[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Ask a hacker anything, old thread 404d going to sleep in an hour

The stories and information posted here are artistic works of fiction and falsehood.
Only a fool would take anything posted here as fact.

Thread replies: 216
Thread images: 14

File: 0.jpg (870KB, 1698x1131px) Image search: [Google]
0.jpg
870KB, 1698x1131px
Ask a hacker anything, old thread 404d going to sleep in an hour
>>
File: 1420536987955.jpg (14KB, 248x249px) Image search: [Google]
1420536987955.jpg
14KB, 248x249px
Please do a in-depth story of how you would proceed to hack a site

Also,
>check em
>>
>>590907276
How do i bypass the icloud/email lock on a iphone/ipad?
>>
>>590907276
Is KFC delicious?
>>
How do I delete sys32?
>>
>>590907428
Would begin with recon. I would analyze the site for what engine and framework it was running on. I would then get the host of the site and look-up any vulnerabilities in the framework the server was using. I would then begin with sqlmap in order to try and find a sql vulnerability and abuse that. Next would be XSS.
If still no luck then I would use a tool to find the admin login page and attempt to bruteforce it. Assuming it has a strong password and i'm still not in I would then use nmap to figure out the websites FTP and try and brute-force that. If after all of that none of the vulnerabilities exist in any of the frameworks or everything has strong passwords and cannot be dictionary attacked then I would write a large final report to my client explaining everything I have done. That is, assuming that was all legal.
>>
File: 1420444144644.jpg (86KB, 361x492px) Image search: [Google]
1420444144644.jpg
86KB, 361x492px
>>590908031
Nigga don't you mean Church's?
>>
>>590907864
Press the home button on your device
2. In the pop up that shows in the screen, click “start over” to start from the beginning.
3. After that triple click (3 times) the home button.
4. In the screen pop up , select the “cancel” option to cancel the activation screen from showing.
5. What you need to do next is triple click the home button again.
6. Select English/ any language of your choice in the language selection screen.
7. Select your country in the country selection screen.
8. The next screen is to select a WiFi network, click the next option to continue.
9. Press the home button again.
10. In the options that pop up, select the “emergency call” option.
11. If you have SIM card inserted on your device, remove it.
12. In the emergency call window, dial 112 and make the call.
13. You need to press the power button twice (2) as soon as the call is made, your device will be turned off and you will see only a black screen.
14. After the device starts, press the home button to continue our process.
15. Now you will be landed on the “Contacts” application screen.
16. The next thing you need to do is create a new contact.
17. Activate the voice control feature by triple clicking the home button.
18. In the pop up that shows, select the “block this caller” option by double clicking it(2).
19. In the next pop up, triple (3) click the “block contact ” pop up. Now you are on the home screen next open the FaceTime application.
20. In the Facetime App, You will see the Apple ID / email of the owner, Email him by making a request to disable the activation lock.
>>
>>590907276
How can I get a 4chan mod's password?
>>
>>590908336
This would be illegal but.

Phishing.
Bruteforce.
Get access to the server.
>>
File: 1419878724699.png (169KB, 500x500px) Image search: [Google]
1419878724699.png
169KB, 500x500px
Best mix drinks with UV Blue?
>>
File: rip.png (9KB, 343x208px) Image search: [Google]
rip.png
9KB, 343x208px
>>590908549
bleach
>>
What can beginner hackers do to learn to hack?
>>
>>590908952
Begin with a programming language. I began with Python in college. What specifically do you want to get into?
>>
File: image.jpg (45KB, 499x499px) Image search: [Google]
image.jpg
45KB, 499x499px
>>
>>590908154
yawnnn


nigger in code

anyone can type that shit


and moot suck cock with his new jew captcha.. leaving this fucking noob site
>>
>>590909211
thank mr skeletal
>>
>>590909056
I know c# and want to get into password and website hacking
>>
is hacking a good skill to invest in fallout 3 or should i stick to barter and others
>>
>>590909465
speech and hacking is good.
No need for barter when you shoot up the trading caravan and take their supplies.
>>
>>590909211
Thank mr skeltal
>>
File: 1411425799384.jpg (458KB, 1882x1908px) Image search: [Google]
1411425799384.jpg
458KB, 1882x1908px
do you worship our lady and goddess ebola-chan?
>>
>>590909412
Password hacking?

