My favourite is still NordVPN by far. Yes, they have a lot of ads, but that means they have the money to do it. And people wouldn't recommend it if it was bad. Personally, out of all VPN's that I have tested, Nord is best by far.
NordVPN is definitely the best. I used all, but Nord outperformed all of them when it comes to speed and the stability of connections. You won't find a better one.
Actually, start with some programming, then move on to "The Art of Exploitation" it's the best book on "hacking" I've ever used...
Setup 2FA on your accounts ffs
Edit: you may also want to set up an alert with HIBP, I would put money on your computer being fine but your credentials having been compromised from another site.
There are so many free sources of information, why start by paying?
Check out cybrary.it, they offer a good ethical hacking course. https://www.cybrary.it/course/ethical-hacking
Check out ProfessorMesser on YouTube and go through his networking and security+ video playlists.
Pick up a book (dummies guide to hacking? Idk that's up to you) ((I started with networking for dummies))
Have the mindset that your preparing to get a certificate in network+, security+, or a CEH
learn how to install Linux, get used to it, learn the basics. Learn how it works. (For ethical hacking just pick up Kali Linux)
Stay away from the crappy YouTube tutorials that are some guy breathing into the mic and typing in notepad.
Best YouTube channel to start is Hackersploit. Another great way to start is to go to vulnhub, a virtual machine program, and watch walkthroughs as they explain things and do it for yourself it’s actually really fun!
If you are more of a person who writes notes down and likes a class-like structure I would recommend https://www.cybrary.it/
Additionally, you can always come back and message nearly anyone on this board for help. Hope this helped!
Mullvad is the best imo in terms of remaining anonymous. You pay with crypto and you don’t actually create an account only a seed. People hate on Nord because of their breach they had a little while back. I use ip vanish and I never had any big issues and they claim not to keep any logs. I am kind of starting to dislike IpVanish because it’s decently popular and you will find many sites block you or they make you complete a captcha for 20 minutes.
Come on man at least credit the author Justin Seitz and give him a chance to sell his works: Black Hat Python: Python Programming for Hackers and Pentesters https://www.amazon.com/dp/1593275900/ref=cm_sw_r_cp_api_WNwIAbYTWGWZH
Edit: seitz not Switzerland
It's hard to understand what you mean by "doing a good job" honestly. All VPN Services basically work the same, some use different protocol's (OpenVPN, Wireguard, IKEv2, etc.) As far as protecting you on a public Wifi, I wouldn't say one is better than the other. Privacy wise you want a provider that truly does not store logs or any personal identifying info and is not within 5 or 14 eyes. Personally when it comes to privacy I do not trust any of them. I have never used a VPN to access blocked services like Netflix in another country so can't comment there. Anyway, I would recommend Mullvad, and would use it with the official Wireguard Software/App if possible.
IPVanish, while it does have many servers and good speed, is not the greatest for privacy..
It's been noted that most ISPs don't throttle Speedtest/Ookla because they're collaborating with each other to give better theoretical results without real-world measure.
Use fast.com ; it's Netflix's own speed test and uses their services to test the speeds if you were to stream a Netflix video. Chances are this is more accurate.
Doesn't mean that ISPs aren't throttling other services and might just be prioritizing Netflix. Same thing happened to the MOBA League of Legends where they had to pay off ISPs nationally to get better speeds.
This is why Net Neutrality is important and America (knowing the context that you're a third world country) got fucked by the FCC because corruption.
Big corporations are scum.
i write what i think is the meaning of what OPs wrote:
>In my country i have free access to this website 0.freebasics.com [...] Anyway in that website you can go to facebook, Wikipedia, wikihow and other websites...
In OPs country internet probably costs alot.
For those kind of countries Facebook Inc. provided a website (0.freebasics.com) that is made accessibile, without any fees, by the Mobile Operator
(probably Facebook does it by becoming a partner/substaining the Mobile operator)
This website allows you to access websites evryone should be able to view for free (like Wikipedia, Facebook, wikihow).
>one website in particular made by a hacker from my country has a bunch of proxies that allow you to access all other websites without actually leaving the main one like a virtual browser.
One of the websites accessibile, is the one provided by a local hacker.
He made a webpage from where you can access the other non-accessible websites.
Those kind of websites that "allows you to access other websites" is also known as a WebProxy.
WebProxy example: http://jetproxy.com
>psiphon app or something to access [..] internet normally (without a browser) .
Is there a way to access internet normally?
normally: from outside the web browser (Chrome/Safari/Firefox... )
.......
I think OPs wants to use Android/iOS Apps.
They need to make a direct connection to their servers
and can't be used If direct connections to servers (others than 0.freebasics.com) are dropped.
.............
For solving it you need to find an Open Port on 0.freebasics.com, from where you can make unrestricted requests (using any kind of protocol) to any other server on the internet.
This process is called tunneling.
