Overkill? That's underkill. I hax into NASA mainframe and install WSL2 in Windows on Parallels in MacOS on Virtual Box in Ubuntu on Hyper-V in Windows Enterprise accessed via a dumb terminal connected via Proxy to NordVPN routed through the Pentagon to my Raspberry Pi with Windows on ARM to access Tor to download WinRAR crack.
It's not as bad as it used to be, now that it doesn't use root as default user anymore. But Kali simply isn't really made for everyday use. It's even mentioned in their docs: https://www.kali.org/docs/introduction/should-i-use-kali-linux/
>As the distribution’s developers, you might expect us to recommend that everyone should be using Kali Linux. The fact of the matter is, however, that Kali is a Linux distribution specifically geared towards professional penetration testers and security specialists, and given its unique nature, it is NOT a recommended distribution if you’re unfamiliar with Linux or are looking for a general-purpose Linux desktop distribution for development, web design, gaming, etc.
I'd instead recommend trying Debian (which is what Kali is based on) or OpenSUSE, which are more beginner friendly and actually made to be used as a daily driver.
> protect my self
My 'sefl' or my 'self'? Which is it? We can't give accurate responses if this isn't clarified further. In the case it's your sefl, here's how: 1. Install an anti-virus 2. Disable all privacy-intruding settings on your operating system and accounts online 3. Use a password manager (e.g.: Keypass) with two-factor authentication 4. Never put personal details on any of your online accounts 5. Make sure your firewall is active and that you don't run any external services from your computer (e.g.: a web server) 6. Use a VPN (e.g.: NordVPN) and if you're worried you can look for one that is most trusted to delete logs and whatnot. 7. Don't do anything illegal (e.g.: port scanning, information leaking, property invasion). Set up virtual labs for testing and then do whatever you're asked for at your job given proper authentication.
Good luck protecting your sefl! Hope this helped a bit. I'm on my phone in a car so I just wrote this up real quick.
Nord is a bad choice for a lot of reasons -
A lot of people have written about these points individually. The cash flow not hard to trace since there are financial statements available for the companies, other things are what I would call reasonable speculation. Bereika could be an awesome dude who just runs separate businesses, although the way cash mixes in between them makes me doubt that. But sure, benefit of the doubt and all. And maybe this is for NordVPN's customer protection. Either way, what I meant to say is that there is that - doubt, and you don't want doubt when you choose a VPN.
Whatever you do. Do not press Ctrl+Alt+Delete while still inside the house. You'll need to get a longer usb cable and physically be outside first. I learned this the hard way, and had to re-do my teenage years all over again. Somehow they were worse the second time around. Anyways, Pick up one of these https://www.amazon.com/Male-Cable-Type-25FT-Black/dp/B013J2KYAG for $10 bucks. Unless you had friends in highschool. I don't know.
I do pretty much that for work every day and you are really overestimating. masscan takes around 30 mins-1 hour.
Since its just a SYN scan, each frame is 64 bytes, and for scanning 5 million servers traffic is around 300 MB.
ISP's tend to notice that because high number of small frames tend to create more stress for infrastructure than small amount of higher size frames
In all seriousness though, this website is a cool and quick tool that allows you to know if your password has been breached at some point of your email's life.
The personal email I created 2 years ago came out clean while the shitty "one size fits all" email I created when I was 11 turned out to have been breached 4 times. I was a stupid kid signing up for stupid stuff.
Here ya go!!
https://i.imgur.com/QG4oZfs.png
Plus, here's a link to the app so you can read all of em... pretty damn funny, if I do say so.
https://play.google.com/store/apps/details?id=com.google.android.ims
I'm selling them for $0.05, once you've paid go to https://www.browserling.com/tools/random-ip to get them. Note: please do not use the tool without paying me or I will hack you
This video is sponsored by NordVPN. Staying safe online is an ever growing difficulty and you could be exploited by hackers. NordVPN allows you to change your IP address, making you harder to track, securing your privacy. Check out the link in the description to get 20% off for the first two months and thank you to NordVPN for sponsoring this video.
my echo thing was this, written probably identical except for the color codes:
@echo off title penis cls :TOP echo Penis color 0a echo Penis color 0b echo Penis color 0c echo Penis color 0d echo Penis color 0e goto TOP
Which when run, would flash the word penis in rainbow text.
That was my hackerman moment in highschool.
