Your hacking tutorial

Subscribe to Your hacking tutorial feed
Welcome to the guide by Zempirians to help you along the path from a neophyte to an elite... From here you will learn the resources to expand your knowledge and from there you can access our stronger resources for hands on training and wargames.... Free Public Access to Zempirians Training Lab - http://training.zempirians.comYour Hacking Tutorial by Zempirians
Updated: 24 sec ago

How to hack LUKS-encrypted device

3 hours 25 min ago


I've forgotten my password. Or not entirely actually, I think I remember it but it doesn't work so I don't remember it correctly.

Now I'm trying to bruteforce the device. I'm sure my password is mostly correct. How can I use my mostly correct password to help with the bruteforcing? Brutefoce-luks doesn't seem to be able to do that.

submitted by /u/love_is_not
[link] [comments]
Categories: Information Security

Study buddy

Thu, 01/17/2019 - 18:32

Anyone trying to find a buddy to learn it together? I am a beginner in this field and have played online CTF for a year, mainly focus on the Web field but would love to learn others as well. Im hoping to find someone that love CTF as well and is willing to discuss and challenge others. We can use discord or skype, I'm online most of the time

submitted by /u/empty_talks
[link] [comments]
Categories: Information Security

OpenWrt as Wifi Device?

Thu, 01/17/2019 - 14:44

Hello there, sorry for the crap title. I was wondering if I could use my D-Link DIR-835 that has OpenWrt installed with kali linux. Like would I be able to use aircrack or any other tools connecting to this over lan, or some other fashion? It can scan for networks and actually has a dedicated antenna for that (at least what sources say). Thanks alot!

submitted by /u/trendmend
[link] [comments]
Categories: Information Security

Same nmap command shows different results

Thu, 01/17/2019 - 14:28

I'm trying to do a simple host discovery scan in my local network using the command "nmap -sn" and I try to predict the results, just to better understand the tool.

But, for some reason, I'm getting different results every time I run the exact same command (mentioned above), one right after the other.

My local network is composed of 4 desktop computers connected through a Ethernet cable and some phones connected through wifi.

For example, I run the command once, it shows that the 4 wired computers are up (I'm ignoring wifi for now as I know that they can connect and disconnect without me noticing it). Then I run it once more, right after the first time, and it shows only three 3 of the 4 wired computers. I know their local ip addresses, I verify before every scan, and I'm sure that all 4 are connected all the times.

For the wifi devices, I'm sure my phone it's connected to the network and know it's ip address. The same happens: sometimes it shows in the nmap scan, sometimes don't, even when I'm sure it is connected all the times (I don't let it go in standby and I'm pretty close to the wifi router).

I've done some research about this, but didn't find a answer.

So, if someone knows the cause of this, I would like to hear it, please.

submitted by /u/Rvaranda
[link] [comments]
Categories: Information Security

Cain and Abel error

Thu, 01/17/2019 - 12:44

I installed Cain and Abel and filtered it out of all my AVs but whenever I try to use the Wireless Passwords feature to crack my schools wifi it gives me an error saying unable start abel service.

submitted by /u/hiddenViolets01610
[link] [comments]
Categories: Information Security

People in my home keep stealing my USB drives - can you point me to a tutorial on how to make a USB into rubber ducky that does a specific function?

Thu, 01/17/2019 - 12:19

I am forced to live in a very communal environment and have had several USB drives stolen. I would like to make a couple as rubber ducky that install monero miner (or equivalent) on to the PC. Would such a thing be possible? I have set up a virtual lab but am not sure where to learn such a thing.

submitted by /u/PhilSimmsLovesOnions
[link] [comments]
Categories: Information Security

Creating a USB to log in the computer

Thu, 01/17/2019 - 09:31

Don't know if this is the right place to ask. But is it possible to create a USB that enters the password in Windows 10? When the computer is turned off and I turn it on, I just need to insert the USB so it automatically fills in the password then I just press enter.

The reason is that if a colleague is going to borrow the machine, he just needs to borrow USB. Then I don't have to give him the password.

The computer uses Windows 10 PRO

submitted by /u/joemacmillian
[link] [comments]
Categories: Information Security

How to disguise malicious code in a Windows application?

Thu, 01/17/2019 - 04:56

Hello. I need to disguise the malicious code in a small self-made application for windows which I will do based on HiAsm. I would like that when the program is started on the victim's computer, a backdoor is started which could remain in the system after the windows restart. I tried to use the creation of a stager in the Empire in order to gain access to the victim's computer through windows \ launcher_bat and windows \ macro and these attempts were crowned with success. But since the victim may not have MS Word installed, and launcher_bat is rather suspicious, even if it is launched in hidden mode. For this, I came up with a small application that will be available on my site. After the victim downloads this application, it installs, does not understand how to use it, and forgets. But I need a malicious code to run. Can you tell me with what tool I can perform a similar operation? Maybe there are stager in Empire for this atack?

submitted by /u/HotFrog-NO-EAT-DOG
[link] [comments]
Categories: Information Security

How to enumerate in telnet? (Linux)

Wed, 01/16/2019 - 22:49

I'm currently logged into the telnet port of a hackthebox box.

I just cant seem how to figure out how to navigate using telnets commands, I can only cd to directories but cant open any files and cant ls to show files/directories.

Anyone know what commands I use to open txt files and show files/dirs in the current dir?


submitted by /u/OneKidOutHere
[link] [comments]
Categories: Information Security