My isp is pretty old and i dont think it got it's database secured and honestly i dont think they care, so i need someone to help me in the process
- Hot
- Active
-
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
1 wk ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 2 Replies
1 wk ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 wks ago -
Forum Thread: How to Track Who Is Sms Bombing Me . 3 Replies
2 wks ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
1 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
2 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
3 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
4 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
5 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
5 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
7 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
7 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
7 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
8 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
8 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
8 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
8 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
8 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
9 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
9 mo ago
-
How To: Dox Anyone
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
Tutorial: Create Wordlists with Crunch
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Discover Open Ports Using Metasploit's Built-in Port Scanner
-
How To: Change Your Terminal Header
-
How To: Defeating HSTS and Bypassing HTTPS with DNS Server Changes and MITMf
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher
-
How To: Make Your Own Bad USB
-
How To: Exploit Shellshock on a Web Server Using Metasploit
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Brute-Force Nearly Any Website Login with Hatch
14 Responses
Alright, i did a traceroute to google.com and tried checking each ip one by one, i did a geolocate to know which one is the lasp ip in my country and then i removed the google ip's now i dont really know what i need to do
Maybe you need to do recon.. check it out in the recon section..
And im pretty sire what you wanna dobis illegal
It is, but who cares? and i dont know what kind of recon i should do, i mean this is an isp database, not a regular website or anything
We are NOT malicious on these forums. Ditch.
what seems you wanna do is something illegal...in order for you to run you need to walk first and in order to walk you need to crawl ...study first and thats the only way to discover a great world of how to do things.
then teach me how to crawl .. please i wanna bacome the best hacker in the world.
If you want to learn hacking, start with my article "How to Use Null Byte to Study to Become a professional Hacker".
A doubt came to me with this question. If I find a security flaw in the physical center of my ISP in my town and report this failure it is possible I be rewarded for it? I'm asking why am pretty sure that it is possible physically invade the place to "improve" my bandwidth for example. I would have to provide documented evidence for them, right?
Usually if you report a security bug you are generally treated well. Maybe a free T-shirt or a bit of cash. I have never reported a security issue and been punished for it. All you have to do is explain the bug, give directions to replicate the bug, and give solutions to patch the bug.
White hat hackers do what we do to build better security, and by exposing these weaknesses we can open up minds to build better, faster, and stronger creations.
Yeah. The problem for me is give solutions. I have to learn a lot of stuff before to practice this kind of activity professionally.
Thank you Cameron. :)
Can anyone assist me.
Within our schools there is this software through which the teacher takes over our screen. I read a tutorial here about becoming administrator using cmd and magnifier and kali. I was wondering if there is a quicker way to minimize my chances of getting caught. Are there some particular hacking forums noob friendly i should check out.
-Any Assistance Appreciated
You should post on the forum, but i guess you will have to kill that software you teacher uses from your end
Try to visit Youtube, and it should redirect. Look at this. An IP adress should be on the site that you are redirected to. From home, hack your school computer, and use a privilege escalation exploit or script. Otherwise, just bring in USB with some software and plug it in. Theoreticly, after, you could install metasploit and hack from school by, instead of putting home IP at localhost, (Lhost) put school IP.
what goes around comes around
Share Your Thoughts