My isp is pretty old and i dont think it got it's database secured and honestly i dont think they care, so i need someone to help me in the process
- Hot
- Active
-
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
19 hrs ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 51 Replies
19 hrs ago -
Forum Thread: How to Hack CCTV Private Cameras 68 Replies
5 days ago -
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 164 Replies
2 wks ago -
Forum Thread: How to Gain Access to an Android Over WAN 24 Replies
3 wks ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 50 Replies
4 wks ago -
Forum Thread: Discord Channel 3 Replies
1 mo ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 18 Replies
2 mo ago -
Forum Thread: Mitm attack problem 2 Replies
2 mo ago -
Metasploit Error: Handler Failed to Bind 40 Replies
2 mo ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
3 mo ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
3 mo ago -
Forum Thread: How to Hack School Website 8 Replies
3 mo ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
3 mo ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
3 mo ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
3 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
3 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
4 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
5 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
5 mo ago
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Obtain Valuable Data from Images Using Exif Extractors
-
How To: Hack Windows 7 (Become Admin)
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Hack Android Using Kali (Remotely)
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
How To: Exploit Java Remote Method Invocation to Get Root
-
How To: Phish Social Media Sites with SocialFish
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
14 Responses
Alright, i did a traceroute to google.com and tried checking each ip one by one, i did a geolocate to know which one is the lasp ip in my country and then i removed the google ip's now i dont really know what i need to do
Maybe you need to do recon.. check it out in the recon section..
And im pretty sire what you wanna dobis illegal
It is, but who cares? and i dont know what kind of recon i should do, i mean this is an isp database, not a regular website or anything
We are NOT malicious on these forums. Ditch.
what seems you wanna do is something illegal...in order for you to run you need to walk first and in order to walk you need to crawl ...study first and thats the only way to discover a great world of how to do things.
then teach me how to crawl .. please i wanna bacome the best hacker in the world.
If you want to learn hacking, start with my article "How to Use Null Byte to Study to Become a professional Hacker".
A doubt came to me with this question. If I find a security flaw in the physical center of my ISP in my town and report this failure it is possible I be rewarded for it? I'm asking why am pretty sure that it is possible physically invade the place to "improve" my bandwidth for example. I would have to provide documented evidence for them, right?
Usually if you report a security bug you are generally treated well. Maybe a free T-shirt or a bit of cash. I have never reported a security issue and been punished for it. All you have to do is explain the bug, give directions to replicate the bug, and give solutions to patch the bug.
White hat hackers do what we do to build better security, and by exposing these weaknesses we can open up minds to build better, faster, and stronger creations.
Yeah. The problem for me is give solutions. I have to learn a lot of stuff before to practice this kind of activity professionally.
Thank you Cameron. :)
Can anyone assist me.
Within our schools there is this software through which the teacher takes over our screen. I read a tutorial here about becoming administrator using cmd and magnifier and kali. I was wondering if there is a quicker way to minimize my chances of getting caught. Are there some particular hacking forums noob friendly i should check out.
-Any Assistance Appreciated
You should post on the forum, but i guess you will have to kill that software you teacher uses from your end
Try to visit Youtube, and it should redirect. Look at this. An IP adress should be on the site that you are redirected to. From home, hack your school computer, and use a privilege escalation exploit or script. Otherwise, just bring in USB with some software and plug it in. Theoreticly, after, you could install metasploit and hack from school by, instead of putting home IP at localhost, (Lhost) put school IP.
what goes around comes around
Share Your Thoughts