/hmg/ - Hackerman General

In /hmg/ we discuss pentesting, ctfs, exploits, and general being a hackerman.

Resources:
VM/CTFs:
overthewire.org/wargames/bandit/
>easy beginner bullshit
vulnhub.com/
>prebroken images to work on.
hackthebox.eu/
>super secret club
ctf.hacker101.com
>part of hackerone, a bug bounty program. Find flags, get private invitations to bug bounty programs

Tools:
kali.org/
>meme dragon distro but it just werks
metasploit.com/
>scriptkiddie starting point and swiss army knife

Tutorials/Guides:
abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
>From zero to OSCP-hero rough outline
youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
>IppSec, video guides for retired HTB VMs.

Certs:
eccouncil.org/programs/certified-ethical-hacker-ceh/
>CEH, only looks good a resume to non-technical in HR
offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
>OSCP, the big dick swinging exam, 24 hours to own 5 machines and a further 24 hours to write up a report detailing your methods.

Attached: 1549144505722.png (680x680, 888K)

Other urls found in this thread:

youtube.com/watch?v=s8lS2V5thhY&list=PL7gCgFw1RV1M6vJFX1RPDhgPZbg9qU3ub
youtube.com/watch?v=ZE3sz-3-LPQ&list=PL7gCgFw1RV1PgrZftw3kd23cLjobGEStR
youtube.com/watch?v=t41oSWQvWBM&list=PLXPlsHrZLiSaqyzlY0nlOZH3z3cSEh7KP
freetutorials.eu/
oooverflow.io/dc-ctf-2019-quals/
twitter.com/NSFWRedditGif

bumping with irc info

server; irc.rizon.net
channel: #Jow Forumsentoomen

bump
Also: FRIENDLY REMINDER TO GET YOUR ASS UP AND LEARN SOMETHING YOU LAZY FUCKS

The only general i read....learning wireshark is on my menu

I really feel sorry for this general

why

always ded and not enough attention from people skilled in this topic

yeah i suppose there's some truth to that. I might jump on irc in a bit

just completed irked on htb, will give hints if asked

Is that Art of Exploitation book not a good learning method anymore?

Anyone here who played Neverlan CTF, who solved the last binary challenge?

nah; bet it's ez tho

im so glad this general popped up, tired as fuck of this retarded 'mUH SIKRET CLUB DONT TALK BOUT HAXXOR SHIT FUCK OFF'

its a legit sub-topic of computer science that i wish was more discussed on Jow Forums.

speaking of, is there an easier way to identify if a wifi access point (WPA2 + WPS) is vulnerable to a pixie dust attack other than actually trying to break in with bully/reaver ? I know wash or airodump can show wps and it's version but it doesn't really help.

bumping

It's worth the read. Good foundational book

Sure. Watch the 802.11 traffic in wireshark. All the version info (including encryption scheme) is just flying around

what to look for though? that would signify a pixie-dust vulnerability?

bloated OP

No it i'snt
Bump

How do you exploit the Android apps that aren't chrome?

I've been autistically decompiling an apk for meme reasons but I have no idea wtf I'm doing

Don't die

Drake's Android Hacker's Handbook is good

youtube.com/watch?v=s8lS2V5thhY&list=PL7gCgFw1RV1M6vJFX1RPDhgPZbg9qU3ub
> playlist of San Bowne's series based on "The Web Application Hacker's Handbook".
youtube.com/watch?v=ZE3sz-3-LPQ&list=PL7gCgFw1RV1PgrZftw3kd23cLjobGEStR
> basically the same thing but this one is based on Practical Malware Analysis.
youtube.com/watch?v=t41oSWQvWBM&list=PLXPlsHrZLiSaqyzlY0nlOZH3z3cSEh7KP
> same shit just about the shellcoder's handbook
"Hacking: The Art of Exploitation, 2nd Edition"
> great for beginners that want to find more about low level
> freetutorials.eu/
download udemy courses (even tho 80% of them are shit) for free

Finished Help yesterday. If u need any hint let me know, user is tricky but great for learning about json / bypassing php filters

Reading through it now. It's a bit old though.

I received a mysterious .dta file from a sketchy coworker at my previous job last year. It's obviously from his "side gig". He was offering me a ludicrous amount of money if I could extract the data from it, but he wouldn't tell me where exactly his contact got it from.

I opened the file in a text editor and noticed it had strings containing peoples' personal info and names of magazines. This is confirmed when I used the "strings" command which seemed to show call center type logs for magazine subscriptions at the end. I'm guessing it's subscription info. I've since left the company due to some serious issues and rediscovered the file today in my USB drive.

I tried analyzing the file with TrID and it says it is 100% a VXD (Virtual Driver) file, which doesn't make a whole lot of sense since the file itself is known to be a database and is dated to 2017. I also used binwalk to analyze it and it came up with descriptions of:
>LANCOM EOM file
>LZMA compressed data
>Uncompressed Adobe Flash SWF file, Version 67

I extracted the LZMA and SWF sections, also with binwalk, but neither of the file types were valid, as in they did not extract or play in programs designed for their types.

Are there any other file type analysis programs I can use? Better yet, does anyone know of a database system that uses .dta files? I've already tried all the obvious ones (MySQL, SQLite, mongoDB, SATA, and others) and they were unable to open it.