Meaning like bruteforcing?

Look into sentry mba or hydra.
Unless you're looking to make your own tools?

Website hacking consists of SQL injection, cross site scripting and framework/engine specific vulnerabilites and 0day exploits.
>>
>>590909672
yes
>>
bruh i wanna go on my mate's facey, is it hard to get his email or whatever
>>
>>590907276
What's one key obfuscation feature of JSON as relates to obscuring correct POST methods and URLs?
>>
>>590909876
Fuck me, AJAX, not JSON it's late
>>
>>590909858
What is a facey?
>>
>>590910188
facebook
>>
>>590910188
I would hazard to suggest he's talking about facebook
>>
>>590910270
Go to his about on his facebook, is his email public? if not you're going to need another method to get his email.
>>
List of zombies PC for make effective ddos ..
>>
>>590910426
dong doing ddos man :DD this is bads things :DDDDDDDDD
>>
>>590910041
The answer you're looking for would instantly ban me for answering, its lave backwards
>>
>>590910426
>>590910657
What?
>>
Nope, i dont do nothing ))) who me ?? No )
>>
>>590910396
would still like an answer here >>590910041
>>
>>590910855
see
>>590910805
>>
>>590910805
no its not you fucking retard

behold, OP is not a hacker, OP is a massive cocksucking faggot.
>>
>>590910935
then what is the answer oh mighty anon?
>>
>>590909876
Hackerfag reporting, I don't understand your question. You're looking for an obfuscation method for AJAX POST ??

Be more specific.
>>
>>590911219
Exactly, then he screams i'm not a hacker when I give him a way of obfuscating urls in ajax?
>>
>>590911058
requiring irrelevant or random data that would be filtered/calculated to be submitted along with the post, nesting functions within multiple source .js scripts and using eval to reconstruct an obfuscated dynamic URL that changes dependent on the 1024 character viewstate ID
>>
File: hacker-stock-photo-17.jpg (18KB, 400x299px) Image search: [Google]
hacker-stock-photo-17.jpg
18KB, 400x299px
I agree
>>
>>590911219
my point was that anyone that's done any hacking or cracking at all would've come up against AJAX at some point, and this faggot had absolutely no idea what to say
>>
>>590911362
You're asking for obfuscating JS techniques like String.fromChar(xx,xx,xx,xx) ?

What a shitty way to check whether someone is an hacker...
>>
>>590911362
I said eval you dumb fuck
>>
>>590910935
>>590911058
>>590911219
>>590911362
>>590911512
...wait a minute.... lave backwards.. I thought you were trying to say it'd be evul.

like i said it's late.

carry on good sir. OP is not a faggot after all.
>>
>>590911660
thank you based lave god i'll go back to answering questions
>>
>>590911512
1. You don't necessarily use AJAX, actually. It can help for some exploitation, especially XSS, but that's not a key technology.

2. You question was fucking vague.

> Captcha : irontyt
>>
>>590911792
>2. You question was fucking vague.
and he got it right anyway, I was just too tired to see it.

and of course you don't use ajax, I'm talking about cracking it, not using it yourself to secure something which it is awful for.

anyway, I apologize and anon can be comfortable that OP at least has some idea what he's talking about.

im off to bed
>>
>>590912007
goodnight anon
>>
OP, did you ever take part in any hacker team ?

I never did it, but I'm pretty sure I could provide some valuable help for exploitation..
>>
>>590912128
also, yeah, eval hasn't been an autoban for a long long time. op is also a very oldfag.
eval eval eval
>>
>>590912328
have not been here in a few years, did not know I could say it without the insta perma eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval eval feels good
>>
>>590912287
Nope! What's your skills
>>
2201 sexton ave
>>
>>590912561
I was the webapps hacker in the other thread, but I like exploiting vulns until I get a root access to the server.
>>
>>590912825
Ah welcome back, I am close to going to sleep. give me a nickname so the next post i make on this site will have it
>>
>>590907276
How do i easily bypass the faget captcha on here without paying shit for a 4chan pass?
>>
>>590913128
Get death 2 captcha
>>
>>590913086
I don't know what to say.

