Stats: 3,174,593 members, 7,892,434 topics. Date: Wednesday, 17 July 2024 at 11:38 AM |
Nairaland Forum / BackTrack6's Profile / BackTrack6's Posts
(1) (2) (of 2 pages)
![]() |
Djangocode: The questions are meant to be solved there and not here sir. |
![]() |
The challenges are not so hard jare. ![]() |
![]() |
RoyalBoutique: https://www.nairaland.com/3194361/solve-these-challenges-join-cybersecurity#47020966 |
![]() |
... |
![]() |
This is a nice one. |
![]() |
For all of those saying they want to learn how to hack, start reading from the first post of this thread. So, anybody cracked idhack.net yet? |
![]() |
Sirex: I have just a little experience in programing with Php, HTML, Javascript, Batch, and Java. But I have barely any experience in hacking, and I would like to learn how to hack. So what is step one for learning how to hack? I am really interested in network hacking, and web exploitation. I've also been looking for a series of tutorials for hacking so posting those would be much appreciated. Read from the first page of this thread. Hackers are learners. |
![]() |
Happy new year guys. How has hacking being? For me, I believe some knowledge on networking is very important. As just-thinking has outlined, you don't need to be a guru in networking and programming before u can be a successful hacker but I still maintain that networking skills is necessary. This is a new year, what projects are we up to (if any)? I stumbled upon a piece by some Indonesians. The owner of the group of hackers, an Indonesian, says that his group is made up of ethical hackers and their duties involve exploiting vulnerabilities and informing the organizations involved, with a view to patching them. However, to join this group/company, he says you must crack his site and get the message behind the picture before you can become one of them. I looked at the entire thing and concluded that only Indonesians can benefit from being employed in the company. But I looked at it as a mean of honing our skills. We can get involved and up our game by trying to crack the site to get the message behind the picture. Phew!!! My people, I have tried but the thing no wan gree. I have even gone through the source code but I can't see a link (it may be there sha). The site is idhack.net Let us see who can crack it amongst us. Slyr0x pointed us to the CTF challenge and he gave us the solution on how he was able to capture the first flag. Let's get busy with this. Just-thinking, Na me sent u request with ...23F0. Happy new year guys. |
![]() |
Monday |
![]() |
Tolustar: Sincerly, I didn't get ur message requesting for my FB ID. Well, I guess some of us will want to keep our anonymousity for now ![]() |
![]() |
@Tolustar, did u send me a mail I didn't reply to? |
![]() |
Another point I will like to raise here is the issue of those who come here and say they are interested in dis and dt and that they should be send this book or that. My advice to them is that they should use Google a lot. Search, search and search. U will find so many. U can then come here and ask for direction on which u could begin reading. Like me I hv a bias for network security and I asked a friend in India (he once discovered a vulnerability in Adobe and informed them) he told me since it was network I work I am intwested in, I should knw c++ and python. But what do we have? We see one person wanting to learn evrytin. Ahn ahn...u be ashawo abi u be china fone WEy get everytin? Take time oo. For newbies, don't be spoon fed. The spoon is dere already...begin feeding urself. White Hat made a proposal, wats d house saying abt it? |
![]() |
I very much agree with Just_Thinking. To become an IT person, conduct personal researches and teach yourself. Wit dt u can gain experience. I had an email conversation wit someone (won't mention his name) who is a speaker in BlackHat Conference (those who knw this conf will knw Defcon too). I stumbled upon him and did some footprinting and got his email. I told him I was interested in computer security with a bias in Networking. He gv me some advice and also said that setting up a lab and practicalizing d stuff u knw is enough to count as hands on experience (I doubt if this works in this country dt like seeing certificates upon certificates). My point is dt personal teaching will tk u places no doubt abt that. I will always repeat that without Passion u are going no where. I am a social scientist interested in security, with that I hv channelled my attention to computer security and without bragging, I can comfortably sit a computer science graduate and teach him because I hv had discussions wit some of them. As Just_Thinking advised if any of u sees an opportunity don't hesistate to grab it oo. God bless us as we keep being White. ![]() |
![]() |
Or is it because I am using VMWare instead of Virtual Box (I don't think so). I hv noticed that everybody here uses VB. |
![]() |
You guys rock. @Tolustar, weldone for ur Kali installation but note that installation is nonsense without u using it. For me, I hv been lazy with my BT5 sef and e dey pain me oo gaga. For MITM attack I think I will prefer Cain & Abel. Since I run BT5 in a virtual machine, I hv not really enjoyed Subterfuge. I don't know if it has anything to do with my network adapter in my virtual machine (I used VMWare). I have actually not settled to understudy whether it is better the adapter is on NAT or Bridged, to enable me enjoy some features of BT5. Dons in the house over to una. |
