lord_casek Posted June 30, 2006 Share Posted June 30, 2006 Re: «<< 12Oz Computer Tech Support >>> what in the fuck is that (a chair? i think it's a sex torture device. Quote Link to comment Share on other sites More sharing options...
mainterdigerati Posted June 30, 2006 Share Posted June 30, 2006 Re: «<< 12Oz Computer Tech Support >>> bump Quote Link to comment Share on other sites More sharing options...
mainterdigerati Posted June 30, 2006 Share Posted June 30, 2006 Re: «<< 12Oz Computer Tech Support >>> well im outta here be back on monday Quote Link to comment Share on other sites More sharing options...
lord_casek Posted June 30, 2006 Share Posted June 30, 2006 Re: «<< 12Oz Computer Tech Support >>> peas homei. we'll see ya on the flipside Quote Link to comment Share on other sites More sharing options...
Removed Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> nero burning will take care of you. img is their form of iso Im using Nero Express 6, and it doesnt seem to want to come to the party bro. It wont recognise this .img! Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> right click on .img select open with (if it's not there, "open") find your nero.exe in prgroam files, select that. blammo. Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> wouldn't an rca to vga adapter cable work? Quote Link to comment Share on other sites More sharing options...
Removed Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> 'A unknown error has occured while accessing-blah blah blah- City.of.god.NTSC.DTS.DVDR-OBSCURE.img' I dont think it would be a shit file because other people had posted shit like 'thanks great movie' where it was listed. Any other ideas? Quote Link to comment Share on other sites More sharing options...
shai Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> Casek, what did I ask for? If it's the BIOS thing, forget it. It's no big deal. But if it pops up, let me know. Things are strange...I can't go into it right now. I'll explain it all later. Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> wouldn't an rca to vga adapter cable work? do they make those? i dunno. it'd look alot better to do it with a capture card. they're totally worht it too. tivo on your computer. think about it. frankie: http://www.torrentspy.com/torrent/719790/MagicISO_5_2_Build_190 if you don't like to download torrents, let me know, i'll snatch it up and upload it to some site. and here are instructions on how to burn with magiciso http://www.free-press-release.com/news/200312/1071139616.html Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> Casek, what did I ask for? If it's the BIOS thing, forget it. It's no big deal. But if it pops up, let me know. Things are strange...I can't go into it right now. I'll explain it all later. bios is what you asked for...adn that compiler. mainter posted a link to the download and asked to email him for the crack. Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> http://nulldigital.net/blog/view.php?id=41 Using ICMP tunneling to steal Internet Introduction The scenario is you are without Internet connectivity anywhere. You have found either an open wireless access pointed or perhaps you're staying in a hotel which permits rented Internet via services like Spectrum Interactive [1] (previously known as UKExplorer). You make the connection, whether its physically connecting the Ethernet cables, or instructing you're wireless adapter to lock onto the radio signal. You are prompted with some sort of authorization page when you open a browser. You don't have access to it, so what do you do? Open a command prompt or terminal and ping an IP you know to be up, active and that you know to be not physically connected to the network you are jacking into. Perhaps even just ping google.com [16:03] kay@client.example.com:~$ ping google.com PING google.com (64.233.187.99) 56(84) bytes of data. 64 bytes from 64.233.187.99: icmp_seq=1 ttl=237 time=196 ms 64 bytes from 64.233.187.99: icmp_seq=2 ttl=237 time=164 ms 64 bytes from 64.233.187.99: icmp_seq=3 ttl=237 time=152 ms 64 bytes from 64.233.187.99: icmp_seq=4 ttl=237 time=153 ms Right, so we're connected, and we can use ICMP ping requests. We are now in a position to "steal Internet". Now I do not promote any sort of actual illegal activity, but since these networks are "open" to us and acting as a service provider freely with no warnings of what we're doing could be considered unauthorized usage. Since ICMP works we can only assume that we're permitted to use it right? I don't see why they would allow this if they considered it unauthorized without notifying us beforehand. For those that don't actually know what all this mention of ICMP is, I suggest you google it, or check out the wikipedia article on ICMP [2] Building the tunnel To set up the tunnel you need: One up system with Internet connectivity that can receive ICMP traffic and make outbound TCP connections. This system we will call