This thread is for the discussion and support of those anons who have accepted the Quest to become remote pentesters. I am OP, my email is OSCPanon at protonmail. You may contact me via email with any questions related to hacking professionally, or learning to do so.
When I replied to user's thread about remote work, suggesting OSCP, I did not expect over 200 anons to ask for the info, too. Since the response was so tremendous, I am starting a general thread for this topic, as promised. I will start by posting the guide I sent out, here.
So what are you doing to further your Quest this weekend user? Here are some good resources and things you could start working on:
Learn Linux (free courses from Harvard, Dartmouth, Redhat): edx.org/learn/linux
Thanks to everyone who replied to my email with the guide. My protonmail inbox is now a beacon of hope. I really appreciate your warm regards, and your positivity proves to me this is going to be a worthwhile venture.
yeah bud im sure someone will hire someone with 3-4 months experience for 120k starting i believe you
Charles Cook
hey go fuck yourself in another thread
Thank you based user.
Austin Gonzalez
thanks man
Joshua Perry
If you google OSCP starting salary, you will see that the average stated is 90k. I feel this is low due to the mislabeling of IT jobs in the industry. Some jobs labeled "Penetration Tester" are actually analyst jobs, and not true penetration testing, which probably pay more like 60k and hurt the average. They also do not require OSCP, like the true pentest jobs.
A good remote pentest job that requires OSCP should get you easily above 100k.
Noah Collins
I will add that I would not even bother talking with a recruiter or hiring manager if they are not offering 120k for a pentest job. I would say it is ok to take less for your first gig, but after that, you should require 120k+ . If they are not willing to pay that, then you do not want to work for them anyway. Either the job is not really hacking, or they are shorting you and it would not be a good place to work.
Thanks for the replies and bumps anons!. You got this!
Aiden Kelly
Hey dude thanks for this, fascinating stuff. If you want to monetize your generous education of neetcels consider making a blog or something and affiliate market books/paid products related to the field. No reason to work for free trying to motivate stinky NEETs.
Wyatt King
Been working my way through the ebooks I could find from your suggestions, as I'm traveling and only have my tablet. Looking forward to getting home in a couple days and getting started with Kali.
Thanks a million user, I'm excited to see where this takes me.
Brandon Jenkins
I have considered monetizing. I may still do something along those lines in the future. But I am making really good money, and I stay quite busy hacking and researching. Maybe down the road. I don't mind sharing this info for free here with anons, because as I have said before, Jow Forums is special to me. I want my fellow anons to succeed.
That's great! I'm excited to hear about your progress. Feel free to send questions or request resources as you continue your quest.
Josiah Ramirez
You're a nice guy, but you will kick yourself in a few years for not exploiting your niche knowledge and generous desire to educate to get even further ahead. An extra 10-20k a year can mean the difference of being able to retire on passive income 5 years early, and 10 years early.
You have specialized knowledge of how to break into an on-demand career field and also are keyed in to internet culture in a way that lets you communicate effectively woth the zoomers that will one day be the backbone of information security, since it is unlikely they can h1b a workforce for the field.
I'm an air traffic controller with 10 years in my career, but your product, such as it is, is compelling enough to get me to consider taking it up and learning it on the side since you demonstrate its value very well.
Anyways, think about it. I hope you get people emailing you down the line thanking you for making them aware of the opportunity. Quality posting is rare in biz.
Angel Campbell
You make some good points. I will consider what you have suggested. I would be interested in figuring out a way to mentor people interested in this career path, without simply trying to sell them the information. I just always felt the area was so niche, that advertising on a blog, or adsense of videos or something just would not generate enough revenue to make it worthwhile. And I don't want to try to sell videos or books right now. I have made videos in the past on different topics, and it is a lot of time and work. I'm open to suggestions of how to monetize, without simply keeping the info behind a paywall. I genuinely love hacking and want others to discover it. I don't want to keep anyone from this info. I believe it should be freely available.
I am already getting a ton of emails from anons with lots of appreciation and thanks. That is what really inspired me to make the General thread here and keep going. I'm glad to help, and having positive vibes in my life is already a good payoff.
Reconnoitre is a tool developed specifically for use on the OSCP lab. It automates the initial recon process (running nmap & other tools.) It also creates folders for your target machines, and includes .txt file output files that suggest further recon. Not only does the output tell you to run Nikto or Dirb on a certain finding, but it gives you the command line syntax for doing so!