Attached: 1549311988970.png (1065x182, 42K)

Madaras kuuun

he's useless

is this a general for wannabes who are scared of being in the same thread with cyberfaggs?

this general is basically just /sqt/,
wish it were a little more active but i guess there just isn't a lot of interest here.

WHY IS HE SO FUCKING UGLY!?

we have this discussion every thread, it should be how did someone so ugly get that job

I'll keep resurrecting this thread

Did you go through the helpdeskz way the port 3000 way, I need help with port 3000

Today I'll remind you: oooverflow.io/dc-ctf-2019-quals/

it used to be more interesting but everyone doing actual shit seemed to have fucked off

this general is dead and full of noobs
any irc?

i know the guy who runs this

Is he cute?

to some women i'm sure

What can I do with robots.txt? Doing a bug bounty

read it

Why would anyone use robots.txt?
It's not like crawlers are forced to respect it and it's like telling the bad boys where you have the important things.

Looking for resources for penetrating port 53 using UDP

>port 53
You mean a DNS service?
The only way I know is doing a zone transfer.

>Unsafe implanted medical devices
holy fucking shit

to reduce the load on your server by crawlers visiting meaningless pages

wuddup hakbOOOOOIIIiis
trying to run a rogue AP and every device i connect to it keeps disconnecting every ten or seconds, why it do this
here's the conf for the dhcpd:
option domain-name-servers 8.8.8.8, 8.8.4.4;
default-lease-time 600;
max-lease-time 7200;
option T150 code 150 = string;
deny client-updates;
one-lease-per-client false;
allow bootp;
ddns-updates off;
ddns-update-style none;
authoritative;

subnet 192.168.3.0 netmask 255.255.255.0 {
interface at0;
range 192.168.3.2 192.168.3.254;
option routers 192.168.3.1;
option subnet-mask 255.255.255.0;
option broadcast-address 192.168.3.255;
option domain-name-servers 8.8.8.8;
allow unknown-clients;

}

= bunch of lease bullshit spam saying shit like:
under 25% threshold, reply with unaltered, existing lease for

blah blah blah.. dhcp is up to date, everything's up to date, help me bros what am i missing

Attached: 1524750277647.png (300x250, 18K)

are you using hostapd ?

airbase-ng

try increasing 'default-lease-time'

Maybe one of you nons can help me with this one too for my pentesting. Found a bunch of hidden directories using Burp which show the js files, the css file, and the rpc directory. All the file names are encoded with things like f49bc78c9a65b9733ae3.js. I tried decoding with decoder and doing a second round of decoding but didnt get any interesting results. Don't know much about this.. I assume its base64 encoded?

It's probably proprietary and encoded.

Are you sure those are not just random names?
I wouldn't assume a filename is b64 encoded because of the '/' character, even with b64URL I think the '-' character could cause some weird things with wildcards.

doesn't change anything, even disabled, still just a bunch of this shit, it's like the client sending any data at all just disconnects it from the AP
22:10:17 Client [le mac addr] associated (unencrypted) to ESSID: "Free WiFi"
reuse_lease: lease age 88 (secs) under 25% threshold, reply with unaltered, existing lease for 192.168.3.2
DHCPDISCOVER from [le mac addr] (android-[censord]) via at0
DHCPOFFER on 192.168.3.2 to [le mac addr] (android-[censord]) via at0
reuse_lease: lease age 89 (secs) under 25% threshold, reply with unaltered, existing lease for 192.168.3.2
DHCPREQUEST for 192.168.3.2 (192.168.3.1) from [le mac addr] (android-[censord]) via at0
DHCPACK on 192.168.3.2 to [le mac addr] (android-[censord]) via at0
reuse_lease: lease age 89 (secs) under 25% threshold, reply with unaltered, existing lease for 192.168.3.2
DHCPREQUEST for 192.168.3.2 (192.168.3.1) from [le mac addr] (android-[censord]) via at0

I hate when I'm trying to do a buffer overflow and forget that I'm working with Python3.
What's the difference between Python2 and 3 that changes the "printed" value when working with hex?

The text is very readable from what you can see.

There’s 88MB of readable strings in the file.

Then extract that readable text, if that's all you want.
How much of it is unreadable?

does anyone here like over the wire very rewarding feeling after doing their ctfs

Python3 has better Unicode support, so there's something called byte strings. Learn the fucking language before LARPing like it's 1995 stack smashing season with it.

But using byte strings doesn't change the output, are you sure that's the problem?
What do you mean by "better Unicode support"?

I assume 131112KB is "Unprintable" based on the file sizes. Of course that doesn't count all the info that could be encoded by bytes (booleans, numerical values, dates?). There were some "interesting" strings that I'm sure indicates what that sleaze was after such as "Visa", "CC#", "Chargeback".

There's some trashy summaries of what appears to be debt collection calls and lots of repeats of "Sent To Consumerpositive Upse" all over.

I did manage to get 7558 emails with a regex. Maybe it will be worth it to send them all a mass email to ask if they remember who contacted them?

Attached: curse.png (475x286, 15K)

I really don't know what the cybersec general is even for, last few times I checked it it seemed to just be people shitposting about different ways to encrypt their porn and muh niche privacy-oriented social networks and email providers. How is that the same as this one?