That, and telling everyone how to use proxies to bypass the schools web filter. The district IT, on like a county level, was scrambling to stop it. The teachers got notifications and the IT department even started remote desktop'ing people when they'd search for HideMyAss or other proxy sites. Good times, shit talking from the Google search bar. They'd backspace the search and type like "don't do that." And people be like "make me" and they'd try to talk but we'd just hold down backspace. Yeah... remedial English lost internet access for a while...
Ever since Linus stopped sponsoring them, TunnelBear got desperate with their viral marketing. TunnelBear, the Secure VPN Service where you can browse the internet anonymously anywhere. Use offer code GLOBAL and get 10 percent off your entire purchase with a 30 day money back guarantee!
Shut it gimp, I'll DDoS you in 2 secs if you keep this up. Don't tempt me to unleash the full force of my mojo upon you. If you were smarter, which I know you aren't, you would tremble at my words. I have already installed five trojans and two rootkits on your computer. I know all the IPs in your home network. But don't bother trying to trace me, kiddo. I'm using NordVPN. Not even the NSA could find me, if they were brave enough to even try. I have hacked more mainframes, than I have made love to beautiful girls. And I have had a lot of sex, if you must know. I'm actually banging a chick right now. My laptop resting on her back, she's cheering me on as I write this. So know this, you dirty, insane clown: My face is hidden by my trilby (only an idiot would think it's a fedora), my extremly powerful muscles are hidden by my cloak (which also hides my katana sheath (in my country you're not allowed to have a real sword (but i can do a lot of damage with that!))). There is nothing you can do to me, that others haven't already tried. I stand on a mountain of (dew, hah) bodies, and before my time comes, I will add more.
It is not that difficult depending on what type of attack you preform especially with all the modern tools we have(sadly though they get used sometimes maliciously to attack innocent people or buisnesses). Here is a link going on over some attacks to give you an idea on what to research.
https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/
Doesn’t look as sharp but I made one using one of these boards, which you can get a 3 pack of on Amazon for around $15 and probably cheaper elsewhere
It could be this
This is an article everyone should read before trying Kali: Should I Use Kali Linux?
It's a very specialized distribution meant to be run live from a USB for pentesting and advanced network diagnostics. It's not suited for anything else. If someone tells you to install Kali, they're a /r/masterhacker.
NordVPN is absolutely amazing, I used to be an Xbox Ambassador for five years, which I absolutely regret, but I've caught hundreds of cheaters, did support chats, scam reports, so it was pretty good to have Nord when no DNS leaks are coming through when I'm dealing with a bunch of skids like you dealt with.
Go to https://haveibeenpwned.com/Passwords, open developer tools (F12, I'm assuming Chrome, but Firefox should work too), go to "Network" tab, then enter a random password you don't care to type in, and see what request gets made.
Then read about it here.
yeah, the text file is nothing special, just how much money and where to send it to
​
"Bitcoin address 1EMGKnHvKiDuwfL7g9hRL8dMBwZuVE1fHc , send 1200 $"
​
and it looks like the guy made no money from this scan, atleast not yet
There is also an updated UI for Uplink that the company released later as a mod. https://www.moddb.com/mods/uplink-os I used it for a bit, found it better than the OG UI. I liked Hacknet better simply because it had a fucking command line with valid commands.
It’s oriented towards security professionals to use as a secondary/pentest operating system, but people who aren’t very familiar with Linux default to using it as their first distribution becuase they usually will have heard of it from memes and other people as the “hackerman os”. The issue is they frequently get a worse user experience versus if they had used a standard distribution instead, as Kali is not meant to be used as your host OS and as such is more difficult for beginners and contains a somewhat non-standard configuration that can make regular use more difficult.
Here’s an excerpt from the Kali website on ‘Who should use Kali Linux’:
> Is Kali Linux Right For You? As the distribution’s developers, you might expect us to recommend that everyone should be using Kali Linux. The fact of the matter is, however, that Kali is a Linux distribution specifically geared towards professional penetration testers and security specialists, and given its unique nature, it is NOT a recommended distribution if you’re unfamiliar with Linux or are looking for a general-purpose Linux desktop distribution for development, web design, gaming, etc.
i recently learned from the kali blog post here that they worked with kali on some things to keep the show somewhat accurate. they provided them with graphics and even embedded a steganographic message in a wallpaper r/ARGsociety
NTP amplification can be thought of in the context of a malicious teenager calling a restaurant and saying “I’ll have one of everything, please call me back and tell me my whole order.” When the restaurant asks for a callback number, the number given is the targeted victim’s phone number. The target then receives a call from the restaurant with a lot of information that they didn’t request.
https://www.cloudflare.com/learning/ddos/ntp-amplification-ddos-attack/
Or did I misunderstood the question? Because if I didn't, How did you think executables were made? Nobody writes them straight in binary, they write it in a programming language and then compile them into binaries.
