[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/blackhat/ - BlackHat

True Hacker Ethos

Catalog

Email
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 1 per post.


 No.10

ITT: Post your hack related questions, get an answer

 No.11

Best security options to not get caught?


 No.17

Never, (NEVER, ever) brag about it.


 No.21

>>17

This is the only rule you need really. If you want to expound a bit:

1. don't involve anyone in hacks that aren't absolutely necessary choose to work alone if possible

2. if you must work with a crew make sure they are sane and stable individuals you know personally and trust

3. if LE asks you ANYTHING, LIE LIE LIE fuck them LIE LIKE your life depends on it because it DOES.

4. Don't talk to anyone about your hacks

even if you only follow rule 4, you're golden


 No.25

File: 1455382303938.jpg (304.7 KB, 1000x1000, 1:1, Hacker.(7th.Dragon.2020).f….jpg)

>>21

You forgot never reveal your identity to another person online. this has certain implications like using proxies, tor and vpns to hide your IP but also simply not telling anyone who you are in real life will keep you safe.


 No.28

Where do i go on about getting a botnet? Is it hard to not have it traced back to you?


 No.29

Where do i go on about getting a botnet? Is it hard to not have it traced back to you?


 No.30

>>10

Maybe a dumb question but how do I remain undetected on a network?


 No.31

What to you think of forcing a Kali VM through a Whonix Gateway VM?


 No.32

>>28

p2p botnets tend to be the most difficult to track

you could buy time on a botnet and do your own spreading or you could start with commercial malware and spread it yourself. the best would be if you created your own from scratch and did the spreading yourself. spreading can be done via many means like bit torrent or even marketing and affiliate networks.


 No.33

>>30

two things

1. before you attack a network be sure you can gain elevated privileges on that network, this means tons of research on your target, be sure before you even touch the target

2. once you have access your best friend is the rootkit, you don't necessarily need a full rootkit a good sshd backdoor will work just as well and be just as stealthy. there are many examples of how to backdoor binaries on packetstorm and even some tools for doing in memory injection

bonus points if you can backdoor a system using nothing but system configuration changes :D


 No.34

>>28

>>32

TOR for c&c is becoming popular in some circles


 No.35

>>31

i think what you might be asking is how to tunnel your traffic anonymously, i recommend learning about proxychains, tor and how to route traffic over tor by default using iptables

https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy


 No.36

>>35

>>31

if you're really paranoid run all your traffic over tor using iptables and then also use tor browser, it sounds inefficient but it will ensure there are no data leaks


 No.37

>>11

ALWAYS spoof your MAC address




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]