Your hacking tutorial

Subscribe to Your hacking tutorial feed
Welcome to the guide to help you along the path from a neophyte to an elite... From here you will learn the resources to expand your knowledge and from there you can access our stronger resources for hands on training and wargames....Your Hacking Tutorial
Updated: 15 min 11 sec ago

How long to be a proficient hacker and what are the primary areas I should work on?

4 hours 13 min ago

How long to be proficient in hacking if I put in 6+ hours per day on average on what I am doing?


submitted by /u/ghostheadx9
[link] [comments]
Categories: Information Security

Discord server / forum about hacking, programming, darknet, and more

4 hours 43 min ago

[Join Now!](

!WARNING! Trolls and toxic people not allowed and not wanted.


`Discord Server` / Forum called `"Invisible Web"`


—> more than 1.9kmembers

—> 44 Channels

—> roles to fit everyone with a self-role system

—> an active community that is constantly growing


The server is about:

—> **Verified Market** (Trusted Legit Sellers with fe. cheap tech, cc, combos...)

—> **Hacking** (whitehat - geyhat - blackhat, software - hardware - social engennering, ctf - htb)

—> **Programming**

—> **Darknet Talk**

—> **Darknet Links**

—> and many more (Cryptocurrency, Politics, the torspider project)


Join now to be a member of the Invisible Web.

submitted by /u/EmotionIce
[link] [comments]
Categories: Information Security

No stations shown in airodump-ng

7 hours 22 min ago

Hey guys Im really confused here as I seem to never receive output when I target my router with airodump-ng even though I have two devices connected to it. Im linking pictures of my commands, bssid is blurred out for obvious reasons.

Also, I'm running the newest version of Kali (4.18.0-kali1-amd64) and for my wireless adapter I am using an Alfa AWUS036NHA which is compatible with aircrack as listed on their website r/ .

submitted by /u/spagzy
[link] [comments]
Categories: Information Security

Question about BeEF Framework

Thu, 09/20/2018 - 11:29


Firstly thanks for taking the time to answer my questions.

When BeEF gets hold of a browser, is it possible to open a website in a new tab (website1), click a link on website1 to open website2, navigate around website2, and then close the tab?

If so, does website1 see the attackers IP address, or the victims IP address?

submitted by /u/just_tech_stuff
[link] [comments]
Categories: Information Security

Need help with exploit/attack options for a demonstration...

Thu, 09/20/2018 - 06:00

I'm in the process of building up a virtual ESXi environment to demo an attack on a network. The initial attack vector is going to be a phishing email with a malicious attachment that provides the attacker with access to the private network via the 1st Machine.

However I then need to attack another machine in order to pivot to a different subnet to reach the end goal.

This 2nd machine can be either Linux or Windows based but needs to mimic a Database server in some sense.

The 3rd machine will be a Windows based machine which is the end target.

Any ideas of a semi-realistic attack vector that I could setup on this 2nd & 3rd Machine would be super helpful.

Thanks in advance.

submitted by /u/MikeHunt99
[link] [comments]
Categories: Information Security

A Journey to Mainnet

Thu, 09/20/2018 - 05:00
Categories: Information Security

Questions on nbtscan and rpcclient

Wed, 09/19/2018 - 22:53

How can you identify a DC from an nbtscan?

What is the difference between rpcclient -U "" and rpcclient -U ""%""?

submitted by /u/throwaway03934
[link] [comments]
Categories: Information Security


Wed, 09/19/2018 - 22:51

Hello, does anyone have a login and password for a premium account? I need to do some market research and $50 is a little steep for me. Thank you.

submitted by /u/DibbleDabbleDoozy
[link] [comments]
Categories: Information Security

Kali bootable usb for macbook air?

Wed, 09/19/2018 - 03:25

I've a bootable Kali linux USB flash drive that I created using my win7 desktop. I have found that I can use it on any pc/laptop running windows. But how can I use it on my macbook air?

submitted by /u/16withScars
[link] [comments]
Categories: Information Security

Where can I learn reverse engineering focused on embedded system architectures like MIPS, HC12, Infineon TriCore...?

Wed, 09/19/2018 - 03:03

Recently, I have seen a question about "Where can I learn reverse engineering?" and almost all answers are about x86 architecture. My question is, which resources are focused on these architectures? Books, websites, CTF websites like microcorruption... All things are welcome.

submitted by /u/sinkmanu
[link] [comments]
Categories: Information Security

Advice on my setup? Is it too ambitious for a beginner?

Tue, 09/18/2018 - 14:24

So I set it up physically (I have one laptop and one desktop) like this:

  • OS: Windows 7 ('victim') PCs, wifi.

  • My Own Private network (pw locked, only ppl who know the id and pw can use)

  • I have admin access to the router settings page where I can view which device is connected through which private ip address (including mobile devices), and change many settings.

  • 'Attacker' pc (windows 10*) where I do the hacking (I set the bar lower because I'm only a beginner, but wanted to be practical so not as low as winXP)

  • Both 'attacker' win10 pc and 'victim' win7 pc are in the same private network.

  • AV is installed on the 'victim' PC.

  • And ofc all PC's are on (online)

  • Programs I have: I have Kali on which I use Metasploit, both of which I just started learning. (I tried to add TheFatRat tool but I can't seem to properly start it..)

I attempted to stealth-install a keylogger remotely, which will send the logs to the 'attacker' pc, and not store in the 'victim' pc. Spent hours visiting many sites and trying every method. Didn't work, couldn't even alert the AV or do anything. just got stuck in a long process :p

Remote control of the victim's pc without their knowledge (through bypassing the AV), with which I can view their screen and click and everything. I found out you have to set the victim pc to allow remote control so I can't do it...right?

Are those 2 things I mentioned above possible with the setup I made? What would you be able to do?

submitted by /u/EchoJunior
[link] [comments]
Categories: Information Security

Trying to obtain wifi password via a RING doorbell

Tue, 09/18/2018 - 10:36

i know it’s a long shot, but does anybody have any experience with these things? i’m doing this for a college project. the scenario is that i’m acting as if i took the doorbell off the front door of the house and used it’s wap mode to access the wifi password. thanks for any help in advance!

submitted by /u/packty
[link] [comments]
Categories: Information Security

Where can I learn reverse engineering?

Tue, 09/18/2018 - 04:32

So I know all the languages required(Python, C, 5 months of ASM). Where should I start? I'm a big fan of reading and I don't really like video tutorials(reading is just faster)

submitted by /u/ifuckedup213
[link] [comments]
Categories: Information Security

Is Zaid Sabih’s courses any good?

Mon, 09/17/2018 - 23:06

I’m wondering if it’s worth it to learn from Zaid’s courses on Udemy.

How good are his web hacking, SEing, and Python courses?

submitted by /u/ghostheadx9
[link] [comments]
Categories: Information Security

When downloading a linux image, (eg ArchLinux) it asks you to verify the image with some public key, why?

Mon, 09/17/2018 - 16:13

I understand that its to make sure you've downloaded the correct image, but why is this not on other normal downloads? Why are iso images prone to attacks? Also how is this done?

submitted by /u/fisnikhaj
[link] [comments]
Categories: Information Security