Do any of you faggots actually hack? If so, what OS do you use? I've heard Kali is pretty good

Do any of you faggots actually hack? If so, what OS do you use? I've heard Kali is pretty good
>pic related

Other urls found in this thread:

pyramidinternational.com
elementary.io/
steamcommunity.com/id/MeatBloke/
google.de/maps/dir/Hodenhagen/Hannover/Brunswick/@52.5223768,9.7810805,10z/data=!3m1!4b1!4m20!4m19!1m5!1m1!1s0x47b05b0c4d655483:0x4263df27bd65670!2m2!1d9.5957461!2d52.7650992!1m5!1m1!1s0x47b00b514d494f85:0x425ac6d94ac4720!2m2!1d9.7320104!2d52.3758916!1m5!1m1!1s0x47aff5d58a00663b:0x425ac6d94ac3ab0!2m2!1d10.5267696!2d52.2688736!3e0?hl=en
riot.promo/?id=5YaE0cXf
cybrary.it
parrotsec.org/
youtube.com/user/JackkTutorials/videos
pentestprime.com/
securesavvy.com/
hackthissite.org/
catalog.imagine.microsoft.com/en-us/catalog
netacad.com/about-networking-academy/packet-tracer/
youtube.com/watch?v=vAHXK2wut_I
twitter.com/SFWRedditImages

nobody can hack my new website!
pyramidinternational.com

Windows

I am the hacker called Sup Forums

>Kali
Gross, put that shit away!

7, 8, 10?

Yeah

has enywan ever hac in the fpi?or tryed?mast be sach hard.and haw mani prison you can haw?or gan to breins

Noob . Talk to me when you successfully install gentoo.

>Legion is not us
>We are forget
>Never expect us

>he unironically uses kali gnu+linux
Point at him kids, point at him and laugh

kek, kali. kill urself

>is root
>uses kali
>gnome as DE

2/10 made me reply

>kek, kali. kill urself
says the faggot who fancies himself a "true hacker"
not OP, but your retarded elitism drew me into this discussion. Please enlighten us with your superior knowledge on the OS and tools you use then
>inb4 kali is for skiddies: no shit faggot, every tool that does a good job well becomes popular with skiddies, that in and of itself doesn't invalidate it as a good tool

tell me why kali is better than deb sid

I personally use Gentoo.

...

> sure

Nmap scan report for pyramidinternational.com (54.73.226.141)
Host is up (0.026s latency).
rDNS record for 54.73.226.141: ec2-54-73-226-141.eu-west-1.compute.amazonaws.com
Not shown: 967 filtered ports, 26 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
110/tcp open pop3
143/tcp open imap
3128/tcp open squid-http
8080/tcp open http-proxy

>not using elementaryos
elementary.io/

Please continue with your not illegal conversation anons

>tell me why kali is better than deb sid
"better" is a purely subjective opinion that depends on your needs.

if your job is basic pentesting or large-scale bruteforcing, Kali is the quickest way to get there.

if your job is to custom-build an attack vector for a specific client (a movie studio's sql database, for example), your better choice is Debian unstable or even Gentoo. But at this point, you're probably even recompiling the kernel or running a massively parallel system.

more importantly, there is no point in recompiling your kernel and putting together an unstable distribution's tools to hack some feminist's facebook account when simple social engineering can do that.

Son, I´ve been in the business for 7 years, not once have I ever encountered kali in my profession

Redhat and Debian, way more

bf 22

...and?

MacOS

Atleast put some effort into your shitposting.

>watch mr robot
>think it is really cool
>i want to be hacker!!!! XDDDDDDDD
>post on Sup Forums

ITT people shitting on Kali.

You gents realize that it is a simple Debian distro with preloaded tools? So these preloaded tools can be ported to many additional distros?

Duh,

see

This is now a cringe thread

g8 b8 m8

what is your problem?

mac os is one of the best operating systems for social engineering hacking

it's been cringe thread from the start user..

This is now a tard stories thread

I phish and scam. Hacking isn't worth the hassle and virtually impossible apart from a little SQL injections here and there on some pointless websites.