I did not write this tool, but I do really appreciate the person who did, whoever they are. It helped a lot while working on OSCP. It would also be really useful for practicing on hackthebox.eu or against vulnhub vms.
hey Ive been working for a while off and on towards getting my OSCP cert. When do you suggest I take a shot at the test? Ive gotten into about 30 machines in the lab so far. Also I will probably shoot u an email later. Do you have a discord or something u chill in with other pen testers?
Nicholas Phillips
>I want my fellow anons to succeed. Perhaps the real penetration was breaking into the hearts and minds of your fellow anons. Thank you based OSCP user.
Do schools teaching pentesting exist? Do they even make sense?
Jeremiah Morales
30 machines is pretty good. I feel like 40 is the target number for feeling very confident on the exam. 30 will get you by, but it may be a stressful exam. Those last 10 machines will be some of the harder ones you do and force you outside your comfort zone in terms of methodology.
Keep in mind that the exam usually has a waitlist, just like when you signed up for the course. You may have to wait 3-4 weeks to get the day/time you want for testing, so be sure to take that into consideration, and maybe do some hackthebox.eu in the meantime if you have to wait a while to test.
I am not on discord. Honestly, I spent so much time in my company's slack and Teams channels, that I do not really have time to hang out with other hackers outside of work these days. I usually just mingle at conferences.
kek. good post user.
as far as I know, schools do not teach "pentesting." There are schools that offer cybersecurity degrees, but at this time, I would say it is not a good value. Most people I meet with a cyber degree can't really do much hands on. I feel like the degrees are for management. So if you wanted to manage pentesters, then the degree is a good option. Otherwise, your best option is still online learning and DIY. Maybe this will change in the future, but I think the best instruction will always be from private companies like Offensive Security and eLearnSecurity, as well as a few Govt agencies.
Colton Carter
Always appreciated
John Cox
Hey user, let's say I have a background in programming and i'm up to date on everything you listed but I don't have certifications, are those just for proving to HR you know what you are doing or are they mandatory to work in the field?
Jayden Martinez
thanks for doing this user
Henry Lopez
Hardware recommendations? Need a new laptop soon.
Andrew Thompson
cont. Also any tips for getting/passing interviews? Could you tell us what the hiring process is like?
Isaac Johnson
A good pentest job will require some kind of cert. Either CeH, OSCP, or GWAPT. I never bring up GWAPT because SANS is crazy expensive. CeH I don't believe proves anything other than having a decent memory.
Serious firms require OSCP. The certs are required by their clients and customers, usually as part of the contract for the work.
Hacking does not actually require much in the way of hardware. I did all my self learning on a really old samsung laptop with an i3 I think (I was poor before I got my cert.) As far as my current recommendation on hardware, well I just bought a System76, and I love it. But don't do that if you want windows or want to game. They are designed for linux and you will not have an easy time getting windows drivers. Other than that, here are some hardware specs to consider:
16GB ram minimum. Don't buy a machine right now with less. SSD or M.2 drive . A fast hard drive is important and worh the cost. Ryzen threadripper. Multi-tasking is about the only area that matters too much for hacking. You want to be able to process as many threads at once as you can. The Ryzen threadripper 2950x is a great processor for this purpose.
Interviews are never pleasant. When you first transition into this career, you will not get hired on many interviews. Play the numbers game. You only need 1 person to say "yes". If you get through the 1st interview with a good penetration testing firm, they will likely have a test for you to take. For my current role, I had to take a test similar to the OSCP exam. It was remote. If you can pass OSCP though, then it is easy and actually a great way to prove your competence if you do not have experience on your resume yet.
As for getting interviews. Linkedin and DICE. I got my last 3 jobs from Linkedin. Once you get OSCP and put it on your linkedin page, you will start getting contacted by recruiters and hiring managers, guaranteed.
Jacob Reed
As I suspected. I don't pretend to be that educated on the matter since I'm not pursuing this career, but back in the days (high school) I enjoyed hacking and social engeneering, and for what is my knowledge-base on the matter all majors I've met on campus related to computer security are fucking retarded. They go around parading as "muh the hacker-guy" or similar archetypes, but are really ridiculously gullable. One of them was in charge of their department's network. Guess which password used for root?
Elijah Collins
sorry noticed you specified laptop and I suggested a cpu for a desktop. Anyway, the other specs still apply and basically you should be spending around $1100 for a good laptop with proper RAM , CPU (probably I7), and drive specs.
