Hello, it's been a while. It's been a while since I have posted on here, and I really want to get back and contribute to the community. I have been working on a lot of projects, and I am looking forward to spreading more knowledge and learning more as well. Well, I guess I've ...more
This is more of a hypothetical question: Is there a way at all to hack a computer with metasploit without any interaction with the victim at all? I mean by not sending a payload, anything embedded with a payload, but by just knowing their IP address? I know that ms0867netapi e ...more
I am very interested in building exploits in C++. I understand that I have to implement a sockets library when working with servers . Are there any resources that I can use? I am really looking for make hacking tools, command-line based or GUI based, not really buffer overflows.
I have a few questions. Bear with me :). I have finished learning C++ from the basics (cout, if/else, while loops, etc.) to the a little more "advanced" topics (unary binary resolution operators, function templates, fstream). I feel that I have quite enough knowledge on C++, ...more
I've noticed that there is a section in the Kali lInux menu called hardware, with the usage of arduino, hence the arduino IDE. What is the purpose of it? I understand the fundamentals of arduino as well as arduino shields, so I might think it has something to do with hacking ...more
I want some advice from the experts and more advanced: What should I go about next? If you've read some of my posts I assume you know some of the stuff I understand and some of the stuff I can do. However, here is a compiled list: -I know how to install Kali Linux off a USB, ...more
I asked a classmate if I can hack his computer after he recently built it and he said yes. I configured my Verizon router for 192.168.1.10 to be a DMZ host. If I were to set up a meterpreter payload where my LHOST was 192.168.1.10 and my LPORT to be 4444 and have my victim, w ...more
I am talking hacking related. The forums that sell malware, or teach how hacking works and etc.
Hmm... I recently watched a presentation on DDOS, their layers, and their many players (lulsec, the j3st3r) and it mentioned Slowloris. I have not used slowloris in about a 4 months. I was able to execute the perl script on iOS, but I wanted it for my Kali Linux distro. Howeve ...more
Recently, I decided to test how good our home AV was. I created a msfpayload with a Meterpreter. I then first disabled the AV on one of the computers in the household to see if I could get a meterpreter session spawned. Then I turned on the AV and the .exe file was instantly q ...more