Let's say french_pentester ?

Anyway, want some e-mail ?
>>
>>590913571
im not french, fuck it just call me lave since the guy argued with me earlier about eval and i spelled it backwards cause of the autoban feature
>>
How ti buy bitcoins whit fake crédito cards?
>>
>>590914046
Yeah ok, lave will fit. At first I thaught you were asking for MY nickname, I said that because I appear to be french, actually.
>>
>>590908051
You remove the HDD from your PC and then you're putting it to your anus. sys32 will be deleted.
>>
>>590914098
Hi op here, this is illegal but for educational use i'll explain it.

You need a logless vpn which can be created by buying a serverbox with a os like centos and using openvpn to connect to it. You can then need to spoof your mac and preferably use a vm on top of all this. Then you use firefox with Noscript and disconnectme when buying/trading btc. It is a lot more indepth then this but i am way to fucking tired to write an essay
>>
>>590907276
How do you use sqlmap at a advanced level? i use --level and --risk and i don't find any vulnerabilities.
>>
>>590908336
Upload CP so FBI comes over.
Tell them that the mod forced you to do it.
Let them get the mod's password for you.
>>
>>590908463
Prepare to get SWATed.
>>
>>590914409
Not OP here, but I'm kinda good at using sqlmap.

First, sqlmap is NOT a scanner. It's an exploitation tool. You'll have a hard time FINDING an sql injection with it.

Find it first. Then use sqlmap to exploit it. Is that what you're doing ?
>>
>>590914409
Are you certain the site has sql vulnerabilities? I would reccomend checking out a tutorial like

aHR0cDovL3d3dy5iaW5hcnl0aWRlcy5jb20vc3FsbWFwLWhhY2tpbmctdHV0b3JpYWwv

base64^
>>
>>590914517
Of course, hence the illegal part of the post. Just explaining how it would work.
>>
>>590914626
I am unsuccesfully trying to use sqlmap on some links without scanning them, i was thinking about that, but i dont know how to scan them
>>
>>590911512
Depending on what cr/hacking they are doing. They will come against AJAX if they are trying to penetrate a website. Yet they will never see it if they are trying to take access in systems or networks.
>>
>>590914900
Check out the tutorial I linked (OP here).

The link is encrypted in base64, just decrypt it for the link and thatll show you how to use sqlmap on a exploitable link..
If you want to find an exploitable link they I would google sql injection basics for learning what error codes to look for.
>>
>>590909769
Yh passeord hacking. And is c# a good language for it?
>>
>>590914900
Well, you use sqlmap -u URL at first, then you tune it.

But like I said, don't use it for scanning, only for exploiting. Do you know how to find an sql injection ? Are you familiar with them ?
>>
>>590915057
C# is a fine language for writing a brute-forcing program.
>>
>>590915057
Use hydra, it provides HTTP-Form based engine.
>>
>>590915027
thanks op
>>
>>590915353
Like OP and I said : find a vulnerable link first. Then I'll help you using sqlmap on it if you want.
>>
>>590909769
Sentry mba or hydra? Which one do u prefer?
>>
>>590915785
google sentry mba proxyless, it saves the effort of having to get proxies.
>>
>>590915785
I usually use hydra. I am just used to it and find it pretty convenient.

You know the trick : you get used to a tool, then you stick with it.
>>
>>590907276
ITT: Op wants to be in Lizard Splodge.
>>
>>590915954
No one wants to be a group of 15 year olds who buy mass amount of servers with stolen cards
>>
>>590907276
What are you top 5 essential network tools?
>>
What are some good ways to practise hacking?
>>
>>590916255
I mainly use, nmap, sqlmap, wireshark, tcpdump and ettercap for networking.
>>
Not OP

>>590916274
First, you can start by downloading vulnerable webapps or systems. A lot are available. Then practice on the wild.

