Hacking your school when you think its imposible

For beginners, flames not allowed...(just by the staff :P)
User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Post by ayu »

MariaLara wrote:What do you do if you have cmd and admin privileges but your desktop is being recorded? How would you get around that?
Terminal service to localhost? ^^ that would give you another desktop, dunno if it would work though =/
"The best place to hide a tree, is in a forest"

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

killer

Post by DNR »

if you have admin priv, kill the process that is recording your desktop.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

well, the question is which method is used for monitoring...a hardware or a software one. a hardware one can't be evaded because it simply records the monitor output (works kinda like reverse KVM), but if it's a software one the process can maybe be killed...the sign of a software one would be if the teacher can take over your system and interact on it from his box.

User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Post by ayu »

Find out what software it is... research it a little, find out how it works (in basic) and then find out how it works in the network your at (in basic as well, wont have to go deep for something like that).

Then simply make a small application (batch file or something easy) that kills the monitoring process, and starts a proxy tool that redirects the client request to another server, like the student sitting right next to you ^^

And to make it a little more stealthy, you could try to place all the files on an USB stick or something, and make an autostart file for it, so that they wont be able to see you doing it.
"The best place to hide a tree, is in a forest"

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

hugs

Post by DNR »

exactly, at one college, they had the startup files secured on a 'blackbox' technology that plugged into the back of the computer. So I looked at the device and got the company name off of it and did research to by-pass it. It was as simple as removing it, only secured by the screws that held it in.

For software, I noticed that the admin would try to be clever and just put the software in a renamed folder, but the sub-folders still bearing the software file name were easy to find.

The weaknesses? Companies like to put their logo or name on their products and software needs files to keep their names and directories to work.

I think we had a little commo problem, but it looks like ya'll made up.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

Post Reply