the proxy.example.com. You (preferably) hold root or administrator level access on the proxy system. You (preferably) hold root or administrator level access on your local system A copy of PingTunnel [3] by By Daniel Stødle The first step is simply to install PingTunnel. This is a extremely easy installation. [16:15] kay@proxy.example.com:~$ wget http://www.cs.uit.no/~daniels/PingTunnel/PingTunnel-0.61.tar.gz --16:15:49-- http://www.cs.uit.no/~daniels/PingTunnel/PingTunnel-0.61.tar.gz => `PingTunnel-0.61.tar.gz' Resolving www.cs.uit.no... 129.242.16.40 Connecting to www.cs.uit.no|129.242.16.40|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 53,433 (52K) [application/x-gzip] 100%[====================================>] 53,433 14.12K/s ETA 00:00 16:15:56 (14.11 KB/s) - `PingTunnel-0.61.tar.gz' saved [53433/53433] [16:15] kay@proxy.example.com:~$ tar xzf PingTunnel-0.61.tar.gz [16:16] kay@proxy.example.com:~$ cd PingTunnel [16:16] kay@proxy.example.com:~/PingTunnel$ make gcc -Wall -g -MM *.c > .depend gcc -Wall -g -c -o ptunnel.o ptunnel.c gcc -Wall -g -c -o md5.o md5.c gcc -o ptunnel ptunnel.o md5.o -lpthread -lpcap [16:16] kay@proxy.example.com:~/PingTunnel$ Do this on both the proxy system and your local system. On windows there are some ported copies of PingTunnel which are unsupported by the original creator, but I have used them and can they worked fine for me. You can find them here. One of the packages I believe should be ready for compiling with Microsoft Visual C++, the other is certainly ready for compiling with the windows gcc. You will need the pcap library [4] to compile PingTunnel. For instructions on the libpcap installation see the appropriate manual. If you don't feel like going through all the trouble of compiling this, there should be an executable binary within one of the packages precompiled that you can just run. Making a tunnel On the proxy system, obtain administrator level privileges, and run PingTunnel as below [16:16] root@proxy.example.com:~/PingTunnel$ ./ptunnel -f ping.log & [16:16] root@proxy.example.com:~/PingTunnel$ This will run ptunnel in proxy mode and will log it's output to a file called ping.log rather than print it on stdout. On the client system, obtain administrator level privileges again and run PingTunnel as below, lets assume we wanted to ssh to one of our servers, lets call it portal.example.com. [16:16] root@client.example.com:~/PingTunnel$ ./ptunnel -p proxy.example.com -lp 8765 -da portal.example.com -dp 22 & [inf]: Starting ptunnel v 0.60. [inf]: © 2004-2005 Daniel Stoedle, daniels@cs.uit.no [inf]: Relaying packets from incoming TCP streams. [1] 10858 [16:17] root@client.example.com:~/PingTunnel$ Traveling through the tunnel We now have a tunnel set up. So lets use it! To tell programs to use our tunnel we simply tell them to connect to port 8765 on the localhost. So for example [16:16] kay@client.example.com:~$ ssh localhost -p 8765 The authenticity of host 'localhost (127.0.0.1)' can't be established. RSA key fingerprint is b7:2b:f3:3d:08:86:20:55:1d:82:08:2b:d0:33:fe:af. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'localhost' (RSA) to the list of known hosts. Linux portal.example.com 2.4.27-0.3um #1 Thu Sep 2 11:39:16 GMT 2004 i686 root@portal.example.com:~# Hurray, light at the end of the tunnel. We've used ICMP to make a proxied TCP connection to the outside world. We can use the same principle for any TCP based service. Tunnel authentication Potential problem. Our proxy end of the tunnel is available to be used by absolutely anyone. It has no authentication mechanism to permit only us to use it for tunneling. After all we don't want to get busted for sending spam because some jerk used our tunnel for his own illegal activity. So we need to secure it. The PingTunnel program provides a simple authentication option that allows us to set a password for our tunnel. Its not solid security but it's enough to keep our the majority of people. Especially since if we did a standard scan on our proxy we wouldn't see the ICMP daemon anyway. To set a password, when you run the proxy end, use the -x switch like this. [16:16] root@proxy.example.com:~/PingTunnel$ ./ptunnel -x ubersecret -f ping.log & [16:16] root@proxy.example.com:~/PingTunnel$ Then when our client requests a tunnel we run it like so. [16:16] root@client.example.com:~/PingTunnel$ ./ptunnel -x ubersecret -p proxy.example.com -lp 8765 -da portal.example.com -dp 22 & [inf]: Starting ptunnel v 0.60. [inf]: © 2004-2005 Daniel Stoedle, daniels@cs.uit.no [inf]: Relaying packets from incoming TCP streams. [1] 10858 [16:17] root@client.example.com:~/PingTunnel$ There you have it. Free Internet, no authentication needed with the service provider you are jacking into provided as they permit ICMP traffic. Limitations. There is some limitations however, the functionality of web browsers is limited due to having to make several connections to different places for a single