This is a good general and I fully support this. I will live in this general, I will bump this general. Fuck those cyberpunk guys, fuck those privacy guys, this is the thread.
Jayden Cooper
>What in the name of fuck is 0>&1 doing? Well if I don't include it, the nc connection opens, then automatically closes. So it's important, but why?
Ayden Butler
Changing the 0 to any other number causes it to fail. Changing the 1 to 2 cusses it to still work. Any higher than 2 and it fails. What the fuck does that part of the code do?
James Cruz
Been recently messing around with Kali on my home network i like all of the air*-ng tools a lot and nmap is pretty daunting and i hope to learn more about it
IO streams are unix magic, anons. The file descriptors for stdin, stdout, and stderr are 0, 1, and 2, respectively.
Ian Sanders
Hahahaha fuck me. Good, good. Thanks for that dude
Dominic Collins
Also for the record I think most bash packages are compiled without /dev/tcp though it is a cool fucking feature in theory practically no admin should allow this.
Ryan Flores
Sup Sup Forums.Which are in your opinion the very basics somebody should know by heart before trying to do anything practical?Python?Networking?Shell (idk what it is desu)?I don't want to fuck up by doing some really stupid and useless shit with Kali Linux or other popular stuff.
Ethan Wood
>practically no admin should allow this. I don't doubt it's not in the real world. It was just for the wargame, and think it's neat how it's basically a one liner
Carter Clark
in my opinion sign up for open challenges/wargame shit, learn what you need as you go. Better if it's milestoney and not timed stuff, for education. A lot of places release the test system VMs after the challenge is over for you to poke on too.
Practically though you can "luck" or curiousity into incredibly vulnerable stuff without any education.
Wasted 2 weeks trying to solve several levels. Brainlet.
Jayden Gonzalez
I partly agree with this message, privacy is part of security. Aside from that, I am one of the old cyberpunk and cybersecurity OPs and I slowly learnt to detest them, which is why I stopped posting it.
Isaac Morales
Overthewire.org/bandit will give you basic understanding how computers work and where some information can be found.
Henry Long
You are aware there are solutions? And if you use them, and actually learn, it's a good thing?
Brayden Morales
A hacker is someone who enjoys playful cleverness—not necessarily with computers. The programmers in the old MIT free software community of the 60s and 70s referred to themselves as hackers. Around 1980, journalists who discovered the hacker community mistakenly took the term to mean “security breaker.”
Please don't spread this mistake. People who break security are “crackers.”
John Jackson
>In /hmg/ we discuss pentesting, ctfs, exploits Get the fuck out of here you pretentious, cancerous cunt
Carter Sanchez
>is x a botnet >is x a meme >how can I retain every convenience modern life offers me while at the same time getting off the grid Seeing that shit make up all the threads was beyond frustrating. All I wanted was experienced pen testers to talk to, and when the cyb people started on maderas for fuck knows whatever reason, him and the three other people who know something about cyber security all left.
Don't get me wrong, I love the cyb aesthetic. But the bare bones beginners all wanting to jump in, and complaining the pasta was too difficult did my head in.
Alexander Taylor
But what is the challenge if you don't solve a problem by yourself?
Jack Cook
This is exactly why I fled. I wanted the general to be more about cybersecurity and technological applications in a cyberpunk world, rather than nothing but artwork, music and memes. I guess we can all dream. Anyway, that's why I'm glad the /sec/ community demerged again, hopefully we can keep this one alive.
Robert Allen
are you a trap though?
Chase Nelson
i have a netgear n150 usb adaptor that works like a charm and cost me about 29.00.
Asher Roberts
That's not pretentious, it's actually true. You little wannabe "hacker"
Josiah Scott
Please leave your neighbor's WiFi alone.
James Turner
Are you sure? So far I'm on 5, and it's pretty fucking lame desu. I'm basically just navigating around the terminal. Does this get better/more challenging?
Christian Jackson
...
Kayden Thompson
>desu I forget what I said. I've been up for 28 hours. Did I actually type desu this time? Wtf. I'm tripping.
Benjamin Perry
Learning something trumps that.
Robert Price
That does actually sound like a great combination.
Colton Howard
Yeah, I'm on 20 and it's making me have to read manpages and actually stumping me
Austin Morgan
Why do you choose to enter threads you don't like?
Jaxson Edwards
Because they're Sup Forumsictims who don't like it when Sup Forums stops talking about GPUs and overclocking for 5 minutes.
Dominic Evans
...
Daniel Campbell
>it's making me have to read manpages What would you rate your skill level with the terminal before you started? From 1-10.
Reading manpages doesn't seem challenging. Does it ever make you look for log files/destroy them, etc? Fun shit, m8.
Andrew Rodriguez
I love this thread. I'm just saying, he wasn't wrong, and there was no reason to call him a "pretentious, cancerous cunt". When you say "hacker" to older people, i.e. people that actually know their shit, that's what they take the word to mean. Newfags and script kiddies take it to mean something entirely out of scope, i.e. "badass computer guy breaking into NASA" kek
Cameron Mitchell
I have completed through 26; no there is no log manipulation and no persistence at least up to where I stopped
Easton Clark
So, what're we meant to do? Call hackers, crackers? Call original hackers, MIT hackers, or?
David Kelly
wtffff..... help me desu!