(ICMP tunnel, SSH tunnel, HTTP tunnel)
Try this: https://play.google.com/store/apps/details?id=com.tlsvpn.tlstunnel
Try using a browser that lets you choose your user agent like the Dolphin Browser (Look in advanced settings in the "dolphin"-menu on the bottom) or enable Desktop mode in chrome mobile. This should identify you as a normal desktop user. If that does not work, they probably use some black magic to block phones ;-)
You could also check which useragent the working phone uses, by visiting this page with the working Moto G
If you still have issues, an app like this could help in this case
"Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly."
Did a little searching for Deep Packet Inspection + Raspberry Pi and found this. What you could do once you've built this thing out is set the router's DNS to the raspberry pi's fixed IP such as x.x.x.254 and have all traffic routed out I assume.
In addition, while you're doing all of that you might as well check out Pi-Hole.
Nord has a support article on how to set up your router as a VPN client so your whole home LAN can be routed through the VPN.
I think any VPN service that supports OpenVPN protocols (which is like... all of them) can be configured on routers that support OpenVPN client functionality.
don't know about youtube but use this site to find out what your devices are telling about you, online..via browser ofc..it will give you an idea about what you're asking,
I could be way off base, as I'm a bit of a n00b myself, but afaik there are two schools of thought with regard to VPN:
I want to be able to connect to my home network/fileshares/etc from external networks (in which case, the parent comment is a great suggestion).
I want to run all of my personal/home internet traffic through an encrypted private 3rd party to obscure it because I don't trust my internet service provider not to monitor and/or log my internet activity; or to appear as though I'm in a different geographic location (for any of a variety of reasons). I think this may be the scenario OP was asking about. I've heard good things about NordVPN, but can't say for sure...
Private Internet Access VPN. Costs like $40. OR.... if you want to... you and I can make ALOT of money together. So here is how it works. I set up a website that looks like it has educational value. You get it ok'd by IT. I put in a little subsection in php in the login that allows certain registered users to use the site as a proxy. Normal registered users never see the proxy powers. Only properly registered and verified accounts can use the proxy part.
I send you a email with proxy verification codes. You sell the codes to your friends. Said friends then go to the website, and use it as a proxy. It would be some sort of a college sparknotes thing maybe a content scraper to camoflauge the proxy nature of the website. When IT logs in and makes an account, they get a nice little view of college life blah blah blah. When verified accounts login... they can turn it into a proxy service. You advertise this to various students who feel like yourself, you get a free proxy account, and as the money rolls into you, you buy bit coins and send the bitcoins to me, and I cash the bitcoins out and pay for the webserver and pay myself a paycheck of whats left. We do this for multiple universities and places of work, morphing the domain names and ip addresses and automating website creation and scripting and build an empire rivaling facebook to break the back of all blocking in all places, and become millionaires!
You in?
Oh they’re connected to wifi?
I would set up a rouge wifi access point with same SSID and password as the existing one. If you need the password, you can dump it from the computer you have access to. Then you can send a single deauthentication packet to the MAC address for the target computer until it chooses your network (this is not a denial of service as you are forcing his computer to connect through your lab computer, which is still connected to the network)
From there, you can do network captures and control DNS. Do a network capture of port 80 (unecrypted) and DNS requests. He likely has software that automatically checked for software updates over HTTP (VLC does this, among others) every time he starts it.
Alternatively, you can rewrite a DNS request to cause windows to pop up a native windows login window via captive portal (the pop up you see at starbucks wifi)
Documentation here: https://docs.microsoft.com/en-us/windows-hardware/drivers/mobilebroadband/captive-portals#cch
All in all, wifi makes things a lot easier. If you have an atheros/other wireless usb handy you can do all of this in ~15min or less.
Here’s the model I use: TP-Link 150Mbps High Gain Wireless USB Adapter for PC and Laptops (TL-WN722N) https://www.amazon.com/dp/B002SZEOLG/ref=cm_sw_r_cp_api_i_NC40CbD87F441
It’s $15 and even if you don’t succeed, you’ll never have crappy wifi on campus again. I have 3 in my bag right now.
Private Internet Access is great. I've been using it for a while and so far haven't had any leaks or issues with them and I have heard of them getting in trouble for their lack of logs (which is good). I've also heard vip72 is decent. Their SOCKS5 proxies are good.
This is different for different devices, ROMs, and if I recall kernels.
Rooting was step one, more often than not you'll need busybox as well. Fortunately you've done both already.
After that normally (but not always) terminal would work, but make sure to actually switch user to root (on the command line type su before trying to change your MAC). I use termux, I don't see why different emulators would make a difference, but cannot hurt to try.
As a side note, use a MAC lookup tool to make sure you're switching to a valid MAC, I've noticed some devices won't switch to a random MAC and a lot of commercial APs won't associate with a device that is just randomized. For example B8:27:EB:xx:xx:xx would be a raspberry pi.
If that fails I throw apps at it until I find one that works. I'm not really a fan of this method because all the ones that work will require root, but since they're unpopular they're less regulated / researched, and while unlikely it's not impossible for them to steal your data (or worse). When I've had to resort to this, I've only done it on devices that are NOT associated to any accounts I care about.
No guarantees, but when dealing with finicky devices I've had the most luck with this one.
