Jump to content


Dedicated Members
  • Content Count

  • Joined

  • Days Won



About digip

  • Rank
    -we're all just neophytes-

Contact Methods

  • Website URL
  • ICQ

Profile Information

  • Gender
  • Location
  • Interests
    Forum Rules - https://web.archive.org/web/20150402012023/https://forums.hak5.org/index.php?/topic/7499-read-me-first/

Recent Profile Visitors

74,983 profile views
  1. Everyone loves a mentor, but 99% of hacking, is trying something, failing, and then trying again. Best hands-on is by doing. Watching someone do it, still requires the muscle memory, and that only comes from repeatedly doing it over and over. Head over to Vulnhub, download a free VM and then follow the guides that come with them, even if they don't make sense at first. Once you have done a few of them, try one without using a guide and only go on your instinct and ability to recon and assess the objective. The link above that Rkiver gave will also help get you pointed to some fundam
  2. Nothing to exploit, but if you want to learn search for URL encoding and how it works.
  3. What desktop manager are you using? If Gnome with the default hidden taskbar, go into the tweak tool and enable the taskbar and programs to show in it. That is if I'm following what you're describing.
  4. Personally I use Opera, which has the benefits of the same base engine chrome uses, but without the chrome issues above. Also has built in ad-blocker, if you so choose, but I use Ad Block and Script blockers along with some other extensions. I can't see Opera limiting the same as Google is doing, considering their ad-blocker is built into Opera, it's an advantage built in at this point. I did use Brave for a while but somewhere I read that in doing so, you authorize them to use your data for other things, ie: they are the tracker you would otherwise be blocking with all the add ons like ad blo
  5. Boot off a live disc like Kali linux and use chntpw to reset it to whatever you want. You could also use Konboot to do the same thing.
  6. Try airmon-ng to put a network card in monitor mode and survey your location using airodump-ng. With only one network card, you'll have to test per channel one at a time, then stop and start the airodump-ng tool again with a new channel each time, since hopping on all channels, will give poor results and not work properly. Once you locate all the SSID's and can see the signal strength get stronger as you get closer, then try probing for your AP at each location. If anything comes back with a MAC address(BSSID) not supposed to be on your manufacturer list, this is most likely a rouge AP, but no
  7. No one is going to help you attack someone else's network. Please don't ask questions for help with these types of scenarios.
  8. The executable you created for windows, is it 32 or 64 bit? make sure it matches the victims system.
  9. In bridged mode, you're virtual adapter for the VM gets an IP on the network like a real machine would. It shares the main hosts adapter for real connectivity at all times in any mode, but in bridged, it can be treated like it's another machine on the network. host-only adapter, is so that the VM can only talk between the host machine(windows) and the guest machine(VM), and is isolated - not supposed to be able to see the rest of the network, even if on same subnet. In theory you could setup routes to reach elsewhere, but pretty sure the host-only setup will block this until you add in a
  10. digip

    Kali linux

    What desktop interface and theme are you using? Check the second one down -https://bugzilla.redhat.com/show_bug.cgi?id=1329311 May be a bug with the theme, try a different theme or layout
  11. digip


    needs more tinfoil. and bacon.
  12. digip


    WPA3, while being announced, still needs adoption and testing and then support for devices and OS's, which is probably still a year away or more. WPA2 is also still getting updates and patches. Hopefully I'll be able to keep my existing routers and just get updates to support WPA3, but I have a feeling vendors aren't going to be so nice.
  13. digip

    Kali linux

    Yup. We just put that up yesterday.
  14. Offsec has a sample pentest report on their site - https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf It's not however a template, but something to at least see how one company has theirs formatted. I think SANS may also have something on their site, but you'd have to google for it.
  15. I think they also had a storm, lot of rain? http://appleinsider.com/articles/18/01/10/2018-las-vegas-consumer-electronics-show-stymied-by-blackout-heavy-rain-and-flooding
  • Create New...