/hmg/ Hackerman General

Resources:

VM/CTFs:
overthewire.org/wargames/bandit/
>easy beginner bullshit

vulnhub.com/
>prebroken images to work on.

hackthebox.eu/
>super secret club

Tools:
kali.org/
>meme dragon distro but it just werks

metasploit.com/
>scriptkiddie starting point and swiss army knife

Tutorials/Guides:
abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
>From zero to OSCP-hero rough outline

youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
>IppSec, video guides for retired HTB VMs.

Certs:
eccouncil.org/programs/certified-ethical-hacker-ceh/
>CEH, only looks good on a resume to non-technicals in HR

offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
>OSCP, the big dick swinging exam, 24 hours to own 5 machines and a further 24 hours to write up a report detailing your methods.


ibm.com/developerworks/community/files/form/anonymous/api/library/635ec0e2-2989-4663-82d2-3488f9d16dd8/document/09d6ec5f-ff2f-4901-8d44-05d10e848bc5/media
>web app hackers handbook, Thanks IBM!

magnet:?xt=urn:btih:f91feb6d2ea93f1c3c03b6be52051c2df72da1b7&dn=CERTCOLLECTION+-+BASELINE+-+SANS+%26+Offensive-Security&tr=udp%3A//tracker.coppersurfer.tk%3A6969&tr=udp%3A//tracker.zer0day.to%3A1337&tr=udp%3A//public.popcorn-tracker.org%3A6969&tr=udp%3A//tracker.leechers-paradise.org%3A6969&tr=udp%3A//explodie.org%3A6969
>OSCP videos

danwin1210.me/uploads/F3thinker !- Hacking 2017/1. Advanced Penetration Testing Hacking 2017.pdf
>Advanced Penetration Testing

leaksource.files.wordpress.com/2014/08/hacking-the-art-of-exploitation.pdf
>learn assembly and C

Other urls found in this thread:

youtube.com/watch?v=N4mEzFDjqtA
twitter.com/AnonBabble

What is everyone working on?

Priv Esc on Node on htb.

Cracked Valentine right quick.

I watched the first two episodes of that terrible show
do people really have passwords that are just a word followed by 2 to 4 numbers?
are people really that stupid or is it the show

I made an account on htb about 2 days ago. How long did it take you to get in?

Are those OSCP videos worth watching? They seem quite old, with some mention of fucking BackTrack in the PDF files.

Yeah, they are that stupid. Ive cracked a few passwords owned by friends and family members. The majority had
>*word that means something to them* *birth year/month*
its fucking ridiculous

An hour so when I did it, did you use curl or burpsuite or a browser extension?

Yo, i'm also doing priv esc on htb. Scratching my head at the moment. Get tom yet?

on node*

I only have mark so far, haven't been able to figure out how to go from mark to tom.

I used burpsuite. It took me about the same time, but i had a massive setback for 15 minutes because i forgot i was running a vpn so i wasnt getting the correct HTTP headers for ages so i couldnt make the post request. i feel like a fucking dumbass

Same. Been sifting through the system for 3-4 hrs now. I see the 2 processes running as tom, but can't find any calls to anything writable as mark, nor anything I can run with escalated privs.

Anyone here going to the Department of Energy competition in April?

Why do people use python2 for stuff? It literally sucks

What's the alternative you propose?

There’s a github repo of the top million dumped passwords

Where you think rockyou came from? It’s a good list of normal people passwords

its a scripting language with libraries witch makes it easy.

It’s free. Free information and content. Of course it’s worth it, given the price of admission for you is zero dollars, instead of 800 for the latest ones.

I am glad the last thread died. Too many people leaking in over from cyb. Bad thread that one. I am Mirin hard that whatever op made this thread used my pasta with the links in it. It’s like watching a Pokémon evolve as it gets traded; I modified OG OPs pasta, now someone else’s using mine when I needed a break from this thread for a while.

I’ve been working on my sysadmin skills. Got some textbooks from work on server 03 course material, and I’m gonna build labs using it. So much lighter than 2012, I can actually do the installs on hdds instead of NEEDING ssds. This is something I feel I am lacking in me pentest studies; sysadmin skills.

I want to become a hacker. I have zero knowledge besides shitposting. I know I will need to learn programming, but would this book be a good starting point?

Also, what programming language should I learn first? Mind you I have zero knowledge about the subject. I was thinking assembly first....

No. Learn python and learn that the comptia certs are useless and out dated.

This book is 2 tests out of date current is 901 and 902 and it also teaches no programming it's for repair techs

>learn programming,
but would this book on BASIC HARDWARE REPAIR MEANT FOR SHIT EATING RETARDS be a good starting point?
you tell me.

How about you carefully, in order, follow all the links in the OP, and never come back.

