/hmg/ - Hackerman General

In /hmg/ we discuss pentesting, ctfs, exploits, and general being a hackerman.

Resources:
VM/CTFs:
overthewire.org/wargames/bandit/
>easy beginner bullshit
vulnhub.com/
>prebroken images to work on.
hackthebox.eu/
>super secret club
ctf.hacker101.com
>part of hackerone, a bug bounty program. Find flags, get private invitations to bug bounty programs

Tools:
kali.org/
>meme dragon distro but it just werks
metasploit.com/
>scriptkiddie starting point and swiss army knife

Tutorials/Guides:
abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
>From zero to OSCP-hero rough outline
youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
>IppSec, video guides for retired HTB VMs.

Certs:
eccouncil.org/programs/certified-ethical-hacker-ceh/
>CEH, only looks good a resume to non-technical in HR
offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
>OSCP, the big dick swinging exam, 24 hours to own 5 machines and a further 24 hours to write up a report detailing your methods.

Attached: ultrahaxxor.png (680x680, 888K)

Other urls found in this thread:

artkond.com/2017/03/23/pivoting-guide/
exploit-db.com/
securityfocus.com/
software.intel.com/en-us/articles/introduction-to-x64-assembly
linuxjourney.com
cybrary.it/course/intro-to-infosec
cybrary.it/course/kali-linux-fundamentals
cybrary.it/course/ethical-hacking
cybrary.it/course/comptia-aplus
cybrary.it/course/comptia-902-2018
cybrary.it/course/comptia-network-plus
cybrary.it/course/comptia-security-plus
cybrary.it/course/comptia-cysa-2018
udemy.com/pentestplus
udemy.com/ccna-on-demand-video-boot-camp
youtube.com/watch?v=wBp0Rb-ZJak
youtube.com/user/professormesser
youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q
youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w
youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd
youtube.com/watch?v=vrh0epPAC5w
pastebin.com/j0WVfDif
mediafire.com/download/2kczrn29gt6fdp3/Introduction to Firewalls.rar
mediafire.com/download/mnulcdbw817f9q0/Metasploit Basics.rar
mediafire.com/download/lhajdkufn9oi5ta/Cisco CCNA Security; Firewalls and VPNs.rar
mediafire.com/download/yraijpmuzoa1zpn/Cisco CCNA Security; Introduction to Network Security.rar
hackthebox.eu
hackthissite.org
overthewire.org
picoctf.com
vulnhub.com
dvwa.co.uk
pwnable.tw
certification.comptia.org/certifications/security
certification.comptia.org/certifications/cybersecurity-analyst
certification.comptia.org/certifications/pentest
cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-routing-switching.html
python.org
youtube.com/watch?v=rfscVS0vtbw
amazon.com/dp/1494295504/ref=cm_sw_r_cp_awdb_t1_2cXvCbPQCA1NC
sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
blogs.sans.org/pen-testing/files/2013/10/NmapCheatSheetv1.0.pdf
loggly.com/wp-content/uploads/2015/05/Linux-Cheat-Sheet-Sponsored-By-Loggly.pdf
twitter.com/NSFWRedditGif

Just got started on Bandit and hoping to finish it within the next week. Also taking a software vulnerability course at my college that seems like it could be cool, albeit a little too abstracted thus far.

As a sidenote: Should I just bite the bullet and dual boot Kali onto my laptop instead of running it through a VM?

Attached: eggsecutive.jpg (2000x2000, 315K)

dual boot it NOW, on a VM there are many options that arent usable, or retarded as fuck to configure, and you will use your full power of your machine, go on fren

Will do user, I figured I would have to go that route since I was experiencing a non-negligible amount of stutter since my daily is a pretty weak gpu wise, I just needed the peer pressure to make the leap hehe

I run kali on a vm and just give it 4gs of ram and a little extra storage, no problems

Any anons want to explain the hackthebox reddish to me? Ippsec just finesses that box and after 10 min im totally lost. Seems like high level networking....whats some good resources for networking for being a hackerman? Should I start with comptia network?

