Category: The Stash

Covers everything from Tech to Sex.

  • A Guide To Using TOR

    A Guide To Using TOR

    Here is an informative guide on using TOR, and choosing your own nodes to work with to allow better anonymity. This guide was dug up from my old tM shit which I saved, and was written by slim-ov-derby.

    Now most of you will know about tor, if you don’t then I recommend reading this site;
    http://www.torproject.org/

    The thing is you can’t just download it, let it run and expect to be as anonymous as you think. yes Tor selects the best routers of its own, but if you actually check you’ll find that alot of them are in the US and Germany. If you have 3, hell even 2 nodes from the same country and range then the traffic is easily correlated; also the exit nodes are not encrypted and the entry node knows your IP, so imagine how easy it would be for them if they were in the same country.

    To make sure you don’t get a bad circuit you want to edit the torrc file.
    Not all nodes are always available so you’ll have to keep checking to see which ones are available.
    https://torstat.xenobite.eu/
    (and the link whilst using Tor: http://eodys67qpzyvyxm5.onion/torstat/)
    Or you can check them in the view network window if you use vidalia.

    Also this link lists all of the suspicious nodes that have been blacklisted by Tor as stings, I’ll explain what to do with this later.
    http://en.linuxreviews.org/Bad_Tor_exit_servers

    Now on with choosing the nodes.

    The first nodes you choose will be the entry nodes, choose fast ones; if you’re using vidalia (which I recommend) then you can see their speeds in the view network window, you can sort them by speed. Choose fast nodes that are in a foreign country (you actually never want to use any node that is in your origin country anywhere in your circuit).
    EntryNodes node1,node2,etc

    Now you want to specify only the nodes you wrote above will be used or Tor will use other nodes if yours are down.
    Do this by adding this line to your file;
    StrictEntryNodes 1

    Now you’ll want to choose your exit nodes. I recommend choosing Russian, Ukrainian or Japanese nodes if you can get any, they are unlikely to be interested in what you’re doing. I recommend staying away from Nigerian nodes, as while they won’t give a fuck about what you’re doing they will be sniffing for passwords and login details. Too choose your nodes add this line;
    ExitNodes node3,node4,etc

    Like with entry nodes, specify to only use these ones you’ve chosen.
    StrictExitNodes 1

    Now we want to add the nodes that we never want to be used in a circuit; these will include nodes from your own country, unnamed nodes and any that are acting suspiciously. There are plenty of Tor forums out there on the entwork that discuss these type of nodes as well, so keep an eye out.
    ExcludeNodes node5,node6,etc

    Note that the node1,node2 etc should be changed to the actual names of your nodes. I know most of you would know this, but there are some idiots who would just c/p everything from this into their file.

    Going back to what I said earlier about the entry and exit nodes being in the same country; make sure they’re not.

    You can’t choose middle nodes, so just be careful and keep any eye ou. The middle node doesn’t know who you are or what you’re doing though.

    Once the file is edited and saved, restart Tor so the changes work. Go and check that your IP is changed (http://www.ip-adress.com/ip_tracer/).

    If it still uses unwanted nodes then delete the router-cache and restart Tor.

    C:\Documents and Settings\loginname\Application Data\Tor\
    Delete the cached-status, cached-routers and cached-routers.new files.

    Always b on the look out to see if your nodes are still up and which ones are available. Like with your proxies, you should change them regularly.

    If you’re still paranoid and want that great deniabilty factor in your favour (comes in great handy when downloading Certain Pornographic content) then run your own exit node.
    http://en.linuxreviews.org/HOWTO_setup_a_Tor-server

    Also coming for great deniability is truecrypt, and of course flash drives which can be disposed of or hidden easily. I’ll go into them at another time though.

    I will also say, like with other proxies, it will be wise to disable javascript and flash, or you could torrify them with the help of proxifier; but I won’t go into that, I recommend just disabling them.

    Tor is useless if you are logging into something that’s linked to you in ayway, shape or form from the same nodes; unless the account was created on Tor itself.

