so, well

Slavi 94 Master Poster Featured Poster

oh, rand is an object of type Random,
and that int that you just decleared called rand, rename it
Random rand = new Random()
also import it

Slavi 94 Master Poster Featured Poster

instead of using that for loop to generate the number use this
int randomNum = rand.nextInt((max - min) + 1) + min;

Slavi 94 Master Poster Featured Poster

You could print any item that you desire from the array simply by supplying an array index. Perhaps you could add a field that is say for example phone owner, which is a String and represents the name of the owner. When the program is ran, you could print only the owner names to the user such as:
Press the number of whom's information you would like to see
1. Matthew
2. Slavi
3 ...
4 ....

And then the user is expected to enter a number and then pass that number decremented by 1 (Because arrays are 0 based) to the array and print the object's fields.

An improvement to your program would be to create a method print(), so that you just call that method to print someone's information instead of calling print statements all over the code. In your case you print it only once but in general that's a good practice.

Slavi 94 Master Poster Featured Poster

In your class SmartPhone, you pass the mobileOS to the constructor but you never set it to your field so inside the constructor you should add:
this.mobileOS = mobileOS;

Slavi 94 Master Poster Featured Poster

@sneekula,
the majority of windows users have no idea on computers or what so ever, their daily use is Facebook, Twitter, google and clicking links such as "OMFG YOU MUST SEE THIS!!" - with some attractive image under the title. As you are technically running windows as root, it is easy to get malware to self install and in a way easy to distribute it by hiding it in stuff that the mass of people would fall for. On the other hand, Linux is not so much used as a general os, people are unaware of it and its capability. I mean, just the idea of making everything(kind of) to be what you want it to is a reason to really go for it. For malware authors, they would indeed aim at an audiance that is easier to get infected, grow their botnets or spread their RATs

Slavi 94 Master Poster Featured Poster

Exactly, as rubben said tcp assures you that the information will be delivered, and no guarantees at all with udp, it just fires out packets. Streaming/skype etc find use of it

Slavi 94 Master Poster Featured Poster

Use Linux, problem solved =)

Slavi 94 Master Poster Featured Poster

Okay, here is some more information on the methods I proposed but as James said the first one in there is the recommended one, the one liner still works though

Let's break this a bit ..
String last = yourSentance.substring(yourSentance.lastIndexOf(' ') + 1);

yourSentance is a string variable that you get from the user, let's make an example where:
String yourSentance = "I am a sentance";
what substring does is it cuts the string from a starting position in it until a stop position. For example if we call split with parameters 2 and 4 such as

String yourSentance = "I am a sentance";
System.out.println(yourSentance.substring(2,4));

it will print out "am" as that is on position 2 to 4 in the string yourSentance. Now the way that we have it in the example above is
substring(last occurance of space + 1) - means the first character after the last space that exists in the string sentance. Second parameter is not specified so the return gives you the rest of the string from the last occurance of last 'space' if there are multiple ones of course.

The split method is similiar. It splits the entire sentance based on a specified regex. For example our string "I am a sentance" if we use split on this with a regex that is just space such as " " then the result returned to us will be an array of strings, where the original string is cut on each occurance of …

Slavi 94 Master Poster Featured Poster

Where does it say that the checksum is mismatch? Do you calculate it yourself and compare with the one provided on the server that the iso came from?

Slavi 94 Master Poster Featured Poster

Do you mean like this?

import time
run = input("Start? Y/N> ")
secs = 0
#if user's input starts with 'y' / 'Y' start counting
if run.upper().startswith('Y'):
    # Loop until we reach 20 minutes running
    while secs != 1200:
        print (">>>>>>>>>>>>>>>>>>>>>", secs)
        # Sleep for a second
        time.sleep(1)
        # Increment the second total
        secs += 1
Slavi 94 Master Poster Featured Poster

Quite a few, kind of depends on what you are fan of. I am running Elementary OS on my home pc mainly due to the desktop environment that it has(looks like iOS).

Also I have Kali Linux on my laptop(Mainly because it comes with a lot of pentesting tools preinstalled, as I am doing a masters in Computer security) and I was really not fan of the gnome desktop environment so the first thing I did was to change it straight away as soon as I installed it :D

As for clipboard ... I am getting into python now so I've been reading some books and I came accross one called hacking ciphers with python. The book uses pyperclip for copy/paste to/from clipboard. This is the source code from them it also should work on all operating systems as it detects which is the os it is been ran on

import platform, os

def winGetClipboard():
    ctypes.windll.user32.OpenClipboard(0)
    pcontents = ctypes.windll.user32.GetClipboardData(1) # 1 is CF_TEXT
    data = ctypes.c_char_p(pcontents).value
    #ctypes.windll.kernel32.GlobalUnlock(pcontents)
    ctypes.windll.user32.CloseClipboard()
    return data

def winSetClipboard(text):
    text = str(text)
    GMEM_DDESHARE = 0x2000
    ctypes.windll.user32.OpenClipboard(0)
    ctypes.windll.user32.EmptyClipboard()
    try:
        # works on Python 2 (bytes() only takes one argument)
        hCd = ctypes.windll.kernel32.GlobalAlloc(GMEM_DDESHARE, len(bytes(text))+1)
    except TypeError:
        # works on Python 3 (bytes() requires an encoding)
        hCd = ctypes.windll.kernel32.GlobalAlloc(GMEM_DDESHARE, len(bytes(text, 'ascii'))+1)
    pchData = ctypes.windll.kernel32.GlobalLock(hCd)
    try:
        # works on Python 2 (bytes() only takes one argument)
        ctypes.cdll.msvcrt.strcpy(ctypes.c_char_p(pchData), bytes(text))
    except TypeError:
        # works on Python 3 (bytes() requires an encoding)
        ctypes.cdll.msvcrt.strcpy(ctypes.c_char_p(pchData), bytes(text, 'ascii'))
    ctypes.windll.kernel32.GlobalUnlock(hCd)
    ctypes.windll.user32.SetClipboardData(1, hCd)
    ctypes.windll.user32.CloseClipboard()

def macSetClipboard(text):
    text = …
TrustyTony commented: Thanks for sharing! +12