>>590916255
Wireshark
netcat
nmap
hydra
hatkit
openssl
stunnel
>>
>>590907276
I need help again, on some websites, after i find a vulnerability, for some reason i can't acces the site anymore for 1 or 2 days
any help?
>>
>>590916591
Be more specific. You might have been banned because your illegal activity has been detected by some IDS. It happens.
>>
>>590916396
I use nmap and commlink for wifi. Good times.

Also, one more question before bed. Do you think it's possible to gain access to networks on a mobile (smart) phone, Jailbreaked or otherwise? And what would be achievable?

You're top OP.
>>
>>590916764
Get parameter ' ' is PostgreSQL >8.1 stacked queries' injectable
and after a short amount of time:
Connection timed out to the target or url proxy, sqlmap is going to retry the request
>>
>>590916914
Matters the phone, most everyday android phones do not have a network card capable of injecting. If you google aircrack for android you'll see a list of phones with network cards strong enough for cracking WEP, WPA is a whole nother story since you'll need a nice large dictionary.
>>
>>590917074
>>590916914
call me lave, the nickname is from the argument int he thread
>>
>>590916988
You might have been banned.

Can you still reach the website using your web browser ?
>>
>>590907276
if you really a hacker why did you let old thread 404 ?
>>
>>590917347
because it reached 400 posts
>>
op lave here going to sleep, been over an hour and half answering like 100 questions. see you all around. I'll post this again soon
>>
>>590917684
See you again on here soon Lave. Nice talking
>>
>>590917684
Bye, bro, sleep well.
>>
>>590917260
No, sorry for the late response,.
>>
>>590907276
How old are you on /b/?
>>
is it possible to make websites think you've bought/ordered items off them like amazon or tesco say?
>>
How would one get into a locked phone that you found
>>
How do i hack a facebook account?
>>
Good books to read about pen testing, already read a few
>>
>>590918237
Try using a website like downforeveryoneorjustme dot com to check whether the site is down or not. You might also have broken it.

>>590918736
It can be possible, yeah. But it's not really doable. They'll most likely notice something went wrong and you'll get in trouble.

>>590919067
Don't know, I'm not into phones.

>>590919124
You don't. Get the password of the account : guess it, retrieve it on the victim's computer, blackmail him/her, install a keylogger on her computer, etc... but you won't hack into one random account.
>>
>>590919715

web applications hackers handbooks are nice.
>>
How do you find the the hmail account used for the creation of a blogspot? How to hack into gmail accounts?
>>
If ur good tell us who avunit is
>>
>>590919849
Is there any risk of getting caught?
>>
>>590920098
Basically, you don't.

These are not really hacking related questions, anyway.
>>
>>590920269
Yes, of course there are. You can go to jail.

There are a few stories of hackers who went to jail, like Kevin Mitnick and Kevin Poulsen, for instance.
>>
>>590907276
How do I greentext
>>
>>590920630

Protip: Don't hack if your name is Kevin.
>>
>>590920396
Thanks.
So, how can you deface a website? In this case a blogspot website, knowing it's never visited.
>>
>>590920630
Is c# networking hard to learn?
i know some c#, but want to learn more..
>>
>>590907276
can you hack those new iphones and their fingerprints? kek

captch this thspths
>>
>>590909211
thank mr skeltal
>>
>>590920940
There are several ways to deface a website. One very convenient is to attack DNS. You take over the mailbox used for DNS registration and you change the IP address to a server you control. Then, clients will be redirected to your website.

Other way is to hack into the website and change the index page.

>>590920954
Not very hard, actually. It requires some network knowledge, do you have them? OSI model, network stack, TCP states, etc. ?
>>
>>590921556
>network knowledge, do you have them? OSI model, network stack, TCP states, etc. ?
No, i wanna start learning that somehow
>>
>>590921751
This is not very hard, actually. This is just some theorical shits that look boring and useless at first sight but will help you alot in the future.

http://en.wikipedia.org/wiki/OSI_model
>>
>>590909211
Thanks mr skeltal
>>
are Op and lave going to suck their dicks now 69?
>>
>>590920940
>>590921556
Thanks again. Can you explain how to hack into the website?
>>
Can you hack the game and make a night elf mohawk class?
>>
>>590922002
Thanks, also, is it worth having a programer career?
>>
>>590922139
This is a pretty vague question. There are several ways.