    If you want advice on settng up such applications like IRC and instant messengers through Tor then check this out
    http://www.hermann-uwe.de/blog/howto…-some-pitfalls

    In most cases it’s just about redirecting it to go through the port tor uses (9050)

    Server: 127.0.0.1
    Port: 8118
    socks 5 / server: localhost port: 9050

    It’s pretty simple.

    By the way, if you’re using eMule for any such things
    Empty out the incoming folder. It is not private. Companies search that folder for copyright violations along with your IP address.

    It helps you with the deniablity factor if it comes to that.

    I don’t recommend Tor for scams involving credit cards for the following reasons.

    A lot of tor nodes are blacklisted on sites where you place credit card orders. Even if you set your own nodes it’s not worth it to risk it. More availability to the area it is in with the actual sock proxies, which will help you. You want it to be constant wth that type of thing instead of changing from one location to the other. And if you have a 3, hell even 2 nodes from the same country and range then the traffic is easily correlated; and I’m sure you know the entry and exit nodes aren’t encrypted as well.

    Do not get me wrong, I love tor and use it as well as freenet and i2p each for individually different purposes; tor serves well in a lot of areas, just not for certain scams.

    If you’re going to torrent, please don’t use Tor for that, it puts a lot of strain on the server. Use i2p for torrents instead.

    Like with regular sock proxies, change your nodes regularly, keep them fresh like you would normal sock proxies.

    Discuss

  • How to Create Beep Tunes Using VB

    How to Create Beep Tunes Using VB

     


    Using VB, the internal speaker in your PC, and a couple lines of code, you can create a very basic, yet entertaining tune. To start off, boot up VB and create a new application.

    Place a Button onto the form, like this…

    Double click it, and enter the following line of code…

    Basically, the Console.Beep part is telling the program that it’s going to beep. The 2 values next to it are the pitch of the note, and the duration it will be played for. A quick search on google brings up this list of note pitches and their corresponding values. I’m not sure if they are correct, but whatever.

    GbelowC = 196
    A = 220
    Asharp = 233
    B = 247
    C = 262
    Csharp = 277
    D = 294
    Dsharp = 311
    E = 330
    F = 349
    Fsharp = 370
    G = 392
    Gsharp = 415

    Next, add another line of similar code below it, until you have a tune going on…

    Finally, when you wish to test your tune, hit F5 to debug the application and you can test it out. If there’s any errors in your code, they will be brought to your attention with the debug. If not, then your application will load up. All you gotta do now is click the button!

    Have fun!

    Discuss  http://www.totse.info/bbs/showthread.php?t=4898

  • Basic Port Scanning With Nmap

    Basic Port Scanning With Nmap

     

     

    What is Nmap all about?

    Taken from the Nmap website… (I bolded the best bits)

     

    Quote:
    Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are avalable for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a utility for comparing scan results (Ndiff).

    What will this guide show me?

    I aim to give you a basic insight into how you can use Nmap through it’s command line interface to scan networks and individual hosts. I will also show you some different scan techniques, and provide a list of some ports and the services which run on them.

    Installing Nmap

    1. Visit the Nmap website – http://nmap.org/download.html
    2. Choose your OS, and follow the instructions.
    3. Keep in mind that I am writing this guide using Linux and a command line to run Nmap. If you’re on Windows, you’ll probably have the GUI version. While this looks different, you can use the same commands and it does the same thing.

    Obtaining a list of hosts through a ping scan

    If you’re on your own network, you should already know which devices are connected. To find the IP addresses of these, I usually run the following scan…

    nmap -sP 192.168.0.0-255

    This will pingscan the network between hosts 192.168.0.0 all the way up to 192.168.0.255. Once the scan is complete, you should see a result like this…

    Nmap Ping Scan

    Port Scanning a Host

    Once you have found the host you wish to scan, you can go ahead and scan it. Before scanning, you may wish to take a look at the list of scanning techniques on the Nmap website. These can be used to add extra functionality to your scans giving them more detailed results.

    The simplest port scan you could run would be as follows…

    • nmap 192.168.0.1 (replace IP address with your host of choice).