If I remember correctly, NordVPN has had a few legal cases for which they had to reveal logs but revealed none under the claim that they don't have it. Unless if they really want to get arrested or pay huge fines, I don't think they'd lie to the feds. So I do think it is the case that criminals can use it to do illegal activities. Also, if NordVPN spooks you, try Mullvad. They don't even take your name, they just generate an account number for you and you must save that somewhere, you can use a VPN or Tor to get their services, then just keep using their services without it and that's decent enough to throw any possibly identifying information of you off. But again, they don't even take your name.
A few things:
If you can program effectively in C, python should be a breeze to pick up. So I'm going to assume you're really really new, and hopefully I don't offend.
"I want to learn python for hacking but don't want to..."
Either you want to learn or you don't. It's one or the other.
And lastly, but most importantly one does not just "learn to hack." Saying things like this makes it sound like you are only interested in malicious activities, and are not interested in the academic side of computer information security. In a nutshell, you must be driven by a deep and intense curiosity to learn how everything works.
Think of it like this:
Suppose I'm interested in making my car go faster. I could take it into a shop, pay some guys to do the work for me and get the result I want. On the other hand, I could read everything I can about how a car works. What makes internal combustion engines create power? How can I maximize my my horsepower and torque? How can valve timing effect my acceleration and top speed? How can I redirect this local web traffic with spoofed packets using the Address Resolution Protocol?
It would take a lot of time to learn, but after a while you would know everything about your car, and how to make it do exactly what you want.
Now, assuming you're a grey hat, I recommend picking up this book. It will be your bible for programming in C if that's something you're interested in.
The C Programming Language 2nd Edition by Brian W. Kernighan
I HIGHLY suggest that you stick with C, as it is a very powerful language that lets you directly interact with hardware.
This is a good website to look at. I found that it really puts things into perspective.
http://netsec.ws/?p=536
TLDR; Don't buy books, read the internet instead.
Firstly, I would ignore the others in this thread. Their elitism is a little overbearing. I'm going to assume that by "connecting to the OS appropriate shell" you mean scripting/using system commands. In all honesty being able to write shell scripts quickly is probably your best bet. If you really want to know how things are working, start on C. Try using something like PCAP, you can build packet inspectors pretty handily using it.
Good luck.
No such thing as complete protection, even non-gov hackers can find their way into remarkably protected systems.
If you have the resources, Qubes OS should maximize your security. If your computer cannot handle it, then I would recommend either using Parrot OS home or TAILS (note, TAILS routes everything through tor and is intended to have very little persistence [will delete almost everything between sessions]). Ensure that the firewall is activated. In all cases, using a Linux distro will improve general internet security for various reasons (not all necessarily related to the tech).
If you must use Windows, create another account that does not have administrative rights and use this as much as you can (only use admin acct if necessary). Install an antivirus product (I shill for Malwarebytes). Download Process Explorer, set it up to automatically submit all your active processes hashes to VirusTotal when ran, and check it periodically. Ensure that your firewall is active.
For all operating systems, keep them up to date religiously. Download Firefox, add Ublock Origin extension, enable strict mode under "Enhanced Tracking Protection". It may also be valuable to purchase a NordVPN subscription and enable the cybersec mode.
Theres more you can do, but this is what little I can tell you
https://github.com/wtsxDev/Penetration-Testing/blob/master/README.md#books
The folks here archived all the youtube videos: https://airtable.com/shrfo1SnkHU7WHPbD/tbluePnB9jak7hB2l/viwEbHN7wDsFwvFVo?blocks=hide
Also, second what /u/BigDaddyXXL said.
I made a miniature hacking station using a raspberry pi. About twice the size of a galaxy note 8 and can be used to do online war games!
Here is an older article but it's a place to start: https://lifehacker.com/how-to-build-a-portable-hacking-station-with-a-raspberr-1739297918
Actually you can install aircrack-ng on MAC too. http://www.aircrack-ng.org/doku.php?id=install_aircrack#installing_on_mac_osx
I suggest you install it and run the following command.
sudo aireplay-ng --deauth 9999 -a [X] -c [Y] [Z]
Where:
X = YOUR ROUTER/MODEM MAC ADDRESS
Y = YOUR ROOMMATE'S MAC ADDRESS
Z = YOUR NETWORK INTERFACE (eg. wlan0 for linux )
*remove brackets of course.
As long as the command is running, you'll roommate will not be able to connect to your router.
REF: http://www.aircrack-ng.org/doku.php?id=deauthentication
Wireshark is a good one but you’d have to make sure that your network card supports monitoring and it may be hard to find the particular request you need depending on your familiarity with the program.
Burp suite I think is a better option for this if you’re able to configure a proxy in your network settings.
I'd recommend backing up and going to textbooks and/or papers that others have written. Since you're starting fresh, I'd recommend starting from the 10,000 foot view. What are the steps to a penetration test?
Here are a couple links to help:
https://www.sans.org/reading-room/whitepapers/auditing/conducting-penetration-test-organization-67
https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
Getting really good (and I mean reallllly good) at the first few steps in a penetration test will make the rest a breeze.