First, you can try to find some dangerous content on the website. Sometimes (often), some configuration files, or logs are available and admin forgot them. You can sometimes find enough information to log as admin.

Otherwise you have to use an applicative vulnerability, such as XSS, SQL Injection, CSRF, File Upload, File Inclusion, espace shell, etc... Those are know bad programming practices that lead to vulnerabilites. It allows an hacker to exploit them and eventually to figure out the admin pass, and/or gain access to the underlaying OS.
>>
>>590907428
Dis also where do we being Mr. Hacker? What do we meed to learn to save the Internets
>>
File: IMG_20150106_090643.jpg (61KB, 517x511px) Image search: [Google]
IMG_20150106_090643.jpg
61KB, 517x511px
Can you give me bitcoins?
>>
>>590922657
Programing is quite boring, actually. This is a good way to start getting into computer science, because it's fun. But hacking is more interesting.

I've been programer for 4 years, and I moved into hacking.
>>
>>590923019
Thank you op. Won't bother you anymore. You've been useful.

Here is classy doge for you.
>>
>>590908154
So you're a script kiddie without any actual knowledge? Swag. Hack maplestory for me bro
>>
>>590923171
Are you doing it the legal way?
>>
>>590923104
To hack a site, you first have to know it. Identify the languages in use, the HTTP server, to OS, the other services. Also understanding what the website does, if there's an authentication, a password-recovery features, etc. Then you figure ou how you can attack it. Then you try.
>>
>>590923334
Yes. I'm employed as a pentester, so I do it for my company, we sign contracts with customers and all the needed authorizations.

You can get in serious trouble otherwise.
>>
>>590923632
I would really like to do that, but i have some kind of fear that i'l fail at some point
it really pisses me off
>>
>>590923227
Not OP here, but he's still a good guy.
>>
>>590924035
You'd like to do what ? Working as a pentester ?

And what are you afraid of ? Failing at what ?
>>
>>590923434
So I need to get up off my butt and read a couple sites. I want to look into pentesting
>>
This thread is either bait, or OP is a skid.
OP, do you have a form of contact?
>>
>>590924299
Try OWASP at first. Very reliable sourdce of knowledge for web hacking.

For instance, SQL Injection : https://www.owasp.org/index.php/SQL_Injection

Read this website, and every time you encounter something you don't know, learn it. It's a little bit hard and slow, but it's efficient. You'll understand things better and better.

Also, try things. You wanna learn SQL ? Ok, install a MySQL on you Linux computer and start doing some SQL. Create a database, create tables, insert things, retrieve them, etc.

TRY things. And train. With vulnerable webapps (there are a lot on the web, like webgoat).
>>
>>590924131
yes, i would really like to work as a pentester.
i can't explain it very well, i am afraid i will fail at what i'm doing or can't do it at all and then i get fired by the boss
>>
>>590924759
Not OP here, but same job.

Why do you want to contact me ?

Why do you claim we're skid N
>>
>>590924886
You won't be hired if you know nothing. You should be afraid not to find a job, actually, before being afraid to lose it.

Good pentesters are not easy to find, so bosses have to hire beginners and train them, you know.

And anyway, the fear of failing is very bad. DO things. Just do it. Learn, and become an hacker. Then you'll find a job as a pentester.
>>
>>590925407
how old are you, also, are you op?
>>
>>590924959
I want to see if you are what you say you are.
>>
>>590925583
I am. But whatever, ask. I'll answer.

>>590925561
I'm 32 at the moment.
>>
>>590925740
When did you start to learn hacking/programming?
And how old do you have to be to actually start doing that?
I'm actually pretty young, but very interested in computer science and i know a bit of programming
>>
>>590925740
I asked you for a form of contact.
Anyway.
How do you think I should go about bypassing suhosin, when I can only write in my current directory?
>>
What do you use for FACEBOOK hacking?
>>
>>590926032
>>590926032
>When did you start to learn hacking/programming?
Several years ago now, I graduated in computer security in 2008. But I really focused on hacking 3 years ago.