![]() |
Good morning all. Abeg dons in the house, smtin dey wan confuse imelf no be me. Oyibo say make we disable Java for our system as the thing get vulnerability. Though it is cool but I don't seem too good with the whole thing. For example AngryIP scanner is a very good tool that tells us which node is live on a network. VegaSetup is also another tool used to check vulnerabilty on web apps. One common thing with these 2 tools, among others, is that they require Java to first of all install properly before being used. I have tried AngryIP scanner and I can vouch for it, though I haven't tried Vega yet. Why Java dey do person like this or why winch dey follow Java. Any write up one goes through, they'll advise that Java be disabled. My people abeg help me put mouth for this matter. @Tolustar, u wan install uncle Kali as a starter. No let am break ur head oo. Just teasing mahn. Keep it up. I repeat, uncle slyr0x, we still dey follow u oooo ![]() |
![]() |
Slyr0x: Not yet boss. |
![]() |
Slyr0x: As promised, here is the video of NotSoSecure's Capture The Flag Competition Walk-through Nice one. I just read through your approach to catching the flag and I can indeed say you're good. We dey follow you, boss. |
![]() |
Javanian: @Slyrox pls reply my emailWetin u dey ask for room? Ask ya question for parlour here. |
![]() |
For those who were not able to participate in the competition organized by NotSoSecure, which slyr0x informed us of here, you can visit this link to see how the flags should have been captured. Hacking involves patience indeed. http://gilgalab.com.br/sqli/security/2013/10/27/Write-up-NotSoSecureCTF/ 1 Like |
![]() |
@slyr0x, do u hv ur Kali Linux in virtual machine or as a host? I intend changing my BT5 from being in a VM to being a host. |
![]() |
@slyr0x were u able to participate in the notsosecure capture the flag competition? I wasn't able to. Phew! my rainbow table is almost done...94% |
![]() |
djdroydakkount: Evening fellas an well done on dis tred so far, it's been very helpful. Pls I wanted to ask if i can setup a virtual lab on a system with 2gig RAM, till wen I'll b able 2 upgrade cos Have read it on a couple webpages aπϑ here too dat 3 is d recommended RAM siz.- just wanna know d consequence. Ŧђɑ̤̥̈̊п̥̥̲̣̣̣kƨ a lot. N.B: I already run ubuntu in vtualbox on windows 7. Hmmmm, what a question. You already run a virtual machine and you're still asking. The only consequence you will encounter is that all running OS will compete for the RAM but since u run just one OS along with your host OS, ur 2gig RAM can manage them. For me, I use a 2gig RAM system with 3 OSes running in my virtual machine. So you're good. |
![]() |
just_thinking: i will try that. av u check the android network exloploitation toolkitI don't have an android device, but I have downloaded the file for onward installation when I get an android. Ehn, anybody wit idea on operating cgwin especially running kismet in it. Will appreciate. |
![]() |
just_thinking: av also tried creating rainbow table with cain but apart that it said it will take one month to complete the size itself is aroung 20Gb. i just wich i can get somene who av it and just copy it. just_thinking: av also tried creating rainbow table with cain but apart that it said it will take one month to complete the size itself is aroung 20Gb. i just wich i can get somene who av it and just copy it.why not try creating it urself. if u wait to get it from someone u may hv to wait for long sir. i think what mks the table so large is length of password we want to create d table to crack. |
![]() |
@don crust, if what u downloaded is a 64bit ubuntu, it definitely will not install on a 32bit system. Ophcrack is a password cracking program that makes use of rainbow tables (cryptanalysis) to crack passwords. Do we know that with Cain & Abel, we can create our own rainbow tables to crack password with. It takes a long time to create one, but I think it's worth trying to create one. Mine's taking like forever to be 100% created. |
![]() |
just_thinking: you can also use cainYea, I actually used Cain to crack mine. Just asked. I will try Slyr0x's mthd. Something has been popping up in my mind these few days. Since we are a bunch of Whites, with plenty of Blacks and Greys here (this can't be disputed), I was thinking if some hacking competitions can come up here just in order to help the neophytes grow. Competitions that involve some steganography, hex editing etc. Wetin una think? |
![]() |
@Doncrust, scroll up and find out. Anybody cracked Windows SAM file? |
![]() |
Hey kiddie, I was talking about catchin packets wirelessly from BT5 running in a virtual machine. If it were running as a host OS there would be no problem with the wireless connection. |
![]() |
Thanks @redrumz. |
![]() |
Hi pple. Dos anyone have an 1dea of a wireless card one could use for wlan stuff with BT5 running in a virtual machine? |
(1) (2) (of 2 pages)
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 43 |