PDA

View Full Version : Is This Of Any Use To Anyone?



3rd gen noob
09-04-2003, 03:55 PM
http://opensores.thebunker.net/pub/sites/w...03-simplenomad/ (http://opensores.thebunker.net/pub/sites/www.blackhat.com/presentations/bh-usa-03/bh-us-03-simplenomad/)

is this of any use to anyone or is it a pointless link?

3rd gen noob
09-04-2003, 04:08 PM
cough, cough

3rd gen noob
09-05-2003, 12:11 AM
why has no-one except me replied to this post?

4play
09-05-2003, 12:13 AM
because people are wondering what the it is you have posted.
im not gonna test this out unless i know what it is.

oh a linux and windows version. :D

3rd gen noob
09-05-2003, 12:15 AM
well, ncovert is the program which apparently spoofs ip's successfully within kazaa...ncovert appears on this page

balamm
09-05-2003, 12:16 AM
paranoid?

I have no need for encryption in normal day to day internet use and I imagine it's the same for most individual surfers.

Windows 2000 already uses excellent encryption when it's needed (128bit) so one more program = added bloat and bog.

3rd gen noob
09-05-2003, 12:23 AM
well, the reason i posted it is because if more people know they can share with effective immunity, surely the worries re: riaa will disappear?
there will be a lot less leechers if they know they're not gonna get convicted...

http://www.globetechnology.com/servlet/sto...ory/Technology/ (http://www.globetechnology.com/servlet/story/RTGAM.20030801.gttool0802/BNStory/Technology/)

balamm
09-05-2003, 12:33 AM
Masking the IP won't do anything to disuade RIAA and similar. Every hop will show in a trace route and your ISP proxy will be second to last. It's a simple thing to go from there and subpoena any additional information. The ISP will know it was you, you can't mask your connection to them.
The only way to avoid it is by using an independent annonymous proxy with a program that reverses the headers to look like it was "recieved by" rather than "sent by" that proxie. There are programs that do that but I haven't bookmarked them.

3rd gen noob
09-05-2003, 12:35 AM
why would this be given so much praise by a real 'hacker' then?
surely if it wasn't a big thing, there would not have been such a hullabaloo about it?

balamm
09-05-2003, 12:38 AM
depends what and who you do with it I suppose.

But in this case, kazaa, I see no point. Once you've connected to the wrong user, you are toast! Netstat, Neotrace, all that kind of stuff only takes a few millisconds

3rd gen noob
09-05-2003, 12:41 AM
Originally posted by balamm@5 September 2003 - 00:38
Netstat, Neotrace, all that kind of stuff only takes a few millisconds
"because the data holds only the addresses of the recipient and the third-party server"

tracking programs wouldn't show your ip though, only that of the server

if the server was in a country like palestine, as es5 is, then the riaa wouldn't have access to the logs on the server you used.
this would make the connection untraceable

balamm
09-05-2003, 12:48 AM
How do you physically connect to the internet? Through a phone line or cable to your ISP. How is a connection to you initiated? Through that same phone line or cable. To a physical address on the internet, supplied by who? Your ISP. It doesn't matter what you add or subtract from your data or files, the ISP adds it's own and supplies feedback to connecting machines and providers to maintain the connection and direct the data.
Example, I have domain redirection. My url is wenpigsfly.mine.nu . Now obviously .nu is not a canadian domain extension yet if you do a trace route, it points directly to my location. It has to or you'd never get one bit of data from me.

3rd gen noob
09-05-2003, 12:50 AM
all i'm saying is why is this program being given so much credit on the website if it's bullsh*t?
real hackers are gonna use this program
if it didn't work, surely they're not gonna risk it?

4play
09-05-2003, 12:54 AM
who are these real hackers. you mean people who dos attack.

the only real use of a spoofer is a one way handshake, while all other internet traffic relies on the three way handshake.

3rd gen noob
09-05-2003, 12:56 AM
on the page i linked to earlier "simple nomad" said black hat hackers could use this program

if he was bold enough to make this claim, surely the software can actually do it?
why would he make a false claim?

balamm
09-05-2003, 01:03 AM
Sure they can use it. But not for a file transfer such as you'd have with kazaa.

It's nothing to mask your identity in simple communication through a proxy. Getting a resumable download established the same way isn't possible or plausible.

3rd gen noob
09-05-2003, 01:10 AM
this is another topic added to my useless topics pile then?

:P

balamm
09-05-2003, 01:23 AM
Well, I'm sure there are some wanna be hackers around who'll find some benefit from it.