>And how old do you have to be to actually start doing that?
I began this job at 30, I'm 32 now.

>I'm actually pretty young, but very interested in computer science and i know a bit of programming
How old are you ? The best way is the school. Go to College.
>>
>>590926294
You don't hack facebook.
>>
>>590926294
OP: I use kiipi.net and his extension..
it's pretty easy to use
>>
>>590926165
You could try writing some PHP file with some echo passthru($_GET['cmd']); ?

>>590926294
This: >>590926378
>>
>>590907276
ITT : Script kiddies think they're hackers!!!111111
>>
>>590926695
ITT: You learn how to use the shift button
>>
>>590926695
Dat butthurt...
>>
>>590926635
Definitely bait lol.
There goes my hope of finding someone relevant.
>>
>>590926368
I am ~15-16. i know i am very young
in highschool we ain't doing anything except using paint
as i said, i am very interested in computer science.
>>
>>590927145
Then explain me what I should have replied, because I don't see what you expected. You look more like a troll to me.
>>
>>590927233
Oh ok, you're very young.

In highschool, just do things at home, by yourself. Install Linux and start learning, try things, etc.

In high school you'll be able to choose computer science and get graduated.
>>
>>590927414
I actually installed linux on virtual box, got into some databases that i made, but i can't really do anything with sqlmap if i escape the string, i need to practice.
Where are you from, anon?
>>
>>590928154

I'm french.

I'm pretty good at sqlmap, actually, I can help you with that. What's the problem ?

You are practicing on a webapp and you have an sql injection, right ?
>>
>>590907276
What is the different between Linux and Windows
>>
>>590920773
kek
>>
>>590907276
Who is the owner of this ip address 70.194.165.5
>>
>>590928519
Linux is not gay.

Each one has its own purpose. Windows is OK for random people, but this is crappy when you start doing things. Something is especially painful with Windows : networking. FFS, it's a shame.

>>590928628
>70.194.165.5
Cellco Partnership DBA Verizon Wireless, obvisouly
>>
>>590928926
Thanks
>>
>>590928454
I made a page that gets data from database depending on the id(it is GET,not POST)
sqlmap only works if "id" is not escaped.
>>
>>590928926
Yes but I am looking for the owner of the verizon phone this is coming from ...obviously any one can go to google and type in ip address tracker and get that info
>>
>>590909211
thank mr skeltal
>>
>>590907276
Do you really wear a ski mask and sneak around with a laptop like the hackers on the tv commercials?
>>
>>590928454
i am bad at explaining things, sorry
>>
>>590927636
im kinda like that kid. I know some c++ shit and thats about it. Cant exactly install and learn about linux cause i dont have lots of computers, maybe i should get some virtual software, know any good ones?
>>
>>590929224
Verizon can be social engineered.
It's harder than before, but you can still do it.
You can get shit like name, address, last 4 digits of ssn, etc.
Just google social engineering verizon
>>
>>590927233
MODS!
>>
>>590929480
I will look in to that thanks
>>
>>590929538
FUCK, I REVEALED MY AGE
>>
>>590929669
seeya
>>
>>590929264
Yeah, always. I also look at laptops very closely.

>>590929360
Doesn't matter if you're good at understanding them.

>>590929193
Well, everything sounds normal to me. If you escape the content of a parameter, you stop sql injection, this is the purpose of escaping a parameter, actually. So it's normal that sqlmap fails.

>>590929396
VMWare, qemu ,Virtualbox

Live USB

Dual boot is even better.

But seriously, use linux. You won't learn shit before using it.
>>
>>590907276
is op still here?
>>
>>590929878
OP is sleeping, I'm just a fellow hacker.
>>
Is it true that when you hack you wear a skimask like the one on the picture?
>>
>>590929846
>Well, everything sounds normal to me. If you escape the content of a parameter, you stop sql injection, this is the purpose of escaping a parameter, actually. So it's normal that sqlmap fails.
How can i get past that?
>>
How to create a backdoor?
>>
>>590930094
I don't get the point.

To use sqlmap to exploit a vulnerability, you first need a vulnerability. You need a bad behavior. You need some var not being escaped before being used in an sql query. So if it's escaped, you're screwed.