Also, a quick note for those practicing hacking in kali. The rockyou password list is pretty good for cracking hashes. They are some good cracking lists in kali by default. They reside in /usr/share/wordlists . I usually copy this folder to /root/ or desktop for quicker access.
Justin Martinez
What about CISSP? Iv heard a lot of people say you should go for that one to do pen testing.(pic related)
Also let me ask, in the tests what exactly are they testing you on? Just scanning and running some metasploit scripts? Do they test your programming skills or is it all script kiddie stuff?
CISSP is for defensive jobs and/or managers. The technical stuff is mostly defense, and it also deals a lot with policy and legal. You do not need this to be a pentester, and you would be better off devoting your time and effort into other areas. OSCP is the king of pentesting certs at this time. You could also do AWAE (Advanced Web) or OSCE it maybe called now for the online version. It is somewhat advanced and should not be attempted until you are OSCP though.
They test you in a way that is very similar to hackthebox, vulnhub, OSCP lab. You get a single machine as a target and the objective is to root it and maybe capture a "flag". Usually these tests are setup in a way that metasploit is near useless, in order to filter out the script kids. For my last test, I had to find somewhere in a web app to inject code. Such as php injection or something, can't remember what language / framework exactly, but it was code injection in a parameter. On the box, I had to escalate privilege, which was done by abusing some poor sudo configs. Then the flag was encrypted file. I had to find a way to decrypt it. Nothing too crazy, but metasploit was useless for that particular test.
Metasploit is a great framework and I use it in my job, but exams will usually be designed in a way to avoid relying on it. Or in the case of OSCP, you can only use metasploit on 1 of the 5 target machines for the exam.
Dominic Jones
thank you for this thread user. you're a good man
Levi Taylor
Very interesting, thanks user.
>Then the flag was encrypted file. I had to find a way to decrypt it. Do you remember how you decrypted it? Was their something on the machine or did you actually have to break the encryption? I could do everything up to this point. Crypto kills me. :(
>Metasploit is a great framework and I use it in my job, but exams will usually be designed in a way to avoid relying on it. Or in the case of OSCP, you can only use metasploit on 1 of the 5 target machines for the exam.
How is the exam proctored? Do you have internet access or are you completely offline while doing this? How can they know if you used metasploit or not?
Jacob Nelson
Care to share a backstory? How did you find out about this? I was planning on becoming a webdev, but since you said that this niche is scarce, it seems like the wiser choice. Might as well put the money from crypto in some good use
Bentley James
Not OP, but i don't think it's as easy as OP makes it sound. You basically have to have the same understanding as a systems admin, a good grasp of linux, be able to code, and now it seems like Cryptology is also required. (fuck cryptology it's a glorified guessing game)
Usually being good at just one of those things is hard for people, and enough to land a job.
Maybe i'm wrong though, I don't work in that field. I'm over here in programmer land. And as a citizen of programmer land, I can tell you, don't learn webdev. Learn to program in a real language and you can pick up webdev easily after. C#/Java are the bee's knees now.
Connor Butler
thanks user.
>Do you remember how you decrypted it? There were things on the machine which provided info on how to decrypt, if you could spot them and knew what they were for. If you could do everything else, then you would have been fine.
>How is the exam proctored? Webcam
>Do you have internet access or are you completely offline while doing this? You are online. You vpn into their testing network for the test, but you have access to google and everything like normal.
>How can they know if you used metasploit or not? You submit a report at the end of the test, detailing how you broke into each machine. Also, metasploit leaves some evidence of use on the target. I heard that there is also a new requirement to share your screen with the proctor. Not sure exactly how this works, but the idea is that they can see what you are doing. I didn't have to do this when I tested, but it shouldn't matter really.
It was not a discovery I made all at once. I pieced the information together over time. I did a lot of stuff I probably didn't need to do. Like one time I took a whole course on router security. That was probably not necessary. So once I went through this process and figured out what was most important to my success, I organized the information for others. I mentor people on Linkedin and offer my advice within the IT industry on various platforms. I recognized that there was not a google single point of contact for this info, so I sought to help others with what I had collected, as well as help them avoid the pitfalls I had to go through.
The difference is that you are not required to be an expert in any of those fields. You need a broader knowledge, sure, but you never have to specialize in any of them. You don't need to be able to program. You just need to be able to recognize what code is doing. You don't need crypto. That was a one off no an exam, which is Not part of OSCP lab.