Took a quick look at ipsec video and, at least for me, it seems that he is over complicating things for the sake of teaching the thought process.
I remember that it had two main problems you had to deal with:
1. Lack of tools, you're forced to write shell scripts to do the scanning (Ipsec seems to do that), or you can just upload your favorite tools for the job. Hint: You'll need static binaries.
2. Port forwarding, you're forced to learn port forwarding to pivot between machines, I wouldn't call it high level networking but it's a very useful skill. artkond.com/2017/03/23/pivoting-guide/
If I had to make a short explanation about the box I would say: "Get a shell, upload your tools, enumerate, pivot to the next box".
At least that's how I did it, I'm pretty sure you could even automate the exploitation just using the webapp but I was too lazy to try it.

I've lost the motivation to learn, what things can help to recover it?

synthwave and drugs

What are some good sites that are useful for keeping track of the latest vulnerabilities that have been discovered?

Porn

your fucking nigger ass, it just keeps you depressed, go nofap, it helped me

Apparently I'm too much of a brainlet to use hashcat. Anyone care to help?
I'm trying to crack hashes created with this python script:
import hashlib
import binascii

password = input('Give a password to hash: ')
salt = b"2213dcd3820c18c559cc389c8bd22e6b3b0b3f410f01ecf1aac95faf1716e169"
pwdhash = hashlib.pbkdf2_hmac('sha512', password('utf-8'),
salt, 100000)
pwdhash = binascii.hexlify(pwdhash)
print((salt + pwdhash).decode('ascii'))


For testing I'm trying to crack the hash when you input "foobar" into the program.

I wrote this python script to put the hash into the right format for hashcat:
import base64

with open("passwords.hash") as f:
content = f.readlines()
content = [x.strip() for x in content]

f = open("passwords2.hashes", "a")
for hashes in content:
beginning = "sha512:100000:"
salt = hashes[:64].decode("hex").encode("base64")+":"
password = hashes[64:].decode("hex").encode("base64")
hashCatFormat = (beginning+salt+password).replace("\n","")
f.write(hashCatFormat+"\n")


I also created a textfile foo.txt which just reads "foobar" for testing.

Then I run:
/hashcat -m 12100 -a 0 -o cracked.txt passwords2.hashes foo.txt

but I cannot recover the example hash. What am I doing wrong?

You get depressed because you're a namefag, that has nothing to do with porn.

I'm a total scrub without a couple days worth of experience with C++ am I in for pain if I try and jump into OSCP?

I usually just use jtr but try just using hex format instead of base64

Yes, you'll probably want to kill yourself for wasting 800 bucks.

This just gives a Token encoding exception. Thanks tho, I'll try jtr

why not just use the liveUSB?

is Abatchy a good place to start then?

Mind trying it was jtr? Apparently it supports pbkdf2_hmac with sha512 but I can't get the format right...

you need jtr_jumbo version(startpge is your friend); honestly its hard to tell you what your problem is with hashcat w/o seeing stderr, but I'm guessing something to do with the hashfile being formatted incorrectly.

A what? Do challenging vulnhub or difficult hackthebox.eu vms if you want something close to the oscp. There was a pdf floating around from an older offensive security course that gives you a basic idea what to expect. Search the Jow Forums archives.

the blog in the OP, ye dingus

I tried hotwiring my Van this morning unsuccessfully for 20 minutes until i realised the fucking battery was flat


How's your morning?

Disagree with this completely. Give an example of something you can't do on a VM.

I have jtr_jumbo. It just says
$pbkdf2-sha512$100000$saltInBase64$hashInBase64 (can't post full thing since it thinks it's spam)
is the wrong format. With hashcat I'm not getting any errors, it just doesn't find the password. So yes my hashfile probably is formatted incorrectly, the question is how. Any ideas?

bump
bring
up
my
post

Wheres a good resource on using netcat? Ned to learn

unironically, just get arch linux, download the archstrike repos, and install whatever tools you want. If you're going to use kali though, just dual boot it. Not worth getting it to work on a vm

Why it works fine for me

kinda slow for me on old hardware. if it works for you, however, then I guess you're good to go.

Fuck, its been a while since i have seen this bread. What is everyone learning?

Kali is a meme, use parrot for an easy to use, debian based, pentesting distro

What made you want to start learning pentesting in the first place, user? Find a part of pentesting that you do still enjoy, and teach yourself how it works.

exploit-db.com/
securityfocus.com/

Learn how to teach yourself, and use man

This. arch is based.

This general gets posted nearly everyday glowinthedark/rebbit man

>you dont waste that much time on Jow Forums
>you must be from leddit
Well memed, friendo

>You dont waste time on Jow Forums
So dont, leave

To be fair, wasting time looking for this dead general everyday instead of learning is very dumb.