But it depends on what you call "escaped", it depends if it's an interger value, it depends if there are quotes in your query, etc..

With sqlmap, you can use --technique switch to try getting a blind sql injection
>>
>>590929846
What exactly on linux will i be looking at/for?
Plus is there any heavy system requirements for virtual computers
>>
>>590909211
Thanks Mr skeleton
>>
>>590930291
Write a program that allows you to perform some dangerous actions remotely.
>>
>>590929945
tought that i would still catch him.
why/when/how did you get into programming
>>
>>590909211
thank mr skeletal
>>
>>590930434
networking
users rights
command line interface
scripting
apt-get
kernel

everything is better.

If you have limited or crappy computer, choose a Linux with no desktop (server version, with only command-line, it's way lighter).
>>
>>590930506
I was young when I begun, actually.

But programming is not very important.

What is important is to UNDERSTAND how computers, protocols, network work.
>>
>>590930700
ok this should be the last question, do you know any good, easy to understand guides for this kind of stuff?
>>
>>590931082
On the internet you can find some very reliable sources. I have no link to provide, but you can try to look for some linux tutorial.
>>
>>590909211
thank mr skeltal
>>
>>590930414
One more question, how do i start learning more things ?
>>
>>590931325
Ok thanks for the help, since this is 4chan and i cant really give you anything, do you want some specific porn?
>>
How do I shot web?
>>
WHITEHATS - TAKE A STEP INSIDE MY OVEN
>>
>>590931586
No thanks, bro, it was just a present. No need to pay me with some porn.

>>590931535
https://www.owasp.org/index.php/Main_Page

There is a good SQL Injection section that should help you. It's important to understand what is an UNION SQLi, a BOOLEAN-BLIND SQLi, a TIME-BASED SQLi.
>>
>>590931905
thanks, can i do something for you, anon?
>>
script kiddy breeding fucktard thread
read that before you call your self a hacker op
http://lucifer.phiral.net/
>>
>>590931905
>No thanks, bro, it was just a present. No need to pay me with some porn.
>Not wanting porn on the internet
>You are a robot
>>
>>590932087
>>590932247
OK, so in payment I want some cum-in-mouth-ending blowjobs.
>>
>>590930900
i understand that
>be me teen faggot in my early 20's
>know some networking
>just started to learn CLI environment so i can learn programming
but i feel like im missing alot
few months ago i wanted to start from scrap,as in
put some GNU/Linux destro and start playing in it till i learn how it goes
and after make my own OS from nothing,that way once i know how things work i can go further in programming
now my question is,should i first learn a programming language and do that after or should i just use linux and see from there where it takes me.
tl'dr clueless faggot wants to learn CLI and OS
>>
>>590932430
well, i guess the other anon is gone already
>>
>>590907276
hacker-san
how do you hax an iBrick to shame the iCult more?
>>
>>590932685
My point was : programming languages are not very important. Pick up some language, like python and learn to deal with it. You just have to be able to build a program sometimes.

You have to learn everything. Programing isn't more important than SQL of networking, or HTTP protocol, or SSL cryptography. Everything is important. You have to figure out how most common things work. Not being an expert, but know them well. UNDERSTAND them well and in depth.

Here are some key points :

Linux
Windows
networking
sql
processes and memory
stack/heap/basic ASM
protocols (ftp, ssh, etc...)
HTTP
Cryptography : hash, ciphers, SSL, certificates, keys, etc...
so many more...

>>590933095
Yep, I guess so.
>>
>>590931905
> 2015
> TIME-BASED SQLi
> too dumb to use if(..., 1, (SELECT 1 UNION SELECT 2)) error based masterrace blind injection technique
sheep
>>
>>590932430
>>590933095
I cant find any in my folders... i thought i had everything...IM RUINED
I think i didnt save any cause i dont see the interest in moneyshots and stuff like that
>>
File: 1420562350505.webm (3MB, 960x540px)
1420562350505.webm
3MB, 960x540px
>>590933095
That's the only one i got, i aint 18, remember?
just joking, i dont keep them.
Thread posts: 216
Thread images: 14


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.