Your hacking tutorial

Subscribe to Your hacking tutorial feed
Welcome to the guide to help you along the path from a neophyte to an elite... From here you will learn the resources to expand your knowledge and from there you can access our stronger resources for hands on training and wargames....Your Hacking Tutorial
Updated: 23 min 54 sec ago

Read only file system error?

54 min 49 sec ago

I tried to perform the sethc method using Linux, but whenever I try and copy cmd it just says "Unable to complete action. Read only file system. How can I fix this?

submitted by /u/antoinehmitchell
[link] [comments]
Categories: Information Security

Still connected to WiFi after useing Mac changer????

1 hour 57 min ago

Hello all! I am new here. Recently I was messing with macchanger and I noticed that when I changed my Mac and when ifconfig said it was changed I was still connected to my boingo WiFi even though it Mac filters. Can anyone telll me why this is?

When I went in to the WiFi settings in the identity tab it still had my old Mac and wouldn’t let me change it. Can anyone guide me?

submitted by /u/riptideawaytothe
[link] [comments]
Categories: Information Security

Hacking help?

Fri, 03/16/2018 - 23:12

Does anyone need some help with hacking? Does anyone have some questions about hacking? Does anyone need any help with anything technology related?

submitted by /u/mlbscreator
[link] [comments]
Categories: Information Security

How to extract hash file as text file?

Fri, 03/16/2018 - 17:47

How do I copy/paste a hash file (sorry I don't know the file type) as a text file so I can read it?

submitted by /u/antoinehmitchell
[link] [comments]
Categories: Information Security

help to track an attacker

Fri, 03/16/2018 - 17:44

Hello, I need your help regarding to how to track someone. I built a website based on wordpress (the last version), I bought a template and I implemented it. Everything was going well, until someone hacked my site, my hosting provider realized the attack and alerted to me . Watching the logs, I found out a suspictious IP, but when I tried to track it by using whois, It wasn't able to find the domain or owner. Is there any other technique to know who was my attacker? this is the IP:

submitted by /u/yodanielo
[link] [comments]
Categories: Information Security

proftp_133c_backdoor question

Fri, 03/16/2018 - 16:08

I've been fooling around with a CTF (,216/). Since I'm new at this, I first followed a couple write-ups, but now I'm trying to understand the whole process. So I've a question I hope somebody can answer: you can create a backdoor with metasploit (proftpd_133c_backdoor), but then you get a shell. How can I know the possible commands executable through the shell (are there many different types of shells?) I think this one is arch-cmd but I don't know for certain... I was trying to download a file through the shell to my pc, but obviously I didn't know how.

submitted by /u/fidalm
[link] [comments]
Categories: Information Security


Fri, 03/16/2018 - 14:40

I’m completely new. What can you recommend me?

submitted by /u/Cxddles
[link] [comments]
Categories: Information Security


Fri, 03/16/2018 - 14:36
Categories: Information Security

Can someone explain this in basic terms?

Fri, 03/16/2018 - 14:04

Can someone please explain this to me in the most basic terms, step by step?

submitted by /u/JFD86
[link] [comments]
Categories: Information Security

Bringing down the surveillance state

Fri, 03/16/2018 - 12:27

So recently my parents installed an Arlo security camera system in my home. It basically functions via a private WiFi network between the cameras and a base station.Whenever one of the camera detect motion they send a notification to my stepdads phone on an app he can watch footage on. There’s only a few rooms I can go in my house where I won’t potentially be watched. I don’t really want to do anything malicious, I’d just like some time when my parents are out when I don’t feel like I’m being watched all the time. I’m a teenager and I deserve even a little bit of privacy. I have some experience with C++, C and Python but pretty much nothing else besides that and I have no idea where they keep the “base station”. Does anyone have any ideas of how I could disable the cameras without my parents finding out?

submitted by /u/zamoblin
[link] [comments]
Categories: Information Security

File upload question

Fri, 03/16/2018 - 10:47

Lets say I wanted to upload a malicious file (lets say some kind of shell) to a webserver, but restrictions in place only allow jpeg files to be uploaded, what method would allow me to upload and execute my desired file?

submitted by /u/sephstorm
[link] [comments]
Categories: Information Security

Is there a way to execute a payload on victims machine and keep it running?

