/hmg/ Hackerman General

In /hmg/ we discuss pentesting, ctfs, exploits, and general being a hackerman.

Resources:
VM/CTFs:
overthewire.org/wargames/bandit/
>easy beginner bullshit
vulnhub.com/
>prebroken images to work on.
hackthebox.eu/
>super secret club
ctf.hacker101.com
>part of hackerone, a bug bounty program. Find flags, get private invitations to bug bounty programs

Tools:
kali.org/
>meme dragon distro but it just werks
metasploit.com/
>scriptkiddie starting point and swiss army knife

Tutorials/Guides:
abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
>From zero to OSCP-hero rough outline
youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
>IppSec, video guides for retired HTB VMs.

Certs:
eccouncil.org/programs/certified-ethical-hacker-ceh/
>CEH, only looks good a resume to non-technical in HR
offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
>OSCP, the big dick swinging exam, 24 hours to own 5 machines and a further 24 hours to write up a report detailing your methods.

Attached: hmg.jpg (250x250, 9K)

Other urls found in this thread:

sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
youtube.com/watch?v=NArwG6yaWJ8
ctf.hacker101.com
shodan.io/search?query=Android debug bridge
overthewire.org/wargames/bandit/
t.me/Sw0rdD0g[/spoiler]
certification.comptia.org/certifications/network
virtualhackinglabs.com/
twitter.com/NSFWRedditImage

Holy shit /hmg/ is revived again? I tried to keep it going for like a week but it eventually died, glad to see it back I suppose. Haven't touched pentesting for a whiiiile, should really get back into it.

Yeah, previous thread(from yesterday): Some interesting discussion in there. I post it every so often, but I'll never stay consistent. Hopefully others will carry it out as well.

bump

any military cyberwarfare boys ITT? just started jcac and had some questions

I want to be a hackerman.
Seriously, what's the best method for learning how to discover and writing programs for exploits?

>best method for learning how to discover and writing programs for exploits
much reverse engineering binaries

Run them through a debugger or disassembler?
What about binaries that obfuscate from debuggers like on mobile apps?

I've played most games on overthewire and left it halfway through vortex because it got repetitive, where can I learn new stuff with other people and shit? I'm an aspie with anxiety who cant talk to people.

Attached: welcome.jpg (800x800, 169K)

But 90% of vulns are bad configuration or faulty logic.

>Certs:

I thought this garbage was only useful for getting through HR.

i think most of it is. if you want a job then it's probably a good idea, unless you have a degree

I missed Oz points because I had no idea about template injection, don't be like me.

Anyone know if any good radare 2 tutorials? I have the actual manual, but it's hard to put it to use

Tutorials? Why would you need a tutorial? What aren't you sure how to do?

Whats better; a career as cybersecurity specialist or as an embedded system engineer?

Whichever you like the most

Webdev

Im actually doing a community college study for that, I regret it with passion. Luckily I can afford to study something usefull afterwards at a college university level.

I have a MS in Computer Science, some years experience in Software Engineering / Architecture and Web dev.
How hard would it be for me to get into IT-Sec? Would those certs be enough?

>Haven't touched pentesting for a whiiiile, should really get back into it.

but you won't

certs are great if you actually study to learn shit instead of just getting a piece of paper...

^ this

Post the last thing you hacked or you're a lamer.

A genome database of some description.
Far from my most elaborate job, just a relatively simple SQL injection.

Has anyone played overthewire's warzone?

Yeah, it's good. I've done the bandit challenges, they are a good introduction. However the fun starts with leviathan. That one is hard, i've only solved the first few so far.

Any of you nerds know a good tool for cracking pdf passwords. Google is recommending trash

I think the CTF way is to use magnum version of JohnTheRipper with pdf2john and use a wordlist like rockyou. You could also try hashcat.
Other than that you could try social engineering or your quantum computer.

Is 26 too old to become a hackerman? I wasted away my youth wage slaving. I'm a barely competent programmer. I graduate soon though but the hackerman field is huge. All my cs knowledge doesn't help me at all from what I see. I'm starting at 0 the more I look into it. Tons of 15yos that can hack circles around me is a bit discouraging

Attached: Bnh6xY9CAAA9Ll0.jpg (480x352, 28K)

With an MS + industry experience you should be fine especially with a cert but why make the jump?

