Your hacking tutorial

Subscribe to Your hacking tutorial feed
Welcome to the guide to help you along the path from a neophyte to an elite... From here you will learn the resources to expand your knowledge and from there you can access our stronger resources for hands on training and wargames....Your Hacking Tutorial
Updated: 3 min 10 sec ago

Been a lot of odd goings on...

Tue, 06/19/2018 - 23:55

Anyone in the US noticing unusual connectivity issues across the board? My home state (Oklahoma) is having all sorts of problems involving Verizon. Anyone got any info?

submitted by /u/Paretio
[link] [comments]
Categories: Information Security

An odd confession...

Tue, 06/19/2018 - 23:53

Anyone else ever notice that while you are learning one part of tech, everything else blows past you? I've been grinding at phreaking lately, come back to routerwork and all my knowledge is almost inapplicable less than a month later.

submitted by /u/Paretio
[link] [comments]
Categories: Information Security

ARM Reversing

Tue, 06/19/2018 - 22:09

I am currently trying to learn reverse engineering for the ARM ISA. Are there any recommended resources and challenges I could use to practice?

submitted by /u/shiranaize
[link] [comments]
Categories: Information Security

How to find critical bugs with basic attacks

Tue, 06/19/2018 - 11:58
Bug hunters have been arguing that we should ignore basic attacks like directory enumeration. So I decided to see if the time would be well spent, and found a critical in just a couple hours. See how it was done

Directory Brute Force Attacks

submitted by /u/korprit
[link] [comments]
Categories: Information Security

The Hacker's dictionary

Tue, 06/19/2018 - 05:05
Categories: Information Security

Help with program

Mon, 06/18/2018 - 21:55

I am trying to create a program using scapy in python. I want it to arp spoof my whole network (so mitm the whole thing) and then sniff all the traffic. When it detects a packet going to a certain website I want to make it redirect the request. I have done the first part but I am stuck on the sniff and redirect

submitted by /u/shockingsheep
[link] [comments]
Categories: Information Security

Kali usb encrypted persistence never wirks properly.

Mon, 06/18/2018 - 18:45

Sometimes it can't find my wifi, sometimes the root password change is ignored (I change it but the new one doesn't work) and I can't log in. Other times it runs painfully slowly. Honestly don't know what to do. Help please?

submitted by /u/Deostructor
[link] [comments]
Categories: Information Security

How can I write my own remote keylogger in C ?

Mon, 06/18/2018 - 17:08

I was looking for an interesting project to pass time with and decided upon writing my own remote keylogger in C. I do not want a full tutorial with the code already written, I am just looking for guidelines/keywords as I have no idea where to start from! I want it remote so I'll probably need to learn some networking in C so that's a start I guess. Do you guys have any tips to get started or resources ?

submitted by /u/AmroMustafa
[link] [comments]
Categories: Information Security

How much longer will it take for Python v3 to finally be adpoted by the infosec and hacking community?

Mon, 06/18/2018 - 08:52

Even in 2018, every major linux distro ships default with v2.7. Every tool, script or educational material is almost unanimously v2.7 focused.

Why is that? Can someone ELI5 why there feels like there's zero interest or need to migrate to v3? Just curious, as I've been learning python recently and most of the learning materials available now are in python 3.

submitted by /u/Crowside
[link] [comments]
Categories: Information Security

automatic driver installation question

Sun, 06/17/2018 - 22:51

Hi All, hope everyone is well. I had a thought, and i assume that someone else has thought of this or it's wrong, so i thought i'd come here for some clarification. I plugged in my USB wifi card the other day and Windows 10 graciously installed the appropriate drivers for me in order for this thing to run. I'm assuming the drivers were in storage on the wifi card and Windows downloaded them and ran them.

This seems a lot like windows trusting what ever is on the wifi card and running it. Is there a way that i can change the drivers to (insert tool here) and have windows automatically install and run my "drivers"?

submitted by /u/haaaayden
[link] [comments]
Categories: Information Security

How to perform a MITM attack without a pineapple?

Sun, 06/17/2018 - 12:14

Hello everyone! I have been working on different attacks lately using some VM's on a self contained network and some old windows 7/10 laptops I have laying around my house.

Lately, I've been trying to learn man-in-the-missle attacks. One of my friends who works on the blue team at my workplace said that a Wi-Fi pineapple is not necessary for MITM attacks. I built a portable hacking station with a raspberry pi and was wondering if I can use this to perform MITM attacks without the pineapple?

Moreover, most internet searches yield a result about using a pineapple. I can't find material explaining the attack without one. Can anyone explain to me how I could go about MITM attacks without purchasing a pineapple or point me to some learning material? Thank you all in advance!

submitted by /u/97DennisRodman
[link] [comments]
Categories: Information Security

Pages