page. The HTML will not indicate it should be passed through localhost. In HTTP 1.1 the Host header must be passed, most clients will pass the host of whatever domain they are currently connecting to, so you will have requests for host: localhost, which most probably wont exist on the web servers configuration and will just be rejected. How it works Enough of all this tutorial-like talk! Let's explain how it works. First of its important to know that ICMP is part of the IP suite of protocols. It's also important to be aware that like UDP, ICMP works on a datagram basis with no sort of transmission control or insurance of delivery. Finally its very important to note that TCP does have transmission control and mechanisms to ensure delivery or be alerted to a failure. Lets take a look at the ICMP packet layout for echo requests and echo replies. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-------------------------------+-------------------------------+ | Type | Code | Checksum | +-------------------------------+-------------------------------+ | Identifier | Sequence Number | +-------------------------------+-------------------------------+ | Data ... +--------------------------------------------- The type field specifics what the packet is for, since ICMP is used for more than simple ping and ping replies there are many values, but for us we only need to be aware of two types. Type 8 tells us the packet is an echo request. Type 0 tells us its a echo reply. The code field is for more information about the nature of the packet, but for both echo reply and echo request the code field will always be 0. If you want to know more about what the code field is used for see the ICMP RFC [5] The checksum is a 16-bit one's complement of the one's complement sum of the ICMP message beginning with the ICMP type. The identifier is used when the code field is 0, for echo requests & replies. Its used to help match requests & replies. This is often some information about the session, perhaps a PID or similar. The sequence number, like the identifier is used as a to track which reply matches up with which request by way of a numerical value. This should be unique to all outstanding ICMP traffic. The RFC does not explicitly specify this. However if the ICMP implementation has a ambiguous identifier field and duplicate sequence numbers in outstanding, traffic could end up in confusion. The data field of the request contains data to be copied into the replies data field. This could be used to add yet another way to identify request session, but in the case of the PingTunnel, this is one of the most important fields. This is where we put our ping tunnel protocol data into, which will include the TCP data. For an overview of the sequence of packets during standard operations such as pinging hosts, or traceroutes this pdf document [6] gives an excellent brief. So thats the background knowledge. The client will always be using type 8 request packets for all its traffic, the proxy will always use type 0 reply packets for all its traffic. The reason for this is simple routing. Say that the client was behind a router the router's operating system may itself reply to the proxies echo requests without forwarding them to a host within its network that is involved in the ICMP tunnel session. This also brings up an important point about the initial setup of the ICMP proxy host. It must be able to receive echo requests itself. This might make the host system a router or simply have all packets for the proxy IP routed directly to it. The ping tunnel protocol is similar to TCP [7], stuffed ICMP data field with an extra field included. The extra field is called by the creator of PingTunnel, the "magic number" in simple terms its just an identifier to separate the echo traffic from regular echo traffic. Since the proxy host operating system should always reply with a regular echo reply to each request packet we send. The internals of the ping tunnel protocol (no byte scaling). +----------------+------+--------+---------+-------------------+ | Magic Number | IP | Port | State | Acknowledgment | +---------+------+------+--+-----+------+--+-------------------+ | Length | Sequence No. | Reserved | Data ... +---------+----------------+------------+---------------------- The IP and port fields are purely used during the first echo request from the client to the proxy to setup where the proxy should forward received packets. These are both 32 bits wide. The state field is crucial in the TCP-like control of the protocol. It shows what sort of semantics should be understood from the packet. Such as starting a session (state = 0), ending it (state = 3), authentication (state = 4), data forwarding (state = 1), and the TCP-like acknowledge data (state = 2). It also contains a flag indicating who send the packet, proxy or client. This is used with the magic number to differentiate tunnel ICMP traffic from the redundant echo