>does computer science
you will never be anything but the scrub that software engineers has to deal with.
you are not a hacker you are a scrub who knows either java or languages allike in a low tier level an hero faggot
Ask a question and you will receive an answer.
Ask one too
Implying anyone who is studying cyber security is going to major in anything but cyber security.
This site sometimes scares me.
what makes you a hacker?
answering this question requires you to answer following:
hacked anything noteable?
What type of hacker would you define yourself as?
is this specific enough?
also answer i ddos shit/ sage/ an hero on stream
Never have used Kali, but what I have heard it is just an assortment of tools. Not specifically pen-testing. Those tools could be downloaded on any OS so why is everyone saying Kali?
Thank you for asking a legitimate question.
>hacked anything noteable?
Everything I have hacked I have had consent for. I did three small jobs for law firms and now intern at Google.
Can you specify for trying to get into what exactly?
>What type of hacker would you define yourself as?
I would describe myself as the guy who is hired to attack a system in every way possible and report a detailed log to the client. I do not go by the whole "white hat, black hat" bullshit because it sounds like 12 year old terms.
Let it die guys
the guy just wants anons attention for some sad reason
Where did you get the cool ski mask, hax0rz man?!?!?!? 111
When learning python in my first year of college I wrote a small tool that does not need proxies for brute-forcing accounts with my professor.
A few hilarious bugs when a client hired me, some of the comments left by the programmer were all Pokemon puns for making it past things he had setup.
The answer to your last question is both.
>How did you get started on the road of hacking, and what would you recommend for me to get started? I've always had an interest in cyber security or becoming a white hat.
>Any notable advice or warnings?
I found interest in my teens and began on the wrong road. DO NOT start out by looking up things such as RAT's and darkcomet and other bullshit mentioned in this thread.
A hacker is a broad term. I would begin with learning some programming language like python. Apart from the language I would also learn how systems work before trying to learn in-depth concepts like getting into them.
If you're looking to go into reversing I would reccomend the book "art of exploitation"
If you're looking to go into malware related stuff I would recommend the "Pratical Malware Analysis" Book, some of the stuff can be pretty dry but the labs are amazing.
For beginning I would focus on internet security and anonymity. Learning how to attack a system will help you learn how to secure it and vice versa.
Hope I helped.
One last thing, if you're brand new and have 0 idea what anything is. I would recommend googling High school CTF'S ctfs are capture the flag objectives based around hacking. You will learn as you compete and it will be a jump-start towards whatever you want to do.
Don't do this.
A. You will be spreading this to a large amount of people while on your real IP.
B. If you get a vpn it will most likely be logged and will therefore have your IP.
C. Mass spreading to family and friends will ruin your rep if caught.
D. Don't risk your future over some skid shit like "lulul I have some people ratted" it's not worth it.
Everyone that has hired me has purely never cared about gpa. In highschool I graduated with a 98 ranked 13/900 and something people. In college it was a little above a 3.0.
They purely care about knowledge, for one of my interviews I was asked to bring a laptop and was asked on the spot to demonstrate what I would normally do when beginning an attack on a network infrastructure.
Jobs come from knowledge, if you develop some cool tool and show it off to the guy hiring you you'll be set.
You realize DC has a detection ratio of over 40+ antiviruses out of 56 according to virus-total. Anyone looking to use DC would need to obtain a crypter or some form of obfuscater.
It costs a few, but last time I checked you need a company to say you need one.
But this may be different now. I'm currently getting mine so I can follow through with my job. It's fairly easy, and is mostly on Cisco routers and systems which is easy.
I do both. And yeah give me a few minutes, I have on a vm somewhere. Have you tried kickasstorrents? They usually have a key.txt so you don't have to worry about running their backdoored keygens.
IDA key guy here, I'd be interested in actually talking with you. I do a lot of reversing and malware analysis, favourite thing to do is download shitty password stealers and go and log into their email account that they saved in plaintext in their .net stealer
"RATS" suck. if u wanna build a 'net go dl the source for zeus evo and fix it up and start using 0day vulnerabilities to spread. btw make sure C&C is overseas. i recommend using a russian box as a C&C,
This is not OP(me) talking, what this guy is saying is illegal. It is forming a botnet and will most likely get you caught if you do not know how to remain anonymous on the internet.
Zues is a botnet controller. A 0day is a exploit that is not known yet, an exploit that can be used in a moments notice and infects thousands because there is no security for it.
A russian box is simply a offshore (russian) VPS (virtual private server) or dedicated server.
zeus is public virus, ignore his info.
0-day vuln is just unpatched vulnerability
russian box is a russian computer that you control your virus from, so as to not incriminate your computer/ip
c&c is command and control, the computer your virus receives all commands from
zeus evolution is malware.