    In my case, this would be my router being scanned although I could have scanned any device on the network. It displays this output once I have scanned it…

    Nmap Port Scan Ubuntu

    From this screen, we can tell which ports are open or closed. In this case, my HTTP port (80) is open because I am running a webserver. However, this open port could be seen as a vulnerable hole in the firewall – something which could be used as a way into a system and a way of gaining a shell/complete access to a computer system.

    List of common TCP ports

    When port scanning (either from an attacking or defensive point of view), you’re looking for open ports and services which could be exploited in some way. Below is a list of the most commonly found TCP ports, and the services which run on them.

    20 FTP data (File Transfer Protocol)
    21 FTP (File Transfer Protocol)
    22 SSH (Secure Shell)
    23 Telnet
    25 SMTP (Send Mail Transfer Protocol)
    43 whois
    53 DNS (Domain Name Service)
    68 DHCP (Dynamic Host Control Protocol)
    79 Finger
    80 HTTP (HyperText Transfer Protocol)
    110 POP3 (Post Office Protocol, version 3)
    115 SFTP (Secure File Transfer Protocol)
    119 NNTP (Network New Transfer Protocol)
    123 NTP (Network Time Protocol)
    137 NetBIOS-ns
    138 NetBIOS-dgm
    139 NetBIOS
    143 IMAP (Internet Message Access Protocol)
    161 SNMP (Simple Network Management Protocol)
    194 IRC (Internet Relay Chat)
    220 IMAP3 (Internet Message Access Protocol 3)
    389 LDAP (Lightweight Directory Access Protocol)
    443 SSL (Secure Socket Layer)
    445 SMB (NetBIOS over TCP)
    666 Doom
    993 SIMAP (Secure Internet Message Access Protocol)
    995 SPOP (Secure Post Office Protocol)

    Summary

    This guide hasn’t been particularly in depth – I realize that. I have however, given you a slight nudge in the right direction with port scanning, and how you can do it. To understand it more, you should take the time to read some tutorials and guides on the subject. Here are some useful links.

    Nmap
    Backtrack Forums
    List of Nmap Commands
    Irongeek

  • Rabbitweed’s Breakup Guide

     

    Rabbitweed's Breakup Guide

     

    Memento's
    All that crap you have of hers? Get rid of it. If you can't bear to see her preciously crap poetry and laughable artwork destroyed, get a shoebox, chuck everything – I mean everything – in it, and tape it up. Why tape it up? You'll be far less likely to open it that way.

    Ditto for crap on the computer. Maybe chuck all the pictures, email etc. on a CD and shove it in the shoebox as well. At the very least, put it in a folder you won't come across often.

    Best case scenario is if you burn it though. Especially if she's been a bitch.

    Communication
    By all means, get some closure. Let her explain herself, and explain yourself. But after there's nothing new to say, THAT'S IT. Block and delete her from MSN, delete her from your phone, don't visit her…if you share work or study areas change your habits to avoid her. Write some contact details down if you really think you'll forget them and want to talk to her again in the future, but the key is to make it an effort to have to talk to her. By the time you're done adding her number to your cell again you may well realise it's a bad idea to call.

    Even though you may be curling up into a foetal position every time some cheesy pop shit she liked comes on the playlist/radio, let her believe you're handling the breakup in a calm, confident manly way by NOT TALKING TO HER FOR ATLEAST A MONTH. Longer if the relationship lasted more than a year.

    "But rabbitweed, I miss her a lot and I really think crying into her phone like a little girl at 3am will win her over"

    It won't. If you harbour hopes of being with the girl one day…this will just come back to embarrass you, and will turn her right off. If you don't want to be with her again…well, now she has something to tell her girlfriends and laugh about with her new boyfriend.

    Freedom
    All that shit you've wanted to do but didn't for her sake? Go ahead on do it. Hit on girls you've found hot, move to where you've always wanted to, start university, join the army, get into street fights, have gay sex, take drugs…whatever you withheld for her sake but really wanted to do, do it, or at least consider it. You're free to do that now and don't need her approval for anything.

    If she comes crawling back
    First off…don't count on it.