John Barnes
>t. underage script kiddie
hacker is a philosophy and a way of living your life. You can be a hacker without using a computer.
In fact, the first hackers were the students of the Tech Model Railroad Club of MIT. A Cracker is someone who uses his vast knowledge in computer to do malicious things, or to test and patch security holes (pentester).
Your 5 worded post is enough to safely assume you have no will to learn and discover things, expanding your knowledge. You just wanna be a lamer and get some facebook nudes. Go back to school and grow up.
Henry Anderson
We are not supposed to do anything different. He knows exactly what we meant when we said hackers, and is being obtuse. The whole world knows what a hacker is, and this is the correct term.
Eli Ross
Turn it off and on.
Colton Williams
Call them what they are: pentesters. "Hacker" sounds so fucking retarded, fake, and gay.
Landon Harris
how new are you desu
Dominic Johnson
Not new at all. I know certain words get swapped, like f a m, but I don't know if I typed desu or f a m , or whatever that time. You lack reading comprehension, I see. You'll never make it as a pentester.
Ayden Harris
OK, I get it , you are very new. desu is t b h. Thank me later. >You lack reading comprehension, I see. I don't. user please. >You'll never make it as a pentester. Please don't project your insecurities onto me. I'm sure you'll make a fine pentester. It's not like being new in Sup Forums is bad in itself. Relax.
Leo Wright
I have a shitty $10 bluetooth/aux speaker. It is some no-brand chinese import sold in some local store.
The chances of removing the bluetooth support seem pretty high to me, as far as I understand I just need to desolder whatever bluetooth module there is. Are the chances of making it into a pure speaker without the annoying SOC in the background? As it charges through USB, there at least has to be some system to control that.
Where do small bluetooth/IoT devices usually store their audio chimes? Anything that often works for disabling that too?
William Price
the whole word is full of wannabe kiddies like you who misinterpret meaning and philosophy of a hacker. This whole thread is a pathetic attempt to get something done without acquiring knowledge and should be burned to the ground. /sec/ gives all the resources you need to improve yourself and do the things you wanna do. It takes time, sacrifice, practice. That's what a hacker does. That's what u'll never be.
Levi Lewis
So does f a m senpai, try it, tard. >I don't. user please. Clearly you do, my post was straightforward as fuck. Obviously I knew what happened, "did I actually type desu this time?" fucking retard. >Please don't project your insecurities onto me. I'm sure you'll make a fine pentester. It's not like being new in Sup Forums is bad in itself. Relax. Nice words, you've diffused my sperg attack. Thanks, user. You too.
Carson Scott
world*
Camden Allen
What I meant is that you typed desu in this sentence and I know you know it. >Clearly you do, my post was straightforward as fuck. I don't. user, please. >Nice words, you've diffused my sperg attack. >Thanks, user. You too. You're welcome.
Hunter Green
>What I meant is that you typed desu in this sentence Clearly we are both smashed as fuck. Good night user.
Jason Flores
Oh. No, I really don't. I type too fast, and like I've said, I've been up too long. My typing hands are too quick for my brain to process what's going on, at least it was then.
Explanation: System 2 was typing, while system 1 was focused on another task.
Henry Rivera
one last thing fampai : f a m is senpai.
Dylan Morales
Yeah, just realized that senpai. Hard to keep up with them. topkek, good night bro
Jose Miller
The whole world also knows that the Mac is something you can install on a PC, that Linus sucks at developing filepickers and that piracy is theft.
Nathaniel Hernandez
bump motherfuckers. what do?
Josiah Morgan
> piracy Copyright infringement*
Robert Morales
turn it off and on
Jordan Gomez
didn't work. any other idea?
Eli Sanchez
I mean your computer
Juan Powell
yeah, didnt work. any idea?
Jayden Butler
youtube.com/watch?v=vg9cNFPQFqM&t=3217s ive been watching this tutorial and i'm about 13 hours in. it's pretty good, i've learned a lot. instead of running Kali in a vm though, i just made a live usb instead and have been running it off of my thinkpad. some of the tools are pretty intricate, like Wireshark and Nmap. Once I finish the video though, I think i'm just gonna try to learn the ins and outs of Nmap and Wireshark
Jonathan Evans
there's probly 2 components in this device, the soc and the actual speaker. you can just plug into speaker wires and pretend the rest doesn't exist if you want?
Isaiah Smith
Edit the file ~/.ssh/known_hosts, and remove the enty with something like: 'bandit.labs.overthewire.org'. After that, connect to the server again and it will prompt you to "trust" that host again, just like the first time you connected to bandit.labs.overthewire.org
John Hill
I'm afraid you reached the limits of my wisdom
Blake Morales
is it me or are there multiple unique lines in level 8
Lucas Barnes
Is this what /cyber/ turned into?
Josiah Richardson
/cyber/ is /sec/
Chase Peterson
That's what i thought too. uniq -u data.txt is supposed to return lines that only appear once, but i got multiple lines returned as well.
Cooper Rogers
what about charging? Or does that usually go straight to the battery without needing much control?
Camden Clark
did some smartass change the file
Andrew Taylor
Ah. don't see a general up right now.
Noah Edwards
Alternatively, you can copy the command, "ssh-keygen -f "/home... thewire.org]:2220", from the error output and try that. Also, did you actually read the error or did you just take a screenshot as soon as you got the error?