My isp is pretty old and i dont think it got it's database secured and honestly i dont think they care, so i need someone to help me in the process
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
7 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
10 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
10 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Dox Anyone
-
How To: Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
How To: Make Your Own Bad USB
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Use SpiderFoot for OSINT Gathering
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: The Top 80+ Websites Available in the Tor Network
-
Hacking macOS: How to Break into a MacBook Encrypted with FileVault
-
How To: Find OSINT Data on License Plate Numbers with Skiptracer
-
Hack Like a Pro: Abusing DNS for Reconnaissance
-
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics)
-
Hack Like a Pro: How to Find Any Router's Web Interface Using Shodan
-
Hack Like a Pro: Networking Basics for the Aspiring Hacker, Part 1
14 Responses
Alright, i did a traceroute to google.com and tried checking each ip one by one, i did a geolocate to know which one is the lasp ip in my country and then i removed the google ip's now i dont really know what i need to do
Maybe you need to do recon.. check it out in the recon section..
And im pretty sire what you wanna dobis illegal
It is, but who cares? and i dont know what kind of recon i should do, i mean this is an isp database, not a regular website or anything
We are NOT malicious on these forums. Ditch.
what seems you wanna do is something illegal...in order for you to run you need to walk first and in order to walk you need to crawl ...study first and thats the only way to discover a great world of how to do things.
then teach me how to crawl .. please i wanna bacome the best hacker in the world.
If you want to learn hacking, start with my article "How to Use Null Byte to Study to Become a professional Hacker".
A doubt came to me with this question. If I find a security flaw in the physical center of my ISP in my town and report this failure it is possible I be rewarded for it? I'm asking why am pretty sure that it is possible physically invade the place to "improve" my bandwidth for example. I would have to provide documented evidence for them, right?
Usually if you report a security bug you are generally treated well. Maybe a free T-shirt or a bit of cash. I have never reported a security issue and been punished for it. All you have to do is explain the bug, give directions to replicate the bug, and give solutions to patch the bug.
White hat hackers do what we do to build better security, and by exposing these weaknesses we can open up minds to build better, faster, and stronger creations.
Yeah. The problem for me is give solutions. I have to learn a lot of stuff before to practice this kind of activity professionally.
Thank you Cameron. :)
Can anyone assist me.
Within our schools there is this software through which the teacher takes over our screen. I read a tutorial here about becoming administrator using cmd and magnifier and kali. I was wondering if there is a quicker way to minimize my chances of getting caught. Are there some particular hacking forums noob friendly i should check out.
-Any Assistance Appreciated
You should post on the forum, but i guess you will have to kill that software you teacher uses from your end
Try to visit Youtube, and it should redirect. Look at this. An IP adress should be on the site that you are redirected to. From home, hack your school computer, and use a privilege escalation exploit or script. Otherwise, just bring in USB with some software and plug it in. Theoreticly, after, you could install metasploit and hack from school by, instead of putting home IP at localhost, (Lhost) put school IP.
what goes around comes around
Share Your Thoughts