    Second off, I think it's imperative that you get over someone and have a proper emotional break before you can get back with them again. If the relationship failed, there are generally reasons…and if it's come to this, they can't be solved really easily.

    If you've had time apart, you feel you've both really changed…THEN TAKE IT SLOWLY. Even if you rushed together before, proceed cautiously, make sure it's good for both of you before you get invested in her again. Try not to have any pre-conceptions on how it will be based on before either…start afresh.
    __________
    I wish you all the best. I know not much will comfort you right now, but believe me, you WILL get over her. There will be another girl for you. She's not the only one…you'll be surprised how all those magical qualities you thought no other girls have were either not that great in the first place, or far more common than you think. My first girlfriend was very short, tiny, skinny as hell. She was very delicate and cute, it was great to be able to pick her up easily…I though all other women looked like freaky giants and ogres after I broke up with her. My next girlfriend was 6 foot tall, and I thought her body was absolutely perfect…she had nice long legs, it was so nice to be at eye level and I didn't have to stoop down when I held her hand…

  • Basic Punctuation

     

    Punctuation

    OK so basic punctuation should be common knowledge for most people over the ages of 10 but you would be surprised to find out how little people actually know about how to form a sentence properly. In this thread i will describe the four types of sentences and some of the simple punctuation marks that you should know to write basic letters.

    Period (.)– Use a period to end a complete sentence. A sentence is classified as a string of words including a subject and predicate. In British English a period is called a 'full stop'. There are two types of sentences that end with periods. The first is a declarative sentence which is classified as a sentence that is just stating something (e.g., "it's cold out"). Imperative sentences are sentences that are used to demand something from the person being talked to (e.g., "get me the keys").

    Example: "He went to Las Vegas yesterday."

    Comma (,)– There are many ways to use commas:
    *Separate a list of items. This is one of the most common uses of a comma. Notice that a comma is included before the conjunction 'and' which comes before the final element of a list. 
    Example: "It took two trains, a ferry, a bus and a 3 hour car ride to get here."

    *Separate phrases (clauses). This is especially true after a beginning dependent clause or a long prepositional phrase.
    Example: "Even though he wanted to come, his mother wouldn't let him"

    *Separate two independent clauses that are connected by a conjunction such as 'but'
    Example: "I'd really enjoy seeing a film this evening, and I'd like to go out for a drink."

    *Separate appositives (a noun, or noun phrase) or non-defining relative clauses. In other words it is like using parenthesis in the middle of a sentence.
    Example: "My dog, who is 13 years old, loves to play fetch."
    Question Mark (?)– The question mark is used at the end of a question. A sentence with a question mark in it is also known as an interrogative sentence. 

    Example: "What are you wearing?"

    Exclamation Point (!)– The exclamation point is used at the end of a sentence to indicate great surprise. It is also used for emphasis when making a point. Be careful not to use an exclamation point too often. A sentence with an exclamation point at the end is also known as an exclamatory sentence.

    Colon ( : )– There are two ways to use a colon:
    *To provide additional details and explanation. 
    Example: "He had too many pets: cats, dogs, birds, frogs and snakes"

    *To introduce a direct quote (a comma can also be used in this situation). 
    Example: "He said to his mother: "you're a dirty whore."

    Quotation Marks (")– From what i've seen in people's writing, this is by far the most problematic of all basic punctuation marks. Quotation marks are used to enclose words that are borrowed or to set off dialog from narrative. They always come in pairs: open quotation marks and close quotation marks.
    *A direct quote may be mixed into a sentence already in progress (see Example A) or it may be used in its entirety, either within or part of a sentence (see Example B).
    Example A: In a live interview, Mayor Candor admitted that "our city's police force is failing to meet the citizens' needs."

    Example B: Dr. Striker, chief of surgery at Middleton Hospital, announced today, "Our hospital will no longer be able to offer services to people who have no health insurance."

    With quotations you always want to put your period, exclamation mark or question mark within the quotation marks. The only exception to this rule is if you are writing in MLA format. Also unless you are using a colon before the quotation you will need to put a comma in front of you opening quotation marks (e.g., I said, "how are you feeling today?")