No, i have a free day today faggot

Do the VM, INSTALL KALI LITE and install what you need, there u go

INSTALL PENTOO

It literally sounds like peepee in Portuguese

>Learning
Learning what, which distro is the best?

>Learning what
Not gonna make it

>Can't understand english
nice try pajeet

Not really sure what you're talking about so I'll just call you a retard. Retard.

no retard, he isn't a retard, i'm going to call you retard, retard

I received a mysterious .dta file from a sketchy coworker at my previous job last year. It's obviously from his "side gig". He was offering me a ludicrous amount of money if I could extract the data from it, but he wouldn't tell me where exactly his contact got it from.

I opened the file in a text editor and noticed it had strings containing peoples' personal info and names of magazines. I'm guessing it's subscription info. I've since left the company due to some serious issues and rediscovered the file today in my USB drive.

I tried analyzing the file with TrID and it says it is 100% a VXD (Virtual Driver) file, which doesn't make a whole lot of sense since the file itself is known to be a database and is dated to 2017.

Are there any other file type analysis programs I can use? Better yet, does anyone know of a database system that uses .dta files? I've already tried all the obvious ones (MySQL, SQLite, mongoDB, SATA, and others) and they were unable to open it.

Attached: inside_db.png (1065x182, 34K)

It's probably a database or spreadsheet encapsulated in another format. If you don't know where to go from here, it's probably a lost cause.

If you check for recurring data and find it (repeated names for example) it might mean it's not compressed, which could mean you could extract useful data just by exporting strings.

Tools I'd recommend are 'file' 'lsblk' 'dd' and 'xd'
I'm not going to try and explain the process I'd use because I have nothing to gain, like I said, if you don't know where to go it's probably a lost cause. The fact that you can find names in the file means it's probably unencrypted, and possibly uncompressed, which means reading it should be a piece of cake. Worst case you'd have to reverse engineering a proprietary data format which isn't hard just time consuming, and doable with nothing but python (or dd xd and cat if you're crazy)

I don't think it's compressed either since I can plainly read names, addresses, magazine names, and more.

I'm honestly just curious what the fuck is in there and why that sleaze was willing to pay so much for it. The reason I want to track down the original program is in the off chance there's something interesting not in the plaintext.

Well id use Unix 'file' to check the magic bits, and also just read the file header and Google it. A vxd is a somewhat generic type of proprietary file, and if it has that header it might be another proprietary format unrelated to vxd. If it is a vxd, you need to track down the driver to read it. It's likely that you can find additional headers inside the file for whatever the true format is (if it's actually a vxd file, which is a type of container or virtual disk), if you can find additional headers you can simply read from those headers until the data begins to appear corrupt then assume you've found the end of a file.
A crude way of operating on this file could be to run file recovery (or 'undelete') software on it. To do that you might have to register the file as a device, on Linux you do this with the 'losetup' command which let's you point a loopback device to this file. I don't know how windows and os x do it.

There are also plenty of programs that will dump all the strings of a given format (ASCII, utf8, etc)

Also keep in mind that many file formats are unencrypted but nevertheless require a password to open in their application (an example of this is Microsoft's JET format which Access uses)

Nvm figured out how to do it with hashcat

>What is everyone learning?
the absolute basics of pentesting

Hello /hmg/ I beginner with RF, and I am attempted to clone a garage door at my work so I have my own. I recorded the signal, twice, for each button. Theyre near identical but near the end of the signal seems to be slightly different (maybe its still within the microsecond tolerant threshold?)

Anyways I noticed this garage door opener has dip switches, and was watching samy kamkars video on garage door openers and the one he was talking about dip switches.

My question is, how can I tell what type of encoding (if any) is being used, and if garage door openers are using dip switches (this one seems to be all in the down position) could it still be using rolling code, or is it fixed code?

i'm doing meme exploit ctfs for funsies
m-maybe i'll do something worthwhile

Attached: awoo.png (450x450, 213K)

.

kali? can't I just install the pentesting tools on my dd if it's already linux?

Yes, kali is just a linux OS with installed tools.

anyone here actually write exploits? i have no idea where to start...