Edit: Without knowing your technical prowess, I'd can recommend the Certified Ethical Hacker (CEH) book. While it isn't very technical, it does a good job at setting the mindset, steps, and goals of a pentest.
Good god this thread is terrible. Gmail? Public wifi? drive 100 miles? Is this what this sub is like usually? Wtf.
Here's a recent tutorial I found on it.
Seriously, wtf is up with all these other comments?
ProtonVPN is free though?
free=product is a fake-deep redditor understanding of business. Free often also means that they are attempting to get you hooked. That is how trials, free-tiers, mobile games, and drug dealers monetize things. Entice you and make you desperate for the full experience. Hell, that’s why strip clubs let you watch the dances for $20 or free. The money is in getting you in the door to buy drinks and private dances.
These business models only work if they can convince you to spend lots of money up front or lock you into large subscriptions. Mobile games and VPNs follow these models respectively.
NordVPN is based out of Panama so they do not have to give up information. They haven’t had many breaches and they disclose it to the public when they do. The creator of Haveibeenpwned partnered with them to help improve the product. It has a built-in ad blocker and is one of the few VPNs that work on streaming sites. I don’t get the hate.
I have NordVPN as well. I might switch to another VPN service since Nord VPN is not clear about their logs. Don’t get me wrong, the price and speed is amazing, but for me a key part of a VPN service is it’s logging policy.
If you're thinking about going that route here's some more beta:
Using a window manager (like i3wm or something similar) with a base Arch install will use less than 1gb of ram leaving the rest of your ram free for VMs, web browser or whatever else.
install multiple web browsers (firefox, chrome, tor-browser, opera, w3m, etc.) so you can explore web app security from different avenues
A few command line utilities: tmux (multiple terminal windows), htop (system monitor), iftop (network monitor), nethogs (network monitor), cmus (music player), tlp (power management), acpi (system monitoring), mpv (for videos), feh (for images), mutt (email), weechat (irc chat).
Using tlp and a 9 cell battery with a thinkpad x230 can get you 9+ hrs
Great books: Violent Python, Hacking Web Apps by Mike Schema, NMAP network scanning by Gordon Lyon, RTFM red team field manual, C Primer by Stephen Prata. All of these are dated (tech evolves) but the underlying principles never change.
If you're broke torrent the above titles then use Calibre to read and sort your manuals/books.
Buy a usb wifi adapter. A TP-Link TL-WN722N costs $20 you'll need it for wifi security testing
Torguard vpn costs $8/mo and they don't track/keep logs.
Learn how to use Tor, checkout Freenet and I2P.
The Linux Foundation offers SysAdmin training some of which is free and valuable knowledge
and FWIW:
Don't be afraid of OSCP or CEH take the courses if you can afford it. It's a small price to pay for a lot of knowledge and to see if you enjoy it.
OSCP+CCNA+GOOD ATTITUDE = JOB
Learn from other people's mistakes : Create your own labs to practice on, prison sux. Good luck.
https://www.kali.org/docs/installation/hard-disk-install/ So 20 GB would be fine. If you want more thats up to you, but 250GB is for sure not "too small" for the system.
well if you don't care about legality go over and beat them up that's how I got my phone back a while back but since its an Iphone isn't there this track my phone thing provided by apple itself edit: https://www.apple.com/icloud/find-my-iphone.html
Why not use a wifi site monitor app on your phone and walk around until the signal gets stronger?
I used this to figure out which 5hz channels to avoid.
"The deep web" is just a part of the internet that you need to access through TOR which is an anonymous service. The deep web supposedly has bad people, CP, drugs, hitmen, etc on it but it also has normal websites. The only difference is that the urls are gibberish and ends with .onion and you have to connect through TOR, otherwise it's basically just websites.
Honestly, I wouldn't worry about it. Talking about how he will "Use the deep web against you" just sounds like someone trying to sound smarter than they are.
Brand new to this realm, but I'm trying to change careers out of commercial real estate and into cyber security, so I figured I should brush up on some skills.
I think the best way to describe my abilities when I began would be to say that in my mother's eyes, I am a computer genius -- she, on the other hand, is the most computer-fucking-illiterate human in the world so yea - total n00b.
In the last couple months though, I've managed to learn (and feel moderately comfortable in working with):
Command line prompts
Building (and usually fucking up) a home network
Basic web design (HTML / CSS / Java)
SQL and Database Mgmt
I'm by no means up to the level of probably 90% of subscribers here when it comes to this kinda stuff, but tonight I finally got Linux Mint installed and running on a MBP partition as well as Kali on a desktop PC so I'm feeling like a pretty big deal right now because getting that shit to install properly was fucking frustrating...
Once my VPNs were up and running, I discovered the most interesting and frightening site on the internet (Shodan)... Haven't you ever wanted to remote hack into a refrigerator? Anyway, apologies for all the words, and for probably not contributing much to the thread haha!
Cheers!
TL;DR Not capable of much at all (...yet) | Still learning Linux | Shodan is way interesting and also very very creepy/frightening/concerning.