0day vulnerabilities are unpatched vulns.
a russian box is a server in russia.
a C&C is a command and control server.
zeus evo is vry good malware. the src was leaked on infraud, but u can find it on trojanforge. i suggested that he modify it to improve it. if properly fixed up, it is simply the best anyone here can get their hands on.
not the original zeus. that shit is outdated and blows. zeus evolution is good. andromeda is OK, but needs moar work than zeus evo. if u just want something to holds bots and to steal form data tinybanker is ok 2. if u have money, hire somebody from exploit.in to code u a polymorphic HTTP bot that can operate over Tor.
Thanks for responding!
Further, what's the weirdest language you've worked in?
Do you tell other people you hack for a living or just that you intern at google?
How often do you find original ways of cracking security? Do you often just repeat the same old tricks over and over again?
learn to program your own, any public virus is retarded. Also realize that if you don't know how to hide your code in encryption anyone can steal your botnet by just reversing your virus and seeing what it does and where it connects to, they then hack the c&c server and steal all your bots.
he probably social engineered your ISP.
sign up w/ a CPA network and start pushing dating site offers via email.
credit card fraud
ddos for money
sell database dumbs, mailing lists, login details, credit cards...
The weirdest language I have ever used was Lua. Someone had created a malicious payload that when a small robot was plugged into a pc for charging it would download an executable file and mask as a setup file.
I just tell people I intern at google, people get edgy for some reason when they hear hacker.
Not very often, it tends to be the same old tricks. At times there were larger measures that need to be taken in order to maneuver around whatever is there but most of the time its the same shit in different order. theres more than one way to skin a cat
seriously op just want to talk to you about getting an IDA key, t i n y c h a t com/irjrlp
why the fuck would there be a direct connection to others through tinychat? Wireshark would give me no more information than the website I am connected to.
OP here, he most likely ISP doxed you. This means he social engineered the ISP you used.
He took your ip, placed it in some form of website such as infosniper and learned what hostname you used. He then social engineering your ISP for information.
If that was not done then he simply took your username or whatever he had about you, used pipl and google combined with whitepages for a nasty combo resulting in your address.
So what elite forums/channels/etc do blackhats congregate on, I'm really out of touch with the scene? darkode?
When I browse this thread, I kek at the general butthurt.
Every fucking time you explain you're an hacker, you get this reaction :
> lelel you're just a skiddie you think you are le haxor you don't hack le 4chan lelel you're 15
Hackers exist, you frustrated faggots. And I'm one of them.
I'm specialized in applicative intrusions, especially in exploiting webapps.
We're pretty different.
Btw, I'm employed by a company bu I'd like to make some money by making some undeclared jobs. Do you sometimes do this ?
Yes and it is extremely lucrative. I would look into google dorks and find an automated program for giving you urls with vulnerabilites.
The way it works:
I put in a google dork and it gives me over 1k urls with the vulnerability.
I then write out a template
Hi my name is _____ and I have come across a vulnerability in your site etc and then you charge. Message all thousand, if even 1% respond you just made 10 x whatever you charge to fix.
You serious ?
You make money with google dorks ?
But once he responds, what do you offer ? Because the dork is only a patching issue. So the guy will only pay to be told "update your shits" ?
If you had to recommend a Laptop or Notebook that was both portable and reliable, with the specs needed to proceed with programming or running any sort of scripts what would it be?
I usually find ecommerce websites and charge 350 a fix.
I explain to him that his whole website user:pass can be dumped and he becomes paranoid. The dork is merely to find the sql vulnerability, you can easily patch sql vulnerabilities but you need to know which error it is. For the one I generally just change everything to prepared statements.
Mostly all true except I would use a custom VPN instead of foxyproxy. Foxyproxy tends to be slow and unreliable. Do rememeber this is just from being followed. If you're going to illegal things then you would need to purchase some form of VPS and create your own vpn to ensure there are no logs. Then connect to it through a tor relay to ensure more anonymity.
I did this once. I got €800.- from the guy for pentesting his website.
I never thought about scripting this. This is a good idea.
Anyway, I could also find some websites using SQL, I'm pretty good at finding 0day sql injection.
What do you target ? Wordpress ? e-business CMS ?
Are you interested in business-talking with me by e-mail ?
Google "Google url harvester"
Its on github.
You put in a google dork and it creates a textfile of all the urls vulnerable. Meaning itll spit out workpress, e-business, everything then you pick what you would to focus on for more $.
>tfw most i ever got from those ungrateful fucks of sysamins and devs was 200€. once.
bleach. you just have to drink a lot of it
wait hold up i'm really a hacker and i was serious about the hentaikey accs