Well you would be able to see it if you had your iceweasel browser set up properly to decrypt and retransmit uri tokens using a fresh hash of the old token plus the current utc timestamp plus the salt of the day which is "weeterskeeter" for Jun 5 as dictated by the ofyd organization minus a pepper of the base url mod the current 2018 epoch day which is 156.
That gives the correct url which I will provide free of charge this once here (but if you stay on the image past your 15 second free preview I WILL hack your Minecraft server and convert every block to sand 😤)
The url is here: https://www.deviantart.com/tag/hackerthehedgehog
Termux is nice, I run nodejs on it and do reactjs practice on long rides using spck.io as IDE. Took a while to set up some stuff and I bet a lot of packages wont work cause nodegyp doesn't seem to work on termux, but it's still good enough to do https://www.theodinproject.com/ javascript course.
So the “neofetch” command they’re running just grabs their computers information and displays it:
https://github.com/dylanaraps/neofetch
This person, I assume, is trying to brag that they’re using Kali Linux, a hacking/netsec orientated OS. While I think it’s a good OS, it also attracts the “wanna be” hackers who think just having the OS installed makes them L337.
TL;DR this person is trying to make themselves seem like a hacker just because they have Kali Linux installed (assuming this screenshot isn’t taken outta context).
Get Kali Linux (https://www.kali.org) which is a Linux subversion, called a 'distro' that's made specifically for penetration, password cracking, and exploits; basically, everything people associate with 'hacking.'
I'd also recommend VirtualBox as a hypervizor. My setup at work and home is Win10 as my host OS, VirtualBox as my hypervisor, and crunchbang (very lean Debian distro) as my Virtual Machines. Google all those terms you don't recognize.
Get some experience with any OS you can get your hands on. Then, as other posters have stated, get a job in IT. Then look into reading the entire CCNA Guide, and after that, look into CEH.
Good luck!
EDIT: If you haven't watched the movie Hackers, you should, because this subreddit (that I just stumbled upon) is amazing if you get the references. Hack the planet!!
Actually reading this right now, has more substance. https://www.whatsapp.com/security/WhatsApp-Security-Whitepaper.pdf
Thanks, didn't even realize
he must subscribe to many vpns, too bad he doesn't use NordVPN with military grade encryption to stay safe when surfing the web, use my promo code now to get 3 months free, side effects may include nausea, heartburn and death (98.99% chance)
Oh yeah, I think I remember that. NordVPN is essentially synonymous with "false advertising to people who don't know better" in my mind anyways because of all the shit they claim that just... Doesn't work like that.
Probably not VPN providers who pump tons of money into sponsoring YouTube videos by creators who will swallow their marketing whole without questioning it.
I've seen some terrible, close to propaganda, ads by some YouTubers. Some providers seem to want you to think that if you don't use their VPN then your ISP (who of course is 100% evil, which the VPN provider 110% isn't) will be able to, and will, spy on everything you do. Even if the traffic is encrypted.
With that said, you should get NordVPN so you can protect yourself from your evil ISP who is absolutely spying on you, even if the traffic is encrypted. Don't trust me? Just look at how many YouTubers that are ~~sponsered by~~ recommending them! /s
It all started when I bought my first raspberry pi. Whilst making a project (you wouldn’t know about it, it’s too complex) someone tried to hack me. With the knowledge in my head from a Kevin Mitnick book I read, I bought a burner phone and fled to Guatemala. Once I reached Guatemala, I fled to Cuba. Then I moved to Belize. You have to learn from the mechanics of TOR and have multiple nodes. For 3 years I studied the art of hacking alone. In a hut I built myself. I fished and scavenged for food half the day, reading books and working on my shitty Thinkpad the other half the day (which had the free version of ProtonVPN btw, to prevent hackers). I moved back to the US, and have been the most elite hacker on r/masterhacker since. I know what wireshark is, I bet you don’t. I also use Kali Linux (you probably don’t know what linux is sorry).