Kali has made available a great book that is exactly what you seek (and free) https://www.kali.org/download-kali-linux-revealed-book/
You're going to hear "RTFM" alot when you start researching things so it's a good time to start practicing it now. (Read The Fucking Manual). I've spent countless hours looking things up and more often than not if i just read the manual i can figure it out myself. Kali's book will get you started at square one. And remember, most of the tools provided in Kali, if not used with the explicit permission of the target, can land you a felony. I know you said you were interested in Black hat, but i urge you to go white hat. The good guys need help, and you could actually make a living being a white hat, instead of ending up in federal prison for some computer crime.
I just Googled and found some online training for you:
http://academy.ehacking.net/p/cyber-security-training-hacking-course
https://www.cybrary.it/course/ethical-hacking/
And they are free :)
A while ago when I didn't have internet, I just wrote a python script to change my mac address and then signup for a free 1 hour trial for a xfinity wifi AP with a randomly generated email and zip code, then sleep for 55 minutes and change my mac address again and repeat the process. Worked pretty well.
You can do it pretty easily using selenium (browser automation framework), with a bit more effort using chrome/firefox tools you can see what is actually sent to the the service provider when you signup for a free trial and then just use their API (using python requests library), its a bit faster and more resilient to changes in the pages html but more difficult to figure out.
If you go the selinum route, I suggest using css selectors, i found that thoses broke less frequently. For windows you can use tmac for changing your mac. (Select the option to start mac with 0x02). If you run linux then use macchanger, although if you are using network manager, then you will need to use network managers cli to set the cloned mac addreses (macchanger will be overwritten and won't work).
Banners are general information given out by a program running on a networking port that indicates the program name and version. This page should help you where you need to go. http://nmap.org/book/osdetect-usage.html
Two best methods would be ARP spoofing or 802.11 deauth broadcast. You can disconnect any wireless device from the network using aircrack-ng but this requires a Linux installation.
Take a look at GPG: https://www.gnupg.org/
It's meant for encrypted messages, but it can easily be used to encrypt files as well. It's more secure than an option such as 7-Zip's AES encryption due to the fact that it uses public key cryptography. That means the key capable of decrypting the file doesn't need to be exchanged or agreed upon before your friend is able to decrypt it. You simply encrypt a message/file to someone's public key, and their private key is then able to decrypt it.
It's more secure than having to agree upon or tell your friend a password, as that communication could be eavesdropped upon.
I didn't spend long researching this, so take this only as general knowledge. It may or may not be specific to the passwords you are seeing/your environment.
Some default wifi passwords are based on the MAC address associated with the router. This may or may not be true for AT&T, and if so, the probably aren't using the same method if symbols are included. They likely are using some kind of formula though, and MAC addresses make a good enough "unique" seed that is associate with the device.
With this knowledge, you can narrow down the possible values. For example, you can start by using only OID's for popular/known manufacturers. With enough known passwords, you may also be able to narrow down the character set they are using.
The TL;DR is that dictionary attacks likely aren't effective. However, if you collect a large enough sample and are familiar with how the default passwords are generated, you can significantly reduce the keyspace and intelligently brute force the passwords in a way that may not require weeks.
Sure, you can follow the instructions on kik's website to reset your password using the email address you signed up with.
In future you can also use a password manager like keepassxc to ensure that you don't have to remember your passwords.
I had configuration issues using Nord on a router. I asked a couple of questions about the IPSec configuration they support. Nobody was able to answer me, eventually I was provided with some incorrect information which showed a fundamental lack of understanding of the protocol.
I do not believe that NordVPN have anyone on staff that understands the technology at a low level.
$39 on Amazon brand new if you are in the US - even free shipping if you have Prime. I would suggest used - good/like new but they only save you like $5 so might as well buy new.
https://www.amazon.com/Violent-Python-Cookbook-Penetration-Engineers/dp/1597499579/
If you're not paying for it, then you are the product. In other words, any free VPN will gather data about what you're doing and it defeats the purpose of a VPN.
For a good VPN, I use PIA. Some people don't like it because it's based in the USA, but I think it's fine (partially because I don't do anything illegal). It's cheap and they've proven in court that they don't gather incriminating logs. I've also heard NordVPN is pretty popular and it's based in Panama so I recommend looking into that.
What you can always do is to go to and check whether the IP address is different from your original one. If you're using NordVPN's p2p servers and torrenting - you should be good. You can setup the socks proxy (to have a VPN+proxy in your torrent client)
If you are using the torrent client - everything is protected, only your browsing would be protected if you used a VPN browser extension
For the curious ones:
Mullvad means Mole in Swedish (mole as in the animal) and the "mull" would be pronounced like "bull" but with an m and the "vad" would be pronounced like the "mad" in "armada" but with a v!
Mullvad here for me too. Absolutely love it. Speed is fantastic, though my connection is only 25mbps so idk if it’ll hold up under a faster connection but my speeds drop like 5-7%, not even noticeable. I can torrent as much as I want knowing I’m safe, I can use it on my phone, it’s got lots of payment options for privacy (they accept cash in the mail!), and the account is anonymous!