I have very little understanding of programming and technical things with computers. If I wanted to hack user accounts, are these the resources that I want to study?

>Is 26 too old to become a hackerman?
With that attitude? Yes.
Personally, I think you should do it because you enjoy it not just for a dick measuring contest (even if you later do that for fun).
I don't have industry experience thought, so I can't talk from a bussiness perspective, but if you want to learn (and that's what hacking is about) then there's no age limit. And even if you're too old to be hired then you can focus on bug bounties.

what do you mean hack and what os are you talking about

In the same boat as you
The Web Application Hacker's Handbook was recommended in the last thread if my memory serves me right.
Found it online for free, haven't started reading yet so can't say if it is good or not

Attached: twahh.png (1028x1234, 1.74M)

>what do you mean hack
Access one's personal account without knowing their login credentials.

>what os are you talking about
I'm focused more on online social media accounts and cloud software accounts such as iCloud.

What are some good online (paid or free) WPA2 handshake cracking services?

to most people this is quite interesting, however I've never dived into this stuff once. What can you do with this knowledge other than a career in security?
> inb4 hack pentagon

I would be using Windows 7 or 10 to perform the hacks

I helped write it's original curriculum

I want to learn it for personal use, to secure my own shit. Also try to break things in a controlled environment seems like a nice hobby

how 2 hack te=he govermnent??????

I could tell you but I would have to kill you

So, I've been around computers since I was 8 years old. I didn't start "hackerman" until I was 21. I am 29 now. For 8 years I did hackerman stuff on and off cause I tried to rush learning things.

All im saying is. If you tried to do this, don't rush it, I did cause I thought 21 was too old to start. if I didn't I would know much more than I do now. I know a decent amount, but I know I would know more.

I'm having some trouble with metasploit. I'm not sure if I'm setting it up right.
Whenever I use an exploit successuflly, I get dropped striaght into a shell. Aren't I supposed to be able to list sessions first. I tried with both a windows/meterpreter shell. How can I get back to msf> without dropping the session?

Attached: wat do.png (990x297, 218K)

have you tried backgrounding the exploit witjh -j ?

this looks usefull
sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf

I feel so dumb that I forgot the "j" flag haha. Thanks guys.

There’s a discord for you retards called «The Penetration tester community» red logo, google it

Session - i 2

Nvm misread your post, load mimikatz now!

Checking the challenges of overthewire advent bonanza make me feel like a brainlet.

Notorious 400lb basement hackers are going to crash everything!

youtube.com/watch?v=NArwG6yaWJ8

Attached: anK9Gv0_700b.jpg (650x577, 63K)

Anyone did Reddish on HTB?
I've been enumerating it for like 3 days and still can't find the fucking app.

>software engineer
He told you why

>haven't started reading yet so can't say if it is good or not
I was the user who recommended it in the last thread. It is better than good, it is the best book you'll ever read on the subject.

im almost halfway through it. issa good.

I don't really want to give you advice because I hate faggots that spam shit like this.
>how to hack facebook accounts?
>how to hack
Why do you want to target individuals? Complete fucking faggot. Anyway, learn what phishing is. I'm only telling you because I don't think you'll be able to do it successfully.

Should be called Crackerman General. Hacking is something different.

bandit was so much fun, is there something similar (with focus on shells and GNU/Linux)?

Attached: 1546698871307.png (2112x800, 1.3M)

While that's true, most don't care. "Hacker" is an evolved word.

ifconfig wlan0 up
airmon-ng wlan0
aiodump-ng --channel --bssid -c

Attached: boomer30yo.jpg (380x349, 26K)

If youre making a website, you'll better secure it. Your persona;l security will be better

Thanks to the user in the previous hackermna general who reccommended ctf.hacker101.com before doing bug bounties. It focuses on fundamentals and more SQL, XSS, path injections and easier learning curves after getting my brain broken doing hacktheboxes.

oh lol. brute-forcing an 8 character long password takes 8^50 iterations in the worst case.

do it faggot

shodan.io/search?query=Android debug bridge

This is still not fixed, you can root thousandes of android third world devices and phones by just connecting to them.

