Your hacking tutorial

Subscribe to Your hacking tutorial feed
Welcome to the guide to help you along the path from a neophyte to an elite... From here you will learn the resources to expand your knowledge and from there you can access our stronger resources for hands on training and wargames....Your Hacking Tutorial
Updated: 25 min 24 sec ago

Is it possible to hack a Raspberry Pi and gain a root shell from remote?

6 hours 18 min ago

Hey guys! I was wondering if there was a possibility to hack into a raspberry pi and gain a root shell.

I‘ve got one in my company in our cafeteria and it is monitoring the status of the dishwasher. The status is being displayed on a monitor. The picture of the current status is delivered as HTML so there‘s a Webserver running which is only reachable for the raspberry itself. I want to replace the status picture with a meme or something else.

I performed a netscan with nmap, a broadcast ping and arp requests in our WLAN to find out the IP address, OS and open ports of the Pi. The open ports are 21 (FTP) and 22 (SSH) and there‘s Raspbian installed. I‘ve tried the standard ssh password for the user pi but it doesn‘t work. The guy who installed it changed it obviously.

I also took a look at metasploit but I didn‘t know how to use it. If anyone can tell me a good tutorial for this I‘d be glad.

I am allowed to perform attacks against the Pi since it‘s not critical for the company‘s infrastructure. Also, I am doing this for educational purposes.

Does anyone have an idea how I can change the status picture or even gain root access?

Are there best practices like a step-by-step guide on how to perform a hack?


TLDR: I‘ve got a raspberry pi in my company that I want to hack to gain root access and change the delivered content of a webserver. It‘s connected wirelessly with FTP and SSH enabled.

submitted by /u/krypt0nyt
[link] [comments]
Categories: Information Security

Hey, quick question! I am an author looking for some malicious looking code!

8 hours 15 min ago

The conceit is that the main character uploads a disc to bring down the communications system of a fictional and oppressive government. A few lines of code are shown in the text, and during Beta-reading, someone has pointed out that the code I am currently using is laughably benign!

Here is what I'm currently using:

// set A[a] = I void identity(mat A, corners a) {int i, j; for (i = a.ra; i < a.rb; i++)

So yeah, can someone provide anything that would look more menacing to a reader that was "in the know"?

Just to reiterate, the code doesn't actually need to DO anything, it just needs to LOOK like it would do something (specifically infiltrating a computer system and bringing it all down)

Can anyone help?

submitted by /u/SBAKS
[link] [comments]
Categories: Information Security

Shellcode portability

9 hours 40 min ago

I wanted to know, since i'm new to the field, if shellcoding allows portability on various os. I think it should, as shellcode is asm and it shouldn't be compiler/os dependent. I wanted, though to hear from you what are the major differences in shellcoding for Windows and *nix systems

submitted by /u/Huntony
[link] [comments]
Categories: Information Security

Theoretically, is a fake UAC prompt possible?

16 hours 4 min ago

Exactly as the title suggests. As a basic User account on Windows 7, could you program a fake UAC prompt that looks just like the real thing and saves the typed password to a .txt? I'm not too educated on creating an actual program (compared to writing scripts in languages such as JS, CSS, or HTML) so please ELI5.

submitted by /u/psychoPiper
[link] [comments]
Categories: Information Security


16 hours 25 min ago

Hi, guys, do you know smth about DolphinAttack? Is it actual now?

submitted by /u/Artgas
[link] [comments]
Categories: Information Security

Hacking noob wanting to pick cracking up!

Wed, 01/17/2018 - 22:49

Hey there, I am fairly new to hacking, and have been dying to explore and learn cracking for a while. I have tried multiple times with Sentry MBA, but to no avail, it doesnt work. Would anyone be willing to give me solid advice, provide links to other accurate sites or anything? Thank you!

submitted by /u/tehtay3
[link] [comments]
Categories: Information Security

Using Reaver with a high range wireless access point

Wed, 01/17/2018 - 17:35

Hey, I'm pretty new to using reaver and kali. I have a high range wireless access point. I was wondering if there was a way to use the 'wash -i wlan0mon' command to search the network via the access point for better range instead of the wireless lan on my laptop so I can try to access my brother's internet from far away. Is there a way to do this? Once I have his pass key, we'd like to try turning the access point into a repeater for his internet, so we have internet access on his boat too.

submitted by /u/FrozenPea123
[link] [comments]
Categories: Information Security

What are good keyloggers?

Wed, 01/17/2018 - 16:23

Does anyone have a download link of a good keylogger that I can send as for example a mail extension?

submitted by /u/drollerfoot7
[link] [comments]
Categories: Information Security

Question about tracing a user/computer

Wed, 01/17/2018 - 13:32


Computer A logged into a website (unauthorized access) and added data to its database (by submitting forms).

Computer A logged out and turned off afterwards.


Can Computer A be traced? How? How not to?

submitted by /u/throwaway12102017
[link] [comments]
Categories: Information Security


Wed, 01/17/2018 - 12:54

ok so my diamonds got stolen in minecraft and i need some help to hack the bully who stole my diamonds i will pay 1,000 in minecraft pointd amdn also robuckes im crying pls

submitted by /u/PetrifyingOnReddit
[link] [comments]
Categories: Information Security

How do I extract the appropriate hash to run through hashcat given this encryption information?

Tue, 01/16/2018 - 18:10

I would use and change it for hashcat but I don't access to the file, just this information.

2013 Word File @ <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <encryption xmlns="" xmlns:p=""><keyData saltSize="16" blockSize="16" keyBits="128" hashSize="20" cipherAlgorithm="AES" cipherChaining="ChainingModeCBC" hashAlgorithm="SHA1" saltValue="Y1CdVSPvTuGYbOEapldrQg=="/><dataIntegrity encryptedHmacKey="3/roeeh9DcyTW33eSYcZFuT92U5L9xJf2hJUt8OWf8k=" encryptedHmacValue="B5Idx8DGCZw05q+Eedpc1hX/YBn+FyDg2IGcZu0Pecw="/><keyEncryptors><keyEncryptor uri=""><p:encryptedKey spinCount="100000" saltSize="16" blockSize="16" keyBits="128" hashSize="20" cipherAlgorithm="AES" cipherChaining="ChainingModeCBC" hashAlgorithm="SHA1" saltValue="TLGqiVEGDYwrToV/fqZypQ==" encryptedVerifierHashInput="LSuop1oxRi4DhLFbJGHUkg==" encryptedVerifierHashValue="BSyDkwydquyLGmRLa45r9w162DCSrOcByohaIcBRPQs=" encryptedKeyValue="ZCL1R0fgt5fTVb0F7aJaog=="/></keyEncryptor></keyEncryptors></encryption>

submitted by /u/Lik3aBOSS
[link] [comments]
Categories: Information Security

"Manage" Win10 Microphone + camera

Tue, 01/16/2018 - 08:35

Hi guys,

can you point me in the right direction on howto make microphone and camera surveillance on a win10 box ?


submitted by /u/joker197cinque
[link] [comments]
Categories: Information Security

The malware analysis tips

Tue, 01/16/2018 - 04:25
Categories: Information Security