Add all that up with the super affordable price and I just can’t recommend them enough.
I was gonna go with Nord or something like that but the prices were literally more than I can afford to spend at the moment. Then I found a Mullvad and haven’t looked back.
ExpressVPN, a bit pricey, but i connect to every server in under 3 seconds and the overall speed is fantastic. No Logs of course. For Reference i had Tunnelbear(free version) and NordVPN(paid version) and both dont even get close to ExpressVPN in my opinion.
Its against the terms of AWS and Azure to attack any of their resources without having filled out a form for approval before hand.
Which I don't think will fit your needs anyway. And, you don't want to get banned from such big companies even if you can get away with it for awhile.
A better option (though more expensive) would be to get a dedicated server and run VMs on it. A cheaper option would be just to run VMs on your home machine if that's a possibility.
Change your network setting to bridge adapter instead of nat. This will pull the same IP address as your host system gets it from.
Section 6.2 will give you more detail. https://www.virtualbox.org/manual/ch06.html
I used easy2boot to make a bootable USB stick. I have a bunch of ISOs on it, including Memtest86, Kali, fresh Ubuntu, etc. It reads them on startup and lets you choose what to boot in.
I’ve only used Kali, Parrot, and Black Arch. Of those 3 I prefer Kali.
Parrot : https://www.parrotsec.org/docs/
Black Arch Linux (Not the most user friendly, but fun) : https://blackarch.org/guide.html
You just need to POST the correct data.
Look for info about curl
. A Google search you might want to try curl post form
In essence,
curl --data "val1=value1&val2=value2" https://example.com/page.php
There's a curl extension for PHP. At the bottom of this page, you'll find an example, http://curl.haxx.se/libcurl/php/examples/simplepost.html
If the list of names/emails are in a file, just read the file and execute the code above for it.
If it's just for spamming, you can create an email by appending something or increasing a value,
$email_pre = test; $email_post = 1; while(True) { $email = $email_pre . $email_post; //curl code //to post data $email_post++; }
Have fun.
That was one of the first Udemy courses I took, and I liked it well enough to give it 4 stars. I see that some material has been added, so I'll have to go through it and see what I missed, but overall I like Jerry's courses very much. The hacking course that I liked best at Udemy was this one, which I probably bought on sale for $10, give or take a little. Having bought a course, you'll be getting emails regularly with some really good deals.
Right now I'm taking this one from Cybrary, which is free but excellent. I'd advise you to take several of this kind of course, as each instructor has his own style and favorite set of tools. If you learning as much as you can from each, you will gain versatility and a broad perspective of the field.
Best of luck.
That's one way to go about it!
Personally, my parents handed over the computer and network responsibilities to me years ago. I hold the administrative/root passwords and they could care less, so my network activity is not monitored by them.
I do host a Prinunl VPN server on my DigitalOcean VPS for a few buddies and myself. IMHO, having root access to the machine you're tunneling through makes coffee shop and hotel visits less worrisome.
I like to use airodump-ng for this. It is a part of the awesome aircrack-ng suite of pen testing tools. There are binaries available for both Windows and Unix-like operating systems.
TCP/IP in 24 hours is an excellent book. I read it cover to cover and find myself dipping back in from time to time:
I'm afraid I haven't heard of it.. you could always set up a RaspberryPi with PiVPN in the US and use that if you have somewhere you could leave it. PiVPN pretty much has every feature under the sun so that must be in there. However, NordVPN is fine for watching US Netflix from Europe, till Netflix bans the IPs, but NordVPN has new ones in a week at most
You're kinda past the realm of "simple", unfortunately.
The first thing you need to do is determine whether your application is .NET or native.
You can use PEiD to analyze the application.
Hopefully it's .NET and then you can use ILSpy to decompile it to C# or something else readable.
If it's not .NET, you'll have to use something like OllyDbg or preferably Interactive Disassembler to find the part of the code that reads the registry key, then determine what the code does with it in order to figure out what hashing algorithm is used and in what format the data is stored in the registry.
If the application is .NET, this is probably doable for you. If it's not .NET, it's probably out of your reach. You would need a substantial bit of practice before being able to reliably RE a production application.
One option is to spin up a box somewhere and use it as your own proxy or VPN.
To take it a step further, it's not out of the question to have something like this run serverless, so the anonymous function fires from different IPs and zones each time it's called. Such solutions could be identified as coming from a hosting company or cloud service (due to the IP block).
The ideal situation, to appear like a regular user, is finding a VPN node or server that isn't identified as such by one of the major databases.
I use ipinfo.io's API, which has a pretty useful object, privacy
in the response. It shows how user-originating an IP might be considered.
"privacy": { "vpn": false, "proxy": false, "tor": false, "hosting": false }
If you can get a node to appear as false
for all four keys above, it'll be treated like a real user.