Different kinds of exploits. Which are you looking at to learn?

android APKs and windows binaries like a fag at the moment

How do I write a privilege escalation exploit to get boyfriend access to a cute girl?

money works well but you gotta shill out time for that proprietary shit

I know the main difference between 32bit systems and 64bit systems is the memory space, but how does that translate for exploit writing? All the books I find are for x86 arch and intel asm (mostly this).

they also have different calling conventions
software.intel.com/en-us/articles/introduction-to-x64-assembly
AMD64 has a lot more registers than x86, so they use them to pass arguments to functions.

on a more fundamental level, the 2**32 times larger memory space means brute forcing to find memory addresses for shellcode isn't feasible, and you therefore need an information leak in addition to a memory corruption vulnerability

i made this image if you guys want to use it for next thread btw

Attached: 4c.png (1034x1212, 537K)

>Are there any other file type analysis programs I can use?

Binwalk?

Well in linux if you used Strings command, it will extract the strings and you can go through it.

first u need to find a bug. then u can turn it into a primitive if it's reproducible then u can start playing around in yr favourite scripting language

cute please talk about what yr doing

Attached: memeshit.jpg (474x700, 43K)

god I haven't exploited in quite some time
haha

Attached: fucken.jpg (970x826, 28K)

your boyfriend could stop being a fag and dating you for one

Here is some of the big areas you'll need to learn:

Networking / Network security

Linux / Windows (linuxjourney.com is amazing) I learned a ton by creating my own custom Debian based Linux Disro.

Forensics

Cryptography / Stenography

Malware / Malware analysis

System hardening / system security

Privacy techniques (Being safe, Tor, Tails, what you share on social media)

Exploiting services, exploiting machines

Wireless attacks (WEP, WPA, WPA2)

Common vulnerabilities, and exploits

How to use google. (Like dorking, Shodan, using online resources)

Maybe some basic python and scripting

Basic security concepts like NIPS, NIDS, SIEMS, mitigation, security policies.

Common ports and services (You can find flashcards on Quizlet)

cybrary.it/course/intro-to-infosec

cybrary.it/course/kali-linux-fundamentals

cybrary.it/course/ethical-hacking

cybrary.it/course/comptia-aplus

cybrary.it/course/comptia-902-2018

cybrary.it/course/comptia-network-plus

cybrary.it/course/comptia-security-plus

cybrary.it/course/comptia-cysa-2018

udemy.com/pentestplus

udemy.com/ccna-on-demand-video-boot-camp

youtube.com/watch?v=wBp0Rb-ZJak (The Complete Linux Course: Beginner to Power User)

Also check out

youtube.com/user/professormesser

youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q (Hackersploit)

youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w (LiveOverflow)

youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd (Messer, Networking)

youtube.com/watch?v=vrh0epPAC5w (Animated full Network+ course)

www.reddit.com/r/netsec

www.reddit.com/r/netsecstudents

www.reddit.com/r/comptia

www.reddit.com/r/linux

150 dumped full courses for free

-pastebin.com/j0WVfDif

(my favorites)

mediafire.com/download/2kczrn29gt6fdp3/Introduction to Firewalls.rar

mediafire.com/download/mnulcdbw817f9q0/Metasploit Basics.rar

mediafire.com/download/lhajdkufn9oi5ta/Cisco CCNA Security; Firewalls and VPNs.rar

mediafire.com/download/yraijpmuzoa1zpn/Cisco CCNA Security; Introduction to Network Security.rar

Practice the skills you learn with CTF'S (Capture the flag)

hackthebox.eu

hackthissite.org

overthewire.org

picoctf.com

vulnhub.com

dvwa.co.uk

pwnable.tw

Start researching and studying for certifications, COMPTIA, CISCO, REDHAT

certification.comptia.org/certifications/security

certification.comptia.org/certifications/cybersecurity-analyst

certification.comptia.org/certifications/pentest

cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-routing-switching.html

The intro/easy certs are

Comptia A+ (Hardware, basic computers stuff, cables and stuff)

Comptia Network+ (Networking, network topologies, types, subnetting, vlans, dmz's)

Comptia Security+ (Malware types, threads, attacks, policies)

A bit hard and better certs

Cisco CCNA Cyber ops

Comptia CYSA+ (Security analyst stuff, the security+ but much more in depth)

Comptia Pentest+ (Pentesting tools, methodology, steps, ect.)

eLeanSecurity eJPT (junior pentesting cert)

ecouncil CEH (Good for DoD jobs, kinda outdated tho, hacking stuff)

Now it gets pretty advanced

Comptia CASP+ (advanced methods, concepts, techniques regarding security)

OCSP (Oooh the cool kinds have this one, pentesting galore < msut have)

Comptia CISSP (HR and people love this one, high level cert)

GPEN

GIAC

My recommended pathway is Security+ > Cysa+ > Pentest+ > CEH > CASP+ > OCSP > CISSP

Here is Comptia's recommended pathway .PDF

Start to learn a programming language

Python is highly recommended for people who are looking for a first language because:

It’s easy to learn.