replies that the proxy will make - since the proxy reply will contain identical data to the request, this will tell the client to discard packets claiming to be from the client, but are actually from the proxy. When the left most bit is set the proxy is sending the data, when the left most but one bit is set the client is sending the data. The state field is 32 bit wide. For example say state is 0x80000004 then we can see that the proxy is forward some received data back to the client. The acknowledgment and sequence number fields are used to ensure delivery in the correct order and also to detect when a packet could get lost in the network cloud between the client and proxy. These are very much like the TCP fields of the same name, except the sequence number here is a 16 bit number thats allowed to wrap around just before overflow. The acknowledgment field is 32 bit wide, like it is in TCP. As the conversation progresses the sequence number is incremented both client and proxy recording the last received sequence number acknowledge by the remote peer. The acknowledgment timeout time used in ptunnel is 1500 milliseconds and after that time has elapsed without acknowledgment the packet is resent. The length field is the number of bytes contained in the data field when the state field represents data forwarding (state = 1), and 0 otherwise. This is also a 32 bit wide field. The reserved field is just for padding and is 16 bits wide. The data field is exactly the same as the TCP data field and contains the actual data the be transported by TCP once the packet is received at the proxy. For illustrated purposes, here is a diagram of the entire packet to be included within IP. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-------------------------------+-------------------------------+ | Type | Code | Checksum | +-------------------------------+-------------------------------+ | Identifier | Sequence Number | +-------------------------------+-------------------------------+ | Magic Number | +---------------------------------------------------------------+ | IP | +---------------------------------------------------------------+ | Port | +---------------------------------------------------------------+ | State | +---------------------------------------------------------------+ | Acknowledgment Number | +---------------------------------------------------------------+ | Length | +-------------------------------+-------------------------------+ | Sequence Number | Reserved | +-------------------------------+-------------------------------+ | Data ... +---------------------------------------------------- As you can see the ptunnel protocol adds a lot of extra data to simple ICMP packets. Ping tunnel also has some neat mechanisms for controlling multiple connections using the identifier field discussed earlier. It also emulated TCP transmission "windows" where the two hosts take turns in sending data. See the TCP RFC [7] for more information about TCP transmission windows. The authentication mechanism is simple and effective by sending a challenge for which the client should take the md5 hash of the password, appending to the challenge, and Finally taking another md5 hash of that. The proxy when match up this simple authentication and will respond accordingly. The light at the end When using PingTunnel you will probably have to expect a bit of latency due to all the extra data going around, not to mention that you're having to go through a proxy to get out onto the Internet! I do wonder if two sequence numbers are absolutely necessary, but hey, it's only 2 bytes wide anyway. PingTunnel is an awesome utility and well work having around, it could do with some development. I'm tempted to request to join the project because I want to work on building a proxy-like interface to the program, such that you set a program, such as a web browser to use a SOCKS or HTTP proxy on localhost at the user-defined port number. This will overcome the program with web browsers and allow regular HTTP traffic to function perfectly. Another idea and expansion I'd love to bring to the project would be a TCP wrapper shell, such that once within the wrapper all TCP traffic is automatically caught and redirected through the tunnel on the fly, this is a big project and will lead to the possibility of simply being able to start up the system in the TCP wrapper shell and have the full Internet experience without even having to move a finger or mess about changing tunnel destinations and so forth. References (Viewed 10th to 12th may 2006) [1] http://www.spectruminteractive.co.uk/ [2] http://en.wikipedia.org/wiki/Icmp [3] http://www.cs.uit.no/~daniels/PingTunnel/ [4] http://sourceforge.net/projects/libpcap/ [5] http://www.ietf.org/rfc/rfc792.txt [6] http://www.eventhelix.com/RealtimeMantra/Networking/Icmp.pdf [7] http://www.ietf.org/rfc/rfc793.txt Quote Link to comment Share on other sites More sharing options...