> * Note: I haven't used an invisible proxy before, so I don't have good insight into their implementation or efficacy
Bluemaxima has been working on preserving every flashgame in their flashpoint project. They have 532gb worth of flashgames that you can download and play using their launcher. Radioactive Teddy Bear Zombies is in their database.
Here is their master game list.
Try running a scan from this site https://www.nperf.com/en/ it will give some more information. Usually if your being throttled the download will burst than it will slowly be decreased. What is your ISPs quoted Upload/Download speed for your plan ?
On a free plan you can set up a proxy for your browser and catch every request to and from your browser. That’s how I use it at least. Check it out: https://portswigger.net/burp/
You can use it to see all requests to the api with the interceptor feature
Thank you so much for posting this.
https://www.privacytools.io/ Has some great sources. I have been thinking about using cryptostorm.
Basicly it boils down to make sure they have no logs and are not hosted on US soil.
/r/VPN has some great resources too.
Edit: I have started using cryptostorm and love it (yes the text is annoying, but that's just like, my opinion maaannnn). They take privacy seriously, support the culture by hosting hacked materials and torrent site mirrors, and you can type a tor or i2p address into your regular browser and it will route it directly to tor. Also they use a token auth system which is submitted by you hashed ,so it is virtually impossible to tell who is who. Just about everything they use and make is opensource and on their github.
C++. Jump in the deep end.
http://www.programmr.com/practice/
If that gets too hard, https://www.codecademy.com/learn/all.
If you're interested in webdev, you might want to look at cloud9 for easy environment creation, hosting and testing. You can get started pretty quickly with web frameworks like laravel (php) or meteor (javascript).
Just make stuff. Make a website about bacon, or an android game (don't get stuck waiting for an original idea. Why not a classic like checkers?), or a program that opens and closes someone's disk drive at random intervals. Anything you like :). Have fun!
So for my battery pack, it's a mycharge.com product. I just got literally the biggest one they have. I use the Broadcom adapter on the device to connect to the local wifi and a panda USB wifi dongle with an upgraded antenna. If you really want I'll troll through my amazon purchases and try to find it but Panda has good drivers and can monitor. The antenna should be on the "customers who bought this also bought this"
Edit: Panda Wireless PAU06 300Mbps N USB Adapter https://www.amazon.com/dp/B00JDVRCI0/ref=cm_sw_r_cp_api_rjlCzbCSVWP98
Hacking the art of exploitation (Amazon) (No Starch) is good for learning the foundation stuff. Its getting a bit old but the foundations are still the same there are just more defenses for some of the techniques now
Only in the deepest, darkest chasms of the dark web. Or amazon. https://www.amazon.com/Hackers-Black-Book-Important-Informations/dp/3935494025
It might not be what OP is talking about, but it's probably equally awful.
I've been reading a bit about bypassing geoblocking, and i think i've found that something called SSL/TLS makes VPNs more difficult to detect, and so I may have a better shot at success using this. Does NordVPN have this? I'm looking at their website but can't find anything regarding SSL/TLS
So, what VPN, OS in your laptop and phone are you using? Would like to know some specifics. From what i can gather, I presume you are using NordVPN because you mention obfuscated servers. I imagine you are using an iPhone and unfortunately that feature is not available in the iOS version. And I also presume that your school is blocking the 443 port (the most popular VPN port) and IKE ports. I have a question though: have you tried changing the ports from UDP to TCP or vice-versa in your laptop version? Maybe one of them is unblocked and you could download an OpenVPN app from the app store and enter your settings manually. If they are also blocked then I can come up with only two solutions:
Can we please move on to more meaningful activities than DDOS attacks...there are far better things to do.
But in the spirit of the question, I use IPVanish and enjoy it quite a bit. I'd check it out and see if its what you are looking for.
There should be a (Select Python Environment) selection in the bottom left.
https://code.visualstudio.com/assets/docs/python/environments/no-interpreter-selected-statusbar.png
If not open the Command Palette (Ctrl+Shift+P) or Shift+Cmd+P, then start typing the Python: Select Interpreter
You should also consider creating a virtual box vm (https://www.virtualbox.org/) and booting the ISO there. I found that switching back and forth between windows for fun and Linux for learning was a lot of work and that as a result I'd end up putting off learning, and a VM let me have easy access to linux without having to shutdown all the time.
You really don't need server-grade anything for that... f.ex. intel i7s comes with features to accelerate VMs out of the box: short introduction. Running an i7 even on Sandy arch. would be sufficient for a bunch of VMs running newer OS'/distros. Even stuff like VirtualBox can handle multiple sessions on aged low/medium-grade machinery.
You don't need alot of money/hardware to stay safe or be smart... :)
edit: Words...
Try the Pirate Browser on a USB memory stick. Just run it straight from the stick. Really simple to setup. Failing that try the TOR browser bundle on a USB memory stick.
It could be a number of ways and depends on how the website was setup. If the files were saved in incremental files names ABC001.jpg etc. then he could of just setup a simple script to use wget and to increment through the file names.
Or simply used wget to go through the domain and save each image.
Another way is if it had an index page of each class student, he could of used screen scraping to save each profile image that he found.