I used metasploit to get into the IPv5 protocol in the mainframe’s secondary ports, using that to inject a payload into the bootloaders of the main partition where my hack could steal the binary code from their files
And nobody will know cuz I use NordVPN 😎
Not that guy, but he's not doing anything with NFC despite the NFC logo on his screen, he's swiping the magnetic strip. Idk if you can program NFC that way but I've never seen it done, I've only ever seen it done while rested on an NFC reader/writer/phone. I just see a stack of Smart Cards and a strip reader in this clip, nothing else.
"I never wanted to be anonymous and hide my identity. But the FBI might find my 1TB of CP so I purchased an annual Avast Secureline VPN subscription and downloaded tor browser and I became anonymous.
You obviously see content like this (normally as comments) all the time.
here what you can actually do with it. 2 stipulations I assume (since it's posted 4h ago) the DHCP didn't switch. OP knows what they're doing and they put the correct IP.
.... This is a NordVPN address...
​
​
anyway address.
Calle Lago Zurich 96, Granada, Ciudad de Mexico, CDMX, Mexico
Mexico City
11529
Mexico
I'm aware of that.
So my reasoning on VPNs is that they're worth it IF you get one that you trust MORE THAN you trust your own ISP, government, etc. It's not an absolute fix; it's not decentralized, so it still requires you to trust SOMEBODY - but it changes WHOM you are asked to trust. Instead of trusting your ISP, you trust your VPN - and this can be valuable, although it doesn't necessarily confer complete privacy. It's also valuable in that it likely confers a degree of protection against intelligence-gathering dragnets set up by state or corporate authorities.
My personal choice is ProtonVPN.
Would you say that's a reasonable conclusion?
Prolly a pen testing device like this AURSINC WiFi Deauther Watch V3 ESP8266 Programmable Development Board | Wearable Smartwatch | OLED&Laser | Attack/Control/Test Tool|LOT for DSTIKE NodeMCU https://www.amazon.com/dp/B08YWJPCSL/ref=cm_sw_r_cp_api_glt_i_CAH94YGZCRGF7VM6G12R but just different
> The second thing you must always do is add your own user account. Using purely root is the biggest mistake all new admins make. root is the single most powerful account on your system and if someone compromises it, you might as well wave goodbye to it all.
- cbryars, “Add your own user” subsection of this page
You've likely been compromised in what's known as Collection #1
Though at this point, it could be 2, 3, 4 or 5 that did you in.
Regardless, you should head on over to https://haveibeenpwned.com, because you probably have, identify any sites that have had your information and lost it, and change it on any sites that might share that password, or email. Assume both are in some loose, unencrypted text file that one of us losers have. Spoiler: I do.
Safe bet: change all your passwords, and get a password manager.
The difference meaning VPNs protect you from the entire internet (allegedly) while proxy servers protect you on a app to app basis. Also VPNs (allegedly) are more publicly seen and therefore more secure than the extra niche proxy servers.
VPNs, I2p, ToR etc... first question is who are you protecting/concealing your identity from?
if answer is Big Corps. then Mullvad or any sensible NON-FREE vpn service that does NOT offer a lifetime access package will give you part of what you want, but you also need to really use Tails via that VPN.
If your answer is Five eyes govs... (not police etc..) give up. frankly they don't give to fully Fs about you till you do something stupid like LuLSec and go after something they are mandated to protect.
If your answer is Police et al. or Non Five eye govs... TOR->VPN Provider->TOR/I2P->www as a chain with all the privacytools recommendations, TOR Browser or Tails and your likely golden. but make sure you use snail mail to pay for your VPN via cash and get your VPN creds via TOR to begin with.
Most off your identity comes from stuff most people don't think about. the browser you use is just as important as the connection method.
Not quite. The Kernel is customized specifically for pentesting, and the repos are also security focused, including a very small number of upstream software sources, and all of them are signed by the committer and the Kali team. Also, it contains systemd hooks to disable networking services by default.
Source: Should I Use Kali Linux?
This has been going on a while now.. Here's an article from 2018 and it was kinda old news then...
I *think* it's even in the SET that ships with Kali/Parrot.
You should try to learn every language that you can. C, Python, Javascript, etc. including SQL. Check out /r/HowToHack once you've done that. If you really want, try building your own operating system. You need to know how something works in order to know how to hack it. There is no better way to learn how an operating system works than by building your own. Check this out for some info on that.
Kali Linux has defaulted to root login for quite some time based on a few premises:
In their own words,
> A lot of those tools back then either required root access to run or ran better when ran as root. With this operating system that would be ran from a CD, never be updated, and had a lot of tools that needed root access to run it was a simple decision to have a “everything as root” security model. It made complete sense for the time.
