My isp is pretty old and i dont think it got it's database secured and honestly i dont think they care, so i need someone to help me in the process
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
2 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
6 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
7 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
7 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
10 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
10 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
10 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
Tutorial: Create Wordlists with Crunch
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Make Your Own Bad USB
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
How To: Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI
-
How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities
-
How To: Set Up a Wi-Fi Spy Camera with an ESP32-CAM
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
Tutorial: DNS Spoofing
-
How To: Set Your Wi-Fi Card's TX Power Higher Than 30 dBm
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Manually Exploit EternalBlue on Windows Server Using MS17-010 Python Exploit
14 Responses
Alright, i did a traceroute to google.com and tried checking each ip one by one, i did a geolocate to know which one is the lasp ip in my country and then i removed the google ip's now i dont really know what i need to do
Maybe you need to do recon.. check it out in the recon section..
And im pretty sire what you wanna dobis illegal
It is, but who cares? and i dont know what kind of recon i should do, i mean this is an isp database, not a regular website or anything
We are NOT malicious on these forums. Ditch.
what seems you wanna do is something illegal...in order for you to run you need to walk first and in order to walk you need to crawl ...study first and thats the only way to discover a great world of how to do things.
then teach me how to crawl .. please i wanna bacome the best hacker in the world.
If you want to learn hacking, start with my article "How to Use Null Byte to Study to Become a professional Hacker".
A doubt came to me with this question. If I find a security flaw in the physical center of my ISP in my town and report this failure it is possible I be rewarded for it? I'm asking why am pretty sure that it is possible physically invade the place to "improve" my bandwidth for example. I would have to provide documented evidence for them, right?
Usually if you report a security bug you are generally treated well. Maybe a free T-shirt or a bit of cash. I have never reported a security issue and been punished for it. All you have to do is explain the bug, give directions to replicate the bug, and give solutions to patch the bug.
White hat hackers do what we do to build better security, and by exposing these weaknesses we can open up minds to build better, faster, and stronger creations.
Yeah. The problem for me is give solutions. I have to learn a lot of stuff before to practice this kind of activity professionally.
Thank you Cameron. :)
Can anyone assist me.
Within our schools there is this software through which the teacher takes over our screen. I read a tutorial here about becoming administrator using cmd and magnifier and kali. I was wondering if there is a quicker way to minimize my chances of getting caught. Are there some particular hacking forums noob friendly i should check out.
-Any Assistance Appreciated
You should post on the forum, but i guess you will have to kill that software you teacher uses from your end
Try to visit Youtube, and it should redirect. Look at this. An IP adress should be on the site that you are redirected to. From home, hack your school computer, and use a privilege escalation exploit or script. Otherwise, just bring in USB with some software and plug it in. Theoreticly, after, you could install metasploit and hack from school by, instead of putting home IP at localhost, (Lhost) put school IP.
what goes around comes around
Share Your Thoughts