This is now a get thread

check em

This is now a Ctrl +v thread
steamcommunity.com/id/MeatBloke/

>one off

Greyhat databrokerfag reporting in.
I am monitoring this thread for a bit.
Geddit?

google.de/maps/dir/Hodenhagen/Hannover/Brunswick/@52.5223768,9.7810805,10z/data=!3m1!4b1!4m20!4m19!1m5!1m1!1s0x47b05b0c4d655483:0x4263df27bd65670!2m2!1d9.5957461!2d52.7650992!1m5!1m1!1s0x47b00b514d494f85:0x425ac6d94ac4720!2m2!1d9.7320104!2d52.3758916!1m5!1m1!1s0x47aff5d58a00663b:0x425ac6d94ac3ab0!2m2!1d10.5267696!2d52.2688736!3e0?hl=en

There is still a fuck load of people that don't do regular patching, but phishing and scamming is really going after the low hanging fruit.

I'd go as far to say that even a good bug bounty program doesn't pay out as much as selling the exploit.

VI son.

mfw Im 1337 as fuck but still cant triforce.

I'm using a Nintendo DS to hex ppl

And?

>I'd go as far to say that even a good bug bounty program doesn't pay out as much as selling the exploit.
You are correct.

>kali
>OS

So new you don't even know what a distro is.

Emacs man myself.
>the jokes are good

Off by 1

riot.promo/?id=5YaE0cXf
Hillary gets attacked

Wut

>but phishing and scamming is really going after the low hanging fruit.
Yea. It's time and cost effective. I don't need to make myself famous within the community, I just need a little dirty money on the side.

>There is still a fuck load of people that don't do regular patching
True, but it's still a ridiculous hassle.

>I'd go as far to say that even a good bug bounty program doesn't pay out as much as selling the exploit.

Probably.

Who has kik n can hack fb? N phone

It said to ctrl+v and I did. It's a route I'll drive next weekend as part of a double date.

I've been using vim for 8 years.
Because I don't know how to exit.

Oh shit nigga Wisconsin thread now

If any of you can hack someones fb, please reply. I lack the knowledge and I am willing to pay

hello fbi

get his or her email, click send code when putting the email in lost password, look at her screen the code will come up

Jesus boys, you can try a little harder.

retard here
any advice on how to get started ?
any literature and stuff to learn the basics of hacking/programming ?

cybrary.it

Darwin

MZ�

Remove disk and press any key to reboot...


Y
fCf�Z�����f�f[f�No setup signature found...
��f��u�f����f��f� ���f`�f���Ȏ؎�g�|$D!����

g�$gf�T$gf�D$▒f��f1�f��4
�[�f�
f=��WfVfSf��gf�$gf�T$f��f��E

"Rootkits - Subverting the Windows Kernel" is a good read.
lcis.
com.
tw/paper_store/paper_store/2014712162226539T-201412413820296.pdf

Talks a lot about very basic stuff and even gets into some hardware CPU security measures and the likes. It's got some specific examples as well, but I'd recommend it for the concepts talked about alone, if it hadn't that.

What do you guys think about TEMPEST? Should I give it a try? How are companies today equipped against it?

>not using infchan baphomet

Begin by learning some programming. You'll need it. Learn Perl or some shit... or python... or php... these are "easy" languages. Not to the point of being an expert. But understanding how a program works... Just the concepts...

Learn one thing or two about networking... basic stuff... ip, routing, dns, ports, protocols... etc

Learn how viruses and exploit works, learn how a computer works. I'm talking about filesystems, networking, memory, how file are opened or stored... Basic stuff. Here again, no need to be an expert. Just the basic concept.

Once you understand a little more about computer (Or maybe you are already there), learn the principle vector of attack, infection, what rootkits, trojan and others works, how and why they are used. What are buffer overflow, underflow, or other type of software corruption works.

THEN you can try to make your own exploit, viruses, botnet...

Depending on what kind of "hack" you want, you'll have to document yourself on the system you want to hack. If it's a web app, in what language, is it compiled, can we do something with it. How is it architectured. What interpreter it uses, what database engine it uses... etc

There's no "easy start".

There's no "push this button and everything will work like in movies"

Some hack were discovered after SEVERAL YEARS OF RESEARCH.

There's no book that contains everything. Try by learning how the oldest hack were discovered. Why it was working.

Then learn how more recent hack are working, what they do, why they work.

It takes time, experience, and determination. You can exercise yourself on virtual machine or Damn Vulnerable Linux.

There are also specialised website that present classic security flaws to let you train yourself. You can try those...

Pretty much this.
Also don't expect to set a target and reach it. It would be a HUGE success to find any kind of exploit in anything and expecting to find just that exploit you need to do something specific would be ridiculous. It's really about working with what you got most of the time.

Stop typing... Like this...

You look like... A retard...