Nathaniel Brooks
I think it was basically "bonus points" that I was able to decrypt the file. It took me about an hour of research via google and white papers to figure out how to do it. I don't know much about crypto.
Most the time when I am testing for work, I can google whatever technology I am trying to break into, and someone has done it before. I can use the info available to build my attack. It's mostly research on the fly. I know that sounds crazy, but that is honestly how it works.
The best hackers I know are not the most knowledgeable persay, but rather, the most persistent and willing to research what they don't already know.
Grayson Butler
>Most the time when I am testing for work, I can google whatever technology I am trying to break into, and someone has done it before. I can use the info available to build my attack. It's mostly research on the fly. I know that sounds crazy, but that is honestly how it works.
Same for programming friend. It's only the brain dead cert people and universities that think you should be memorizing entire books instead of using google.
I still get PTSD for some of those cert tests.
If you are telling me this is a skills test, where I can just go in knowing what i'm doing and pass the test instead of having to memorize and enter the exact file location of some file you would never edit without tab complete, find, or locate, then i'm sold. Thanks user. :)
Jeremiah Gonzalez
That's right. The OSCP exam and exams I have taken for jobs, require no memorization at all. You have access to google and your own notes. OSCP exam is to hack into 4 of 5 machines and then explain how you did it. Nothing to remember :)
Feel free to email me or summon me here, if you are looking for resources as you pursue this path. You can do this.
Nolan Scott
Before I start is this feasible for the average person capable of reading instructions or should I have prior experience?
I've been using linux for 5 years on my desktop and have fucked around with servers off and on but aside from that I don't have much experience
Austin Garcia
I couldn't even figure out how to break into hackthebox.eu. Don't think this stuff is for me.
t. Software Developer for 2+ years
Nolan Reed
based and checkd
Is it actually possible to get money from this? Mom says I have to stop neeting... already familiar with linux and basic bash scripting
I can't figure this one out. Any anons who get scammed by this dood come back and tell us what he did and I'll send you 20 dollars of link.
Parker Turner
hackthebox.eu is a bit advanced. It is also CTF style.
There are guides to how to hack into it. Just use one to get started. Once you are on the site, you will find it is not so bad. Also, hackthebox.eu is not a great starting point if you dont have much prior experience. I would suggest starting with vulnhub.com . Download a few of the VMs which are described as easy to intermediate difficulty and practice against them in virtualbox or vmware.
You have to start somewhere user. I didn't say it would be a cakewalk, but it is doable if you are persistent.
This is feasible for a person of average intelligence who can follow instructions. But you must be determined.
I make 150k / year. Entry level positions start at 90k according to google, but I think you can start at 100k+ if you have gained OSCP or some comparable certifications and show competence by having your own github or attending conferences. I posted about this somewhat early in the thread. It is a good job in terms of pay, and you can work remote.
Brayden Jackson
I have my eCPPT Gold. Can I get some small jobs to get some side hussle money somewhere? What would you recommend?
Joseph Nguyen
Thanks OP, you might have just provided me with some direction in life. Also, you are a dubs magnet
William Cooper
Why does T'pol look so weird in this gif?
Levi Ward
I don't really know too much about freelance pentesting. I have always been concerned that somebody sketchy would use me for some blackhat stuff and then I would be in trouble.
Sites like upwork.com have some posts looking for freelance pentester. You could try there, but I would just say be careful and vet your client if you can. Keep records of your correspondence with them, so if you need to, you can show it as evidence that you were acting on a legit job posting
.no problem user. keep me posted on your progress and let me know if you need anything along the way. here's to hoping for more dubs
Nathaniel Hughes
here's a scam for ya. convert those stinkies to VID and send em my way. I'll tell you my master plan myself.
I am raising an army of l337 4chinz ha0xx0rs to one day defend the earth from our future AI overl0rds. You can donate those links now or thank me later.
Just want to mention Corey Schafer. Best channel on YouTube for beginners of Python.
Jace White
Thanks user. I'll add this to the General post. Thanks for the bump. And the cat picture.
Parker Cooper
Should have mentioned this sooner, but I'll add it to the General post.