>I was thinking assembly first....
I cant see that becoming immediately practical, assembly could be useful in the future if you want to do low level reverse engineering, but for now learn a higher level abstracted language.
This.
Learning python will help you understand the concepts of programming and how extensible it can be.
Python will also help you write scripts for
>generating passwords for brute force lists catered to the victim
>writing and using priv esc scripts
>writing and using exploits
>automating boring shit when your doing simple recon

I suggest learning python from this video, because its fast and has no bullshit that you dont need to know when you're first starting out
youtube.com/watch?v=N4mEzFDjqtA
and start learning bash and do OverTheWire bandit (link in the OP)

Python 2 or 3?

3, its the most recent version
once you know python3, you pretty much know python2 anyways. the only real differences are print functions and small things like xrange(10) becomes range(0, 10), so its easy to migrate the code if you need to.

Got it. I asked because apparently most of the libraries are Py2

Thats not really true, there are a few libraries lagging behind, but most people are using python3 nowadays.

Ok, I'm trying to ssh into bandit0 and I keep getting the password wrong even though the site says its bandit0. Is there just something wrong with it right now or what? I've done bandit a while ago in the past and had no problems.

Good to hear. Have you read either Black Hat Python or Violent Python? If yes, which one would you start with?

saw this in another thread, make sure you're using the right port (2222, i think)

Are you getting the user right? I.E user@ip

are you on the right port?

Ive read a bit of black hat python, it was a little outdated but there are some good take aways.
I am wanting to start reading violent python, i might start now and report back in a little while.
I suggest getting a good grasp of python first.

[email protected]
is what I'm using
I use -p to indicate the port right?
when I did -p 2220 I got yelled at saying i was vulnerable to a man in the middle attack or something

ssh [email protected]:2220
try that

I did that too with no results

weird, this worked for me with password bandit0
ssh [email protected] -p 2220

Ok I unironically have a question, is San Francisco / silicon valley area, really a hackers playground?

Try a web ssh client.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that a host key has just been changed.
The fingerprint for the ECDSA key sent by the remote host is
SHA256:98UL0ZWr85496EtCRkKlo20X3OPnyPSB5tB5RPbhczc.
Please contact your system administrator.
Add correct host key in /home/rat/.ssh/known_hosts to get rid of this message.
Offending ECDSA key in /home/rat/.ssh/known_hosts:1
remove with:
ssh-keygen -f "/home/rat/.ssh/known_hosts" -R [bandit.labs.overthewire.org]:2220
ECDSA host key for [bandit.labs.overthewire.org]:2220 has changed and you have requested strict checking.
Host key verification failed.
this is what I'm getting.

>"smart" shit and IOT stuff every where
Yup. Lots dumb asses and k0d3 monkeys

phh remove the key with the command it gives.

have you tried running this, like it suggests?
>ssh-keygen -f "/home/rat/.ssh/known_hosts" -R [bandit.labs.overthewire.org]:2220
is your username/home folder called rat?

yeah, I guess the warning kinda scared me a bit

Its just a key thing. may think that its a corrupt key or hijacked.

Well thanks anons for the help, I got in.

Mate I told you last thread youre using the wrong port. I tried your steps and tried port 22, it doesn’t work. Had to be the one specified on the bandit site

That was a different user last thread. but the problem has already been solved.

How strange. This must have been a VERY recent change if two dudes in two threads have the same issue.

All things being said when I did it this time last year, I swear it was port 22..

cool thread, thanks for showing me htb, this is a fun way to get to know radare better

only if you can avoid showing your power level

is this legit?

no, it's old pasta. do a web search for "2B6DAE482AEDE5BAC99B7D47ABDB3", just one key i picked at random. dates back to 2016

user..user.. here's what your going to do. your going to buy a raspberry pi. your going to learn how to get it setup and running. you are then going to try and setup a server on your network at home that you can ssh into.
This is going to be difficult and take some time. now.. assuming you get that far you will then start to ask your self what next? well.. there's a few options here.. my recommendation would be to setup a simple web app. for this you will need mysql,php and apache. you will also need to learn some html. make a simple todo list app or find a website and make a webscraper. dont get stuck in the weeds.. follow the simplest path.. the path of least resistance. when you get stuck for more than 20 minutes.. walk away and come back later. sometimes this means coming back the next day. its important to stick with a problem though and to solve it. figure out what you want to do (big picture) then break the problem down into the simpler steps. then break those problems down into simpler steps until your mind can understand the problem. Also A+ is for retards. I've given you the keys to the castle. go forward and be awesome.

thanks late night. I paid it forward helping a newfag.

I'm the OG OP so this has come full circle. I made it someone added, I re-made when I saw the thread was dead all day.

I have a data server running on alpine os though....

Sup man, any luck on tom or root yet?

You don't need to learn programming to become a hacker. What you need to learn depends on what you aim to do and what kind of hacking you are interested in. You can hack into any server with zero programming knowledge.

negative, I took a break and I'm going to back to looking for another channel since I'm just not getting the vulnerability if there is one in the ***.js files.