However, as of the start of 2020, it was announced that Kali would be switching to having a non-root user as default.
^(1: obviously not the case, otherwise we wouldn't need this subreddit.)
> While Kali Linux is architected to be highly customizable, don’t expect to be able to add random unrelated packages and repositories that are “out of band” of the regular Kali software sources and have it Just Work. In particular, there is absolutely no support whatsoever for the apt-add-repository command, LaunchPad, or PPAs. Trying to install Steam on your Kali Linux desktop is an experiment that will not end well. Even getting a package as mainstream as NodeJS onto a Kali Linux installation can take a little extra effort and tinkering.
With all these discussions about safety issues of Kali Linux, if you should use it as distro, etc. I thin k the best awnser lies in the official kali documentation: " it is NOT a recommended distribution if you’re unfamiliar with Linux or are looking for a general-purpose Linux desktop distribution for development, web design, gaming, etc."
Source: https://www.kali.org/docs/introduction/should-i-use-kali-linux/
Yupp! I do think the user is definitely a big part.
Inherently: a strong probably... depending on what your definition of security is, based on the standard passwords. https://www.kali.org/docs/introduction/default-credentials/ If compromised, how much good will it do the attacker? Probably just break a few things. High probability, low risk scenario if you change the default login password.
Point taken, it has evolved leap years from where it was with BackTrack and my mindset might still be largely a remnant from the BackTrack days. I'm glad they have taken recent steps to actually enhance security (non-root default). I'd be curious to see what services the newest and unmodified ISO will run on boot.
How to bypass VPN IP Spoofing
Delete the 1080p global array values to inject code into the capacitors, thus concatenating the SQL hashes and modifying the SQL code.
Bridge the firewall to TOR, protecting the firewall of the CSS backup, and reprogram the BIOS, allowing you entry to the NordVPN mainframe.
Someone got a tech support scam from going to a fake GPS update website. The scammer connected to their computer through a remote desktop service called anydesk.
The NordVPN mod told the scam victim that if they had been using Nord this wouldn't have happened. Which is completely bullshit.
The Nord VPN employee is using the victims fear of scams to try and scam them into buying a VPN
debian norrot and orbot for anyone interested
Termux is amazing especially combined with hackers keyboard. It has an amazing package manager like apt. I've used imagemagick on my phone before when I needed to convert images. 10/10 Would recommened
Yeah, but you can counter that with NordVPN, our sponsor for today. With NordVPN, you can teleport anywhere in the world with just a click. You can hack even the strongest of forts. You can even hack Bethesda (wouldn't need a VPN for that but it's on the tutorial). It isn't too much money. All you do is pay very few money to get 3 months free. Oh, and did I mention? 70% of a 3 year plan. Isn't it worth checking out? You can't get this anywhere without my code. Go to and get those offers. Now, you too can hack any server and be the ultimate master hacker.
As a computer science graduate I can say he did everything right.. The other must be using a VPN, NordVPN. Use my link #BUTTSTUFF20%, in the comments and description to claim your - 20% on the first payment.
This post is brought to you by NordVPN. NordVPN allows you to change your IP address and secure your data from hackers. Millions of people get hacked from using a public network. You don't have to be part of it. NordVPN offers you the fastest VPN experience with more than 5200 servers in 59 countries. Get a 77% discount for a 3 year plan by visiting
The issue you're describing was caused by a system put into place by the provider of one of Nord's servers that they were unaware of.
Key points:
Firstly, the attack affected one server. One. NordVPN is comprised of thousands of servers.
Secondly, according to NordVPN: "The breach was made possible by poor configuration on a third-party datacenter’s part that we were never notified of. Evidence suggests that when the datacenter became aware of the intrusion, they deleted the accounts that had caused the vulnerabilities rather than notify us of their mistake. As soon as we learned of the breach, the server and our contract with the provider were terminated and we began an extensive audit of our service." Furthermore, it took the provider even longer to disclose the breach due to them performing an extensive audit on the affected server and their entire network to ensure user security.
Thirdly, no user credentials were obtained and no attempt to sniff user traffic was proven to be attempted.
Fourthly, TLS keys were acquired that were largely useless by the threat actor due to them only being usable in attacks on indivkdual users. These attacks would have to be highly sophisticated and highly specific to one user. They keys posed no harm to user VPN credentials.
Fifth, this was not a targeted attack against NordVPN. Two other providers reported attacks of the same volume.