Darknet Diaries is a great podcast for anyone who enjoys podcasts and is interested in learning more about tech. In particular, episode 36 is about exactly what we have been discussing in this thread, and walks you through a typical professional penetration test. darknetdiaries.com/episode/36/
Jackson Russell
Hey user, thanks for making all this info available for everyone. You're a great guy
are you all in LINK fren? the train hasn't left yet. also i'm a junior in cybersecurity, do you have any tips for me? I've been using Kali and currently in my first class of cybersecurity reading Cybersecurity essentials by James Graham
Thomas Hughes
Hey OP could you email the information you sent anons the other day? Thank you.
I don't have a lot of LINK. I was actually debating buying some more. I do wish it was listed with coinbase though. Hopefully it will either get listed there or be on the new us exchange for binance in the future.
Given your current situation, I would recommend doing the Junior Penetration Tester cert from eLearnSecurity. If you find that to be no problem, then consider starting the OSCP. If you feel like you still need some more prep, you could do the next eLearnSecurity cert, the Penetration Testing Professional (PTP.)
I'm also going to do an AWS cloud cert but thanks for the info, I'll look into getting that pentesting cert.
Henry Lee
AWS cloud cert is a very high value cert. If you are into cloud, then you may just want to stay on that route, honestly. You will make just as much money as Senior Penetration Tester, from what I see on the job listings in my area.
But if you want to work remote or hack, then certainly check out those pentest certs. Either way you will do well.
Christopher Howard
Thanks man! Appreciate what you're doing.
Michael Sanchez
>here's a scam for ya. convert those stinkies to VID Yes that does sound like a scam. Anyway, my offer stands.
Blake Rivera
Something an user brought up to me in email that I had forgotten about (I will add this to General post for next thread):
Over the Wire is a wargames style method of learning linux. It's really cool and very useful for starting out with linux command line.
Asher Torres
I lost everything. My country currency got fucked and the economy went bonkers. It's impossible to get a job for guys like me. I was surviving by making translations and copywriting for pennies online. Even if I wanted to work in a minimum wage job, there is no way I can do it because the mother of my son disappeared and left me with the little blessing, so I'm a full-time stay at home dad. I'm practically a teen, so this is actually a possible way out of this crappy situation, even if it takes me a couple of years of sleeping only a few hours at night, if I can give my son a decent future, I will owe you everything.
I'm writing this almost in tears. OSCP user, you're the real MVP.
It may take some time. I think your goal of "a couple years" is within grasp though. No bullshit, I am sure if you have that much of a reason to do it, and you use that fuel for determination, you can complete training and obtain a great paying job within 2 years.
My email was listed on the 1st post, but here it is again. OSCPanon at protonmail . com
Keep in touch user. I'm pulling for you and I'll assist with info as much as I can. You got this
Jonathan Reyes
Nice to see you're still lurking, I remember your thread a few days ago blowing up Jow Forums like no other. This general is the passing of the torch of old Jow Forums with /affiliate/, /dropship/, and /mushroomfarmers/ before it turned into 100% crypto.
Kayden Torres
thanks for the bump user.
crypto is great. But my pentest gig pays the bills, and the extra helps me to invest in coins. I also just really enjoy hacking. It's the only job I didn't completely hate. I actually enjoy it.
Alexander Hall
So is it contracting or do you get a steady salary? And are certs really enough to land at least a low paying job without an actual degree?
Owen Peterson
I am moving this direction, into security. I've been building custom CRUD websites with php and asp.net for years. The people who audit my code get paid more than I do for breaking my sites with htaccess rules for rather academic vulns.
I have a sec+ test voucher but didn't take the test. I looked into oscp, but their website was absolute garbage. I probably should have signed up for oscp instead
Adam Cruz
Dedicated salary
If you have a voucher, you may as well cram and take the Sec+ . But yeah, the OSCP is the ticket to doing pentests and assessments. And you are correct, I certainly make more than the developers for the sites that I break into. I would agree that you should go Security. Your development background will make it that much easier, too.
Jonathan Nguyen
Are you still mostly exploiting the same old vulnerabilities that have been around for the last few decades? Namely, SQL injection XSS XSFR Directory traversal Etc. ?
Penetration tests are time compressed. I am not doing 0day development on projects. I may work on that kind of stuff for a special project, but 99% of the people I work with never do exploit development. Just using what is known.
I did not recommend hackerone. Hackerone is a good sight, but it is not for n00bs. It is cool that you can make money finding vulns in well known websites, but it is not really a learning site. I will add that information in my write-up for how to monetize the skill. A few anons requested a write-up on monetization via email, so i will be putting that together for next weekend's General thread and posting then. I will be sure to add hackerone in there.