Thu, 03/15/2018 - 22:58

My goal is when I generate the payload and send it to the victim machine. Is there a way they can execute it (./evil) that my shell stays open after they close the terminal? or a way to keep my shell if they ^ C after running it?

submitted by /u/DailyDoseOfErik
[link] [comments]
Categories: Information Security

Is there a way to do this? (Windows Password Crack)

Thu, 03/15/2018 - 22:20

So I had the idea to perform the following to retrieve some passwords from a Windows 7 computer.

  1. Boot up Linux
  2. Perform sethc method or something similar (IE. utilman)
  3. Run Mimikatz on cmd
  4. Login to target account
  5. Run LaZagne

But here's the problem, to boot up Linux I need to restart the computer, but Mimikatz needs the target account to be logged in at least once during the session you run it on so if I restart the computer I lose the memory of the password.

A work around I thought of us to do it in two installments. Perform steps 1-2, then wait until the target account is logged into again and perform steps 3-5. But then there'd be a very vulnerable period in between where someone could discover that the sethc method was performed.

Is there another way to do this in one go to eliminate that vulnerable waiting period? I'd so, what is it?

Thanks in advance!

submitted by /u/ohno853
[link] [comments]
Categories: Information Security

Is my schedule reasonable?

Thu, 03/15/2018 - 20:56

I'm a semi-beginner at all this stuff. I have my A+, Sec+, and Net+, so thats a start! I've created a schedule to help me stay on track to whats most critical to learn if I want to git gud

Monday: Social Engineering course (Udemy), Bash Course (Udemy)

Tuesday: HTML Course, OverTheWire Wargames

Wednesday: Metasploit course (Udemy), Python Course (Udemy)

Thursday: Python Course, Bash Course

Friday: Social Engineering Course, nMap course (Udemy)

Saturday: Bash Course, OverTheWire Wargames

Sunday: Social Engineering Course, Python Course

Am I prioritizing correctly? Or should I modify some stuff?

submitted by /u/11AceOfSpades11
[link] [comments]
Categories: Information Security

Disguise URL for Human Engineering

Thu, 03/15/2018 - 15:51

I have made this website which I think is useful for this field. It is a URL 'shortener' which makes any URL look like a newspaper article. I hope it is useful to you, and please leave any recommendations in the comments!

submitted by /u/EthanLeSage123
[link] [comments]
Categories: Information Security

Cracking WiFi signal whithout handshake?

Thu, 03/15/2018 - 13:58


Quick background. My neighboor, who's also my friend, and I, got into a challenge between each other of who could hack the others lab. He's more new than me into security studies, so I think I got a good advantage.

So, here lies my problem. I know he haves a TP-Link Router and I'm 95% sure that he didn't change the default password, which is a combination of 8 numbers. Problem is, and this is the part I'm not totally sure of, is that I think he already knew I would do this and he disguised his devices or something like that, because every time I try to get the handshake using airodump-ng, I can't seem to find any client at all.

I know he didn't change the default password, is there a way I can start a dictionary attack agains't his Wifi without the handshake?

submitted by /u/geupperjr
[link] [comments]
Categories: Information Security

Protect your electronics

Thu, 03/15/2018 - 13:42
Categories: Information Security

Why won't this BIND

Thu, 03/15/2018 - 13:22

I am using a kali linux 2017 box to attack my Ubuntu 17 box. I am using Virtual Box for both of these machines. I am able to attack my kali box with itself no problem(as it should be). See the link below.

But when I attack my ubuntu 17 box form the kali box with the exact same attack I get this issue. See the link below.

This picture is of the firewall being enabled after testing this with it being disabled now after I enabled and set some rules I still get the same problem

I have googled this problem and tried all of the solutions found online with nothing changing after implementing them.

submitted by /u/DailyDoseOfErik
[link] [comments]
Categories: Information Security

RAT for Mac OS?

Thu, 03/15/2018 - 13:16

About a year ago I’ve gotten into hacking, and most of the things I’ve done are only for Windows devices, especially remote administration tools. Does anyone know any remote admin software for Mac OSX?

submitted by /u/Renegade7011
[link] [comments]
Categories: Information Security