>how to be a script kiddie
Social engineering can be incredibly useful, but you still need a basic knowledge of how things work to be any good at all

Same, I've wasted so much time fucking around with mongo trying to get those to run. I cannot for the life of me understand how that works.

You have a funny idea about what "hacking" is.

I've actually seen passwords even worse than that. You'd be suprised by how dumb normalfags are.

>You don't need to learn programming to become a hacker
Ah, yes, copying and pasting from Stack Overflow.

You can have an understanding of how things work without knowing how to write code. It has nothing to do with being a script kiddie and you don't need to be one to get shit done. Has nothing to do with SE either. You can break into practically anything without programming, without metasploit/skid tools and without social engineering.

You're just too stupid to realize this and think outside the box if you disagree. That's why Sup Forums and the majority of "hacker" communities are a joke.

>me understand how compooter work without understanding how compooters actually work. me can breek into anything by klicking on pretty pictures

why do people like you insist on shitting up my thread

yes you will be hacked by Blume and someone will whip out their phone and with one button press everyone has your nudes

you do have to understand networking and general infrastructure, though, and being able to write scripts definitely helps (for your example of popping a server) unless you're talking about physical stuff or something like that. I get what you're saying and generally agree, though. Security is a fucking limitless field.

Yup that's right, you need an understanding of how things work. It's just that doesn't necessarily mean programming, which is what I was trying to say. In my opinion, learning how to use linux is more important for a hacker than learning how to write code. But in the end it all depends on what you're trying to do and I'm just coming off one angle with a single opinion.

For sure. You don't have to write exploits to be a hacker, and not writing exploits doesn't automatically make you a script kiddy. Sup Forums might not agree with or understand that, but it's the truth. hell, there are plenty of ex-repo men/con men/thieves out there that now work in sec that focus on physical stuff and SE that aren't all that technical, but it's all a part of the same world

proud frogposter

Found the skid
0day is the only real security field calling some retard on the phone and (((socially engineering))) them is skid shit

>being this wrong
>not understanding the breadth of security or how enterprise shit works at all
how's the job hunt treating you?

not him but
honestly from my experience "enterprise" software tends to be riddled with vulnerabilities and being able to find and exploit them can at the very least turn some heads and earn you some pretty valuable recognition, especially if you're young and lack working "experience"

I've been at a defense contractor for 2 years, currently making 180k + commission on my bugs
How about you, how much is calling people on the phone bringing in for you

Totally agree, that was part of my point though.

So one small part of sec is a supplemental hobby for you and you think that's the only ""true"" area in the most diverse field in technology, cool.

there are high paying (contracting) jobs in every field but it's not really representative of the industry as a whole.
i'm a somewhat competent reverse engineer and i've written my fair share of 0day exploits but i literally work in a call centre, albeit not actually taking calls.

>Supplemental hobby
I do vr at a contractor champ, they pay me commission on my bugs on top of my salary

Whether you're telling the truth or not, you are grossly undermining security both as an industry and from a conceptual standpoint, and you're misusing/misunderstanding/abusing the term "skid" and applying it to anything that you are not. Super toxic and narrow-minded of you, "champ".

Keep using burned 0 day I wrote 2 years ago after a cve drops and someone writes a metasploit module for it champ

I haven't even mentioned what I do in the field lol, you're either a larping baiter or an intolerable narcissist, either way congrats on potentially discouraging others from working their way up in the field like a true gatekeeper, full of shit or not

>He thinks there is no in-between to finding 0days and social engineering

Tell me the name of your company so I can show you how quickly it can be pwned by someone who won't use any code, programming or skid tools. Also provide your email so we can get an NDA signed where the attacker doesn't get in trouble. If you don't agree to this then get outta this thread.

I'm wokring on a box on htb and I wonder if I have an aes128 private key is really brute force is my only way to crack it? If yes can I use it to somehow decrypt intercepted traffic without knowing the pass phrase ?

You do not have a single chance of cracking that mate. Enumerate the box again, you must have missed something if you are thinking of trying to brute force aes

ah yeah the key always ask me for the password and I knew brute forcing was kinda dumb method, I need to find something else thanks user

I just wrote an email addresses extractor. After two minutes, my output files contains 600'000 email addresses, i'm quite proud of this program.
I don't know if it can be useful, maybe for spammers or for people that crack email addresses, but it was fun to write.

you're stupid.

just saying.

Extracting emails from where?

I want to write one for extracting emails from LinkedIn. Or just the names and surnames of people who work for a specific company, and then build the email addresses from that

From hacked-emails.
You just have to give a file path in argument that contains email addresses.
The program will use hacked-emails api to search all pastes for the email addresses in your file and write it in an output file.

There is also a recursive-mode: when the program finishes the given file, he takes output files.

>Waaaah im a real hacker stop gate keeping me even though I don't have any understanding of computers or operating systems
Retard skid

Any retard can spearphish, it's not impressive

Oi oi, what's this?

A yagi antenna.

Hell yeah! I unpacked it today and I'm already in love.

What are you going to do with it?

Skid tool