Pic related, a test i did on my local network.

Attached: adbroot.png (479x189, 60K)

You're welcome. Are you the user who joined the group? If so, I've seen you found some more flags, congrats! We should set up an IRC or something. Could even try finding bugs together/split profits, if you want

Something I wouldn't want to do. They're most likely poor already. Could you imagine how happy they are to have a phone? It'd probably crush them if you fucked shit up.

Not advocating for rooting these devices, people need to update android and fix it.

Like others have said, you need to secure your own applications. In order to do this, you need to learn how to break into shit. There's also bug bounty programs, some of which pay thousands, hundreds of thousands, or even millions of dollars. There's the dark side, you can sell your findings on the black market, or exploit them yourself, if you want to be evil. You can share this knowledge, write a book or something and get some cash. You can teach lessons to others. You can potentially land yourself in a government agency, if that's what you want to do. You can start your own security consultancy.
I mean, there's tons of shit, the list is endless.

>overthewire.org/wargames/bandit/
is this basically just to teach you how to use the terminal? i'm pretty good with the terminal already how much will this teach?

>Like others have said, you need to secure your own applications. In order to do this, you need to learn how to break into shit.
Which is why I will never stop shilling InfoSec. There are so many simple mistakes people can make when building software that can be devastating, and are perfectly avoidable.

Things as simple and a no brainer to us like scrubbing your inputs but for whatever reason people just don't do it.

It bugs the fuck out of me that security fundamentals aren't taught alongside normal CS degrees.

/rant

why the fuck would they have ADB over network enabled?

On some cheapo devices it may be enabled by default

Chinese shit ships with it, especially multimedia devices it seems.

Damn. I would've thought that cheap shit is even more locked down to where you can't even enable developer options. Not surprised that Chinese producers don't care about security though.

What sort of OS should i use when learning this? Will be using a VM since I'm currently stuck with a macbook.
Suggestions for VMs are also appreciated

Every tutorial will most likely use Kali.
Like OP says, it's a meme but it just werks and has everything you need to get started.

Once you're familiar with how you're doing things you can branch out to other OS's.

Kali provides prebuilt VMs for download on the OffSec site, so you're perfectly fine starting there.

I'll check it out, thank you

[spoiler]t.me/Sw0rdD0g[/spoiler]
Enjoy.

Attached: Screenshot_227.png (363x484, 424K)

You could actually if you wanted to, kill these ADB sessions remotely and disable it. If you want to white-knight and show your face in the media.

Ave you ever tried playing CTFs?
>Are you the user who joined the group?
>I've seen you found some more flags
S-stop stalking me.
A way to communicate could be cool, to be honest I really feel like I've hit a wall on learning so I'll probably focus on reading some books for a while. Those last 5 boxes on HTB are a pain in the ass, and I had to decline the first Hackerone invite because it looked way too out of my league.
I wonder if we could set up a somewhat stable hmg ctf team, I've always played the defcon quals alone and they're really fun but I never get too far.

Well where do you want to communicate?

So this cert is only $319 certification.comptia.org/certifications/network
is it worth it?

Depends what level you're on

Check out virtualhackinglabs.com/

What's better, software hacker or hardware hacker?

>inb4 both

Don't know, I guess IRC is the most hackerlike alternative.

>Found it online for free
You stole it.

Lets make a channel. What shall we call it?

That's the hardest question. I vote for something gay and courageous

No but Im down to join a IRC and we could see what happens. Whats the group. I dont even use IRC so be patient.

If i dont see a respinse ill see u in the next hackerman or oppsec general

Mind if others join in?

Check out irssi. It's super easy to use, right in the terminal.
Once installed irssi -c freenode
Temp channel name ##gentoomen

of course not, user

My classmates' facebook accounts lmao
not joking

Software obviously.

It doesnt like my vpn, I get "notice you need to identify via SASL to use this server" , connection lost

Nice, going to check it after lunch.

>Depends what level you're on
I just purchased a book to study for it. I'm going to take it in a month from now.