Most likely it was a version of screen scraping as you can then reliably open each profile page and identify where in the code their profile picture URL will be and save it.
free. virtualbox is a free, open source virtual machine program. kali linux is a free, open source penetration testing distro. install the two and you should be set.
i'm trying to recall my experience with wireshark and kali linux on my win7 laptop with kali as a guest VM. i'm pretty sure i was able to capture packets of other machines, not just my own. i know that my home machine is having the same problems you're describing, i'm only able to see my own traffic and not anyone else's on my network.
tonight i'll test it again with my laptop to be sure..
The short answer is - No, if you don't already have previous experience of breaking into a wireless networks. Figuring it out for the very first time is often very difficult.
It depends a lot on 1. which encryption they are using on their router - which is easy to determine because routers send these during the beacon signals 2. if your wireless card supports 'monitoring' mode.
And of-course you need packet airmon-ng, aircrack-ng and 2 others (I don't exactly remember). This is kind of a basic tutorial for all these - TUTORIAL
Often, you will have to catch 'Handshakes' of one or two devices. What I mean by this is - you need to keep on capturing the packets (using Cane and Able or Wireshark maybe) and then wait till one of the devices in the network connects to the router, you will then be able to crack the encryption.
Keep in mind, there are many variables in successful cracking and you will be really lucky if you get it right in the first try. Figuring out what you are doing wrong can be difficult, it will be even worse if after two days of trying you come to know that everything that you were doing was alright but the device card wasn't capturing handshakes.
Helpful google search terms - "Wireless [Encryption Type] cracking wireshark/cane and able/ airmon " . So, essentially - "Wireless WPA2 cracking using airmon ng"
It's just scanning for ways into your system. If the server is configured correctly and all the software is up to date, then there's not much to worry about.
You might look at installing Fail2Ban, searching for some Fail2Ban scripts for the services you're running. You could also write a script for Fail2Ban that bans an IP address of they get a bunch of 404's in a row.
BSSID filter on wireshark should be in the documentation probably a good idea to know the MAC addy of your network.
​
https://www.wireshark.org/docs/dfref/w/wlan.html( wlan.bssid=macaddyhere)
These videos are for the entry level Networking certification in IT. Pretty much anything you are looking to do, the basic concepts behind it should be explained in one of these videos.
If you want a proxy that anyone can access, as in you host the proxy, set up a WAMP server: http://www.wampserver.com/en/ and then install PHProxy: http://sourceforge.net/projects/poxy/. Note that this requires you to run WAMP separately rather than being in your browser.
Not op and I haven't used Cain, but it can be done pretty easily provided a weak password with aircrack as well. You need a wifi card that supports monitor mode and packet injection. I have this one. but it only supports 2.4GHz.
Basically you run airmon which shows you what clients are connected to an access point, deauth a client a few times, which forces it to reconnect which then allows you to grab the handshake which you can then try to crack with aircrack.
Anti-Virus - None on Linux(main system, different distro's depending on what I'm doing). Defender on Windows, but I don't surf the web on it, boots straight to Steam, internet connectivity is limited to game servers when required.
main: Configure IPTables and exercise caution when surfing the web. If downloading something you don't fully trust, do so on a VM and monitor before executing on your host.
VPN - ProtonVPN, Bitcoin all the way, yearly Plus Sub. Previously used Tunnelbear, was happy as well, but extra feature-set of Proton made me switch.
wow, much in-depth, so analysis.
"ExpressVPN is the best VPN for Windows. It has servers in a whopping 94 countries. The VPN software for Windows provides OpenVPN encryption, which is implemented very strongly so it is highly recommended."
Really? because it says "#1 Trusted Leader in VPN" on their website? what VPN provider nowadays don't have custom app for win, mac, android, etc? howbout prices? how much you have to pay, what do you get with it? what about actual measured speedtests?
I'm almost positive that openvpn is already installed. What you need to do is make a config file that points to your VPN server or download one from your provider; for example I use Private Internet Access.
Then you launch it with:
/etc/openvpn/openvpn --config <path/to/config/file>
Okey, but I tried a VPN (FrootVPN) I still get the throtteling even if the VPN is on. I'm using PPTP protocol, may be its not the right way to do it ? I also have too much ping spikes to play correctely. I have another question, when i test to know what is my ip, 1/2 time i get an orange IP, the other possibility is getting another ISP IP, they firewall uses 2 ips dynamically or something ?
Personally, I haven't yet needed to buy a VPN, but browsing in /r/hacking and /r/howtohack, Private Internet Access is supposedly one of the best and cheapest around.
They have a great windows client! Works great with openvpn on Linux as well. I have even used Private Internet Access with a pfsense router to run all traffic through PIA with great success.
I do NOT recommend doing any major "dirt" with PIA.
If you are going to be doing some real risky business buying a VPS (with crypto currency) and setting up your own VPN is another option. Then connect using a service like TOR or even another VPN. This is just a basic idea and much better ways do exist.
Some things to consider
I understand that this is /r/howtohack so i will assume you aren't going to be doing anything real crazy but its good to know other options.