Sixth, and most importantly, the attacks showed physical evidence that NordVPN does not keep logs on users that pass through its hardware. Though an intrusion on a data security company is not ideal whatsoever, since then, NordVPN has stepped up its security on their lesser servers even further.
Try and keep NordVPN out of that group of VPNs. They have proven their security time and time again, from what I know.
When their servers were compromised due to exposed keys, it was physically proven that logs are not kept on their servers. They also do not provide information regarding their users to police upon request--other than an email address.
I've never used it. NordVPN is one of the most popular and secure VPNs. I've used that one and ghostvpn and liked them both. Most VPNs nowadays are pretty simar and have similar security as it's a competitive business based around security. Look up "bulletproof VPN". I can't give you a company name because I haven't looked that up in a while but those will offer the best security if reputable. They don't keep logs of your traffic or IPs. Keep in mind you get what you pay for with security and always check how reputable a company is before settling on one.
That’s a great option for DDoS protection and stalkers. But if anyone with power wants to track you it’s super easy as your identity is literally connected to that IP Address. The beautiful thing about a public VPN like NordVPN is that you share your IP with hundreds of others. Anonymizing your (already encrypted) internet traffic. They don’t keep logs, so people in power can’t say: “Trakata has been connected with IP at the same time the cyberattack was executed”.
Legit Privacy Focused VPNs I can recommend: Mullvad (very secretive and you don't even need email; also has WireGuard, P2P, and very fast servers), ProtonVPN (run by security company of ProtonMail fame, has a slowish free tier, need specific P2P servers, not particularly fast but not terrible), TorGuard (mostly; very fast and has obfuscation options, privacy practices a little unclear), PIA (kinda; cheap and reliable but simple, might be logging some things though).
Orrrr... don't use a VPN. You might not really need one.
Remember when Obama finally got in there then started bitching about old tech and showing computers that were clearly in a storage room lol? Well, I don't think the White House is meant to have any outrageous computer/networking setups linking to the more important govt networks. I'm sure there's a certain restricted area for emergencies that has full access to whatever the fuck network they have these days... Arpa OX lets call it....
The Dumbass had the NSA make him an Encrypted Blackberry which after securing it was nothing more than a year 2000 Nokia/Motorola feature wise and a base station clunky micro tower (like a ham radio hotspot almost) all connections went through first. But, anyway I can only imagine what he made them install in the White House. Guarantee the majority was removed before he left but not everything. Btw remember when the Clinton's left they removed the W key from every Keyboard? Lmao
But I'm sure it is just some common setup once again, probably using IPVanish to hide tha porn, and cracked versions of Psiphon so the youngins working in there can get on FB, SC, IG, etc. Twitter's obviously not behind some shitty wall lol
Hello I just want to inform you that there is way to hack instagram and to grow organically in 2020. I have created a short books that explain how to do it. :-). If you want to get some tips you can download the book for free from amazon. i am sending you the link:
https://www.amazon.com/dp/B084GG7YBG
I hope you can find useful the short guides . Happy Valentin's day .
For the stuff I'm doing right now I'm using a residential proxy. Just because I don't really have much experience I've been going to a public wifi, using a paid SOCKS5, I run all the checks to make sure it isn't blacklisted and I work off of that until it expires. I can't run it with a VPN though because every time I try my shit won't connect to the internet, I'm currently using ExpressVPN. I can't recall if I've tried using a VPN with a proxy though. All I know is when I hope onto whoer I don't want more than one IP address showing up, I want N/A in the DNS section, and if an IP address does pop it better be the SOCKS I'm using. Sometimes I've had my IP leak and I'm using a MAC so I just finagle in my settings and switch things around a bit until I get things how I want them but it's all by luck, I want to know why I'm doing something and just be able to apply it.
Can I send you a message about Proxy/VPN/DNS stuff? I run on a Mac, using Firefox. I use ExpressVPN, and when I'm doing certain things I will use a proxy. Lately I've been having issues with WebRTC leaking my IP address, and it's wicked frustrating. Also I was wondering about DNS, when I run sometimes multiple DNS will show, I need it to not show and I need to figure out how to fix the dumb IP leak. I'm brand new to this networking stuff, I think my Reddit age is 14 days, so yeah lol two weeks into this. I've spent so much time reading on how to fix the leak and for more clarification on the things listed above but I'm just not able to put all of the information together. If you or anyone else are able to help me I would seriously appreciate it. I feel like being able to set up a good network before doing anything is like the foundation to learning anything hacking related.
/justabasicwhitegirltrynnahavesomefun