It’s great for scripting.

It can be used for just about anything.

python.org

youtube.com/watch?v=rfscVS0vtbw (4 hour nice intro to Python course)

Depending how deep you go you might need to learn C and or Assembly, both are commonly used for malware analysis, reverse engineering, binary exploitation, and exploit development. This also will require you to learn things like GCC, GDB, IDA, Hopper, and all the fun stuff. But this can be really really hard to learn, but is incredibly rewarding.

I can always recommend the Red team Field manual.

amazon.com/dp/1494295504/ref=cm_sw_r_cp_awdb_t1_2cXvCbPQCA1NC

Some nice cheatsheets I have printed out.

sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf

blogs.sans.org/pen-testing/files/2013/10/NmapCheatSheetv1.0.pdf

loggly.com/wp-content/uploads/2015/05/Linux-Cheat-Sheet-Sponsored-By-Loggly.pdf

nah -- you don't need certs

Will wpa3 make wifi virtually impossible to crack?

Attached: 1507090500671.png (699x699, 639K)

For me, it's gruyere.

so a couple felonies for corporate espionage should do the trick or?

Where has everyone been why isn't this a constant thing like /agdg/ is? Can we start up a discord? What's everyone learning? Is there an irc channel yet? What is it if there is one?

heres an idea why dont we make an irc server and constantaly attack it

Look at it this way, a new protocol means new flaws on implementation.

vm machines are easier to setup on our own user

An irc was already created and it died, because there's a big difference between hacking and game development, for example, showing what you have done is not as easy or exciting as videogames.
There's also the difference between the people that wants to do it for profit and the people that wants to do it for fun, and also the fact that time used posting here is time not used learning new things.

I'm making one then what do we call it?

Hackers Of Mighty Omens /homo/

fsociety

Attached: 1470063664541.jpg (377x667, 44K)

Jow Forumsentoomen

I would really like to join a Jow Forums cyber security discussion even if it's outside Jow Forums but idk where the IRC is and this thread didn't help too much.

My background: failure computer science major but learned a shitload, and now going back to community college for a cyber security degree. Just more interested in security in my 30s than I thought I would have been in my 20s and love learning. Pls invite to any discussions.

I made a irc called #Jow Forumsentoomen on rizon. I use pidgin and I go and add irc.rizon.net and then just join #Jow Forumsentoomen

so the object was to have a place people can congregate and provide something that anons and have fun with by attacking and defending.

#Jow Forumsentoomen is up!

ok I might join when I go to my bed

I'll only join if there are girls

girls are cool

I'm a girl

I-I'm cool right?

*pretends to be semi-chad* Yeah I guess you're ok

just talk the talk and have a decent CV with IT experience under your belt. people can tell if you're the real deal.
when I applied for my first IT job (in software development for a university) -- which wasn't security I already had experience doing unpaid/volunteer IT tech/web dev/ security work for a few local businesses and charities.
but my emphasis upon applying was always on my interest and experience writing exploits and participating in CTFs in my own time; eventually I managed to work my way into a security analyst role at the same establishment after only a year of working for them.

Attached: 0.jpg (222x573, 24K)

Ok guys need some brainstorming here.

Roommate owns these zmodo brand 720p cameras, and a zmodo doorbell, quality is actually pretty good

Question is I like these little cameras, I might buy some if I get my own place, but I dont want these cameras reporting back to ching chong, and my question is

What can I do to where I can still remotely view these cameras away from home, but still cant talk to ching chongs.

I was thinking of making a separate network, just a router, and have the cameras connect to it. Then I would ssh into the router over wifi and have ssh connection routed to me to view the feed.

But that seems it will still connect back to the ching chongs. SSH wont be open all the time so IDK

don't connect it to the internet or root it and set up some nice iptables rules. you could alternatively configure your router to do the same if it has decent firmware.
like you suggested; using a jump box might be one of the easier methods if your router sucks or an exploit for the device isn't readily available or infeasible to produce.

Use a firewall.