Yeah I see it now...

what

thanks Sup Forumsros
have my vag as a gift to you
yeah didn't mean a "do x git gud" guide just some starting points towards programming with a focus on hacking
already know the basic theory and stuff behind it just can't make sense of coding and stuff

Legit EC-Council Cert holder here. Yeah kali is the one most people use. It's good at offensive shit (what you're talking about). But not a good OS to just have running on the time. Unless you configure the shit out of it to harden it up. (Not an easy feat). Parrot Sec OS is a offensive (slight defensive) / Anonymous browsing OS. It's well rounded, the only problem is it has a couple hundred less tools than kali and also lacks the support kali has. If you want to know anything more you can ask me until the thread dies.
>Parrot Sec OS
parrotsec.org/

btw muh certs:
IT Infrastructure MTAs:
Windows Server Administration Fundamentals
Networking Fundamentals
Security Fundamentals
Mobility and Device Fundamentals
Cloud Fundamentals

MCSA:
Windows 10
Windows Server 2012

MCSE:
Server Infrastructure

CompTIAs:
CASP
Security+
Linux+
Network+
Cloud+
Network+
Mobility+

EC-Council:
C|EH
C|HFI
L|PT
E|NSA
C|NDA

What language did you learn ?

reading something like this makes me acutally want to learn some stuff. Thanks

Here's a guy on youtube that's pretty good for his knowledge level.
youtube.com/user/JackkTutorials/videos

Here's some other sites to learn some basics
pentestprime.com/
securesavvy.com/
hackthissite.org/

Start with *getting VMWare or a similar program and messing with setting up networks or finding VM|CTF pre-setup stuff to practice. It's what cisco and such use a cons to pen test their new/old shit.

*buying or pirating

If you have a school email ; or make one you can get some free shit here

catalog.imagine.microsoft.com/en-us/catalog

very basic http and java
but like hello world levels of basic
but I understand how things are saved,where, communication etc.
just nothing much in terms of languages

*Cont.
Also look into a program called packet tracer.
It's used to teach how to setup networks. But its good for a lot more.

netacad.com/about-networking-academy/packet-tracer/

Basically if you want to be really good and are serious. Learn everything about protocols, communication, certificate | handshakes, networks, ect. Then get into programming and then security. It is a really good/fun/exciting field but it is ALOT of work.

I'm going to head out if there isn't anything left anyone wants/wants to talk about.

Anyone got a Mongoloid to English translator?

>has enywan ever hac in the fpi?or tryed?mast be sach hard.and haw mani prison you can haw?or gan to breins
Nobody in here knows how to hack or has ever done anything of any significance whatsoever.

He's wrong, though.

A programming language is a tool that let you express what you want the computer to do.

Most exploit are based on programs that have a flaw in their design. Per example, when you enter this value in this textbox, the programm will misbehave, because the programmer didn't think it would cause any problem. And when it missbehave, you can do this, or that, and it will let you change something here that finely will let you execute some code.

For Web Application hacking, another example would be that the programmer would let you upload a file, but didn't think to set the file to be unexecutable. So, by uploading a software, you'll then be able to execute it by taping the URL. That's where you need to know how to cote. Creating a programm that is compatable, and do what you tell it to do.

A good exemple of code injection with explaination : youtube.com/watch?v=vAHXK2wut_I

yeah that's roughly my problem
know what I'd have to do
don't know how to tell it puter
thanks for the vid

Here's some stuff I have
I'll look though and see if there's anything else you'd find helpful

I want the money up front btc only

Lets c how my social engineering skillz work...

...

[email protected]

Email me the info. I'll do it for free.

Dat hash prompt. Come back when you learn the basics kiddo

aint clicking dis nigga :^)

Me

Script kiddie

Ja und? wat nu?

Ok kid. I get paid for what I do. I have 5 years experience and more certifications than you have fingers. Like I give a fuck what someone says on Sup Forums of all places

Disgusting

you obviously do care you lil faggot. you aint got shit and you trying to brag on Sup Forums? really? gtfo script kid

Saved.
Thisll make some pretty good pasta.

Yea, Kali is awesome. Just by using it you are a 1337 hack0rz. I mean their website even says it's an OS for hackers, so it stands to reason that by using it you must be a hacker, because it's an OS designed specifically for the hackers of the world to use in order to hack. Lamers ain't gonna use that shit.

Other than that you should learn Computer Science III. Oh and listen to bad-ass music at all times. I don't care if it's disco/techno/whatever-they're-calling-it-this-week, gangsta rap, metal, or punk, so long as you can build yourself a hardcore image around it. I don't think you're allowed to like more than one of them though, so choose wisely.

im hacking the Gibson as we speak, OP.