psyone Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> ^interesting Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> good for when you're at panera bread and they want to charge you for teh internets Quote Link to comment Share on other sites More sharing options...
alure Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> okay..the adminstrator has disabled us to delete our history from internet explorer..i'm running on windows xp... the security access isnt that great..and this girl who used to work here used to change shit around all the time.. so i know its doable.. how do i make it so that i can delete my history.. or else im gonna miss 12oz;[ please help..i've been messing around group policy to see if i can change anything.. but i'm not coming up with anything.. Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> http://www.ccleaner.com/ http://blogs.msdn.com/ie/ (that guy is indian) also, go buy yuorself a cheap usb key (providing that your computers ahve a usb port) and put http://portablefirefox.mozdev.org/ that on it, use that to browse. she'll never ever know. had a little horsey named paul revere just me and my horsey and a quart of beer ridin' cross the land kickin up sand sheriff's posse's on my tail 'cause i'm in demand Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> http://www.walmart.com/catalog/product.do?product_id=2197736 here's one from wal-mart. lots of storage under $20 Quote Link to comment Share on other sites More sharing options...
iloveboxcars Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> um? showed up on my computer and the dudes computer i live with. showed up on his computer first..only happens with google and picturetrail.com Quote Link to comment Share on other sites More sharing options...
iloveboxcars Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> i have torrents and soulseek running at the same time. maybe? Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> http://securityresponse.symantec.com/avcenter/FixBlast.exe give your homie that link, too. run it. we take care of ya, amigo. don't forget to tip the waitress on the way out, and try the beefsteak. Quote Link to comment Share on other sites More sharing options...
shai Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> Casek, check your email...It will be from the the 12 oz. email relay system. Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 1, 2006 Share Posted July 1, 2006 Re: «<< 12Oz Computer Tech Support >>> you got mail too dude. Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted July 2, 2006 Share Posted July 2, 2006 Re: «<< 12Oz Computer Tech Support >>> my graphics driver disappeared, i keep installing my graphics driver but it doesn't load when i restart. i reinstalled the video hardware using the task manager Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted July 2, 2006 Share Posted July 2, 2006 Re: «<< 12Oz Computer Tech Support >>> which is probably what is causing the software for my new ati tv tuner card to say it requires color quality to be 32 bits per pixel Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 2, 2006 Share Posted July 2, 2006 Re: «<< 12Oz Computer Tech Support >>> uninstall, reinstall. that tuner is a bitch sometimes. you need .net new version. you'll find it on ati.com along with the newest drivers. Quote Link to comment Share on other sites More sharing options...
lord_casek Posted July 2, 2006 Share Posted July 2, 2006 Re: «<< 12Oz Computer Tech Support >>> which tuner card btw? Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted July 2, 2006 Share Posted July 2, 2006 Re: «<< 12Oz Computer Tech Support >>> the problem is my onboard video hardware not the card, which is the ATI tv wonder pro *i'm stuck at 480 by 600 resolution Quote Link to comment Share on other sites More sharing options...
shai Posted July 2, 2006 Share Posted July 2, 2006 Re: «<< 12Oz Computer Tech Support >>> That happened to me once...somehow my X config got FUBAR, which made everything look like 2600 graphics for a day. In the end I had to reinstall the system, but now I know how to fix things in Xorg or Xvesa, so it's not as big of a deal when something goes bad. Frustrating, but not a total loss. Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted July 2, 2006 Share Posted July 2, 2006 Re: «<< 12Oz Computer Tech Support >>> i fixed the resolution problem, my computer recognizes the video hardware, but i'm still getting the error message, but, i can start the program anyway, now i'm trying to make it recognize my playstation Quote Link to comment Share on other sites More sharing options...
alure Posted July 2, 2006 Share Posted July 2, 2006 Re: «<< 12Oz Computer Tech Support >>> casek..i'm mad at you... come on ask me why Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.