Gavin Rodriguez
bless u user
Luke Foster
I have a Net+ and Sec+, what should I do next anons
Henry Davis
If you are not already working, then get a job as a "Cyber Security Analyst" . Your certs work well for that job title and you can make good money. If you decide to add Comptia CASP , you can boost your income by 10k-20k easily with you current certs. CASP is not much more info that Sec+ but really boosts your value to employers.
Then go and study hacking, and get OSCP. With OSCP, you will double your Sec+ level income, instantly.
thank you user. let me know if you have any questions and feel free to email me along the way
Kevin Williams
overthewire is fun as fuck, did a few of the sets a year or two ago
emailed you, I'll go back through the dead threads and ream em before bed
William Jenkins
overthewire is great. I am definitely adding it to the guide and General post for next week. Don't know how I forgot about it.
This is the first RPG General thread, so there is not a ton in the dead threads, but check back each weekend, I'll be here. You can always email me, too. Thanks for the bumps
Alexander Anderson
Thanks again Op. I'm getting my OS ready.
Colton Howard
What are your 10/10 desktop specs for pentesting? I think you mentioned Threadripper CPUs earlier.
Aaron Butler
Yeah Threadripper has it on lock when it comes to multi-processing, which is important. When I am pentesting, I end up with a ton of different terminals open, running a bunch of different tools, all running as many threads as they can get. IMO, the best value right now is the Threadripper 2950x. It's on sale on amazon, too, last I checked.
Beyond that, I would say get 32GB ram, DDR4 if you can. A motherboard supporting both the ram and cpu probably run you $300. You can go to partpicker.com to check which motherboards are compatible with ram and cpu.
GPU is not really a big deal unless you are going to be doing a lot of password/hash cracking. (you shouldn't need to really.) Hash cracking uses GPU mainly, so it can be important for that. But really if you get into hardcore hash cracking, usually you just want to build out a GPU rig for just that. Don't worry about GPU too much for a main hacking system build.
I would then go M.2 or a real nice SSD for main drive, probably 500GB. I personally like to have an extra HDD internal as well, 1-2TB, but you can always use an external as well. This is good for storing your VMs, snapshots, and just backing up your whole system.
From there, use part picker to select parts compatible with those main components and you will be good to go. Don't skimp on the RAM.
Anthony Miller
sorry, pcpartpicker.com
Dylan Martin
Thanks, user. You know your thread might get way more traffic on Jow Forums. Biz is pretty much just a crypto board now, lol.
Dominic Morgan
Fair point. I started it here because the topic came up here. I'll take a look at /g (haven't been there in a long time,) and maybe I'll cross-post it there next weekend when I run it again.
Owen Nelson
Im pretty good with Windows and Linux admin stuff, maintain and contribute to a couple projects, and know a bit about security, worked IT years ago. I'm thinking about getting these OSCP certs but I have a pretty lengthy criminal record from back in my drug days. Mostly possession and shoplifting type stuff and nothing computer or fraud related, but bad enough that I can't get approved for an apartment. Do you think id still have a chance getting a pentest job or working through a contractor with a record? Or just a waste of time. It seems like this field might ignore such things more than others
Oh I won't leave Jow Forums . I am only considering adding a posting to Jow Forums as well. Unlikely though. Jow Forums is my crowd.
Don't worry about your record. I got caught selling drugs in college, and not in small amounts. I have other issues with my record as well. I don't break the law anymore, but I used to be in and out of court all the time. You are correct, this industry ignores more stuff than most. I can't get a job at a gas station, but I can pentest banks all day. Odd world we live in. You will be fine.
Luke Gomez
nice, thx
Brandon Sullivan
I would stay away from Jow Forums, it isn't what it used to be... This is the best board for people that want to make it. Once an autist here has a plan he will move mountains to complete it.
Wyatt Young
What the fuck was wrong with the 90s, look how retarded she looks
Aiden Sanchez
good bread user
Elijah Ortiz
90's aesthetic is kino
watch the movie if you haven't it's a classic
Isaac Campbell
I forgive you user.
It is still one of my favorite hacker films. People hated on it when it released. I remember the AOL splash screen getting hacked and the ad for the movie being defaced (hilarious.) But it is actually really good. The part playing tape recordings to the pay phones to spit out coin? Classic phreaker.