Jump to content

The Power Company

Active Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Profile Information

  • Location
    Anywhere With Lights
  • Interests

Recent Profile Visitors

1,484 profile views

The Power Company's Achievements


Newbie (1/14)

  1. There are tons of CTF resources listed here https://laptophackingcoffee.org/doku.php?id=wiki:resources I've used a bunch of them, they are very helpful
  2. I would spend some time learning about grep, piping, and regular expressions. These are ridiculously important things to know, especially when trying to locate files, identify rogue processes on your system, and just generally staying in control of your system in a hostile environment, whether as an invading red team or a besieged blue team. For some reason very few "hacking" tutorials mention these, I guess they just assume you already know about them. There are many interactive tutorials for things like regex though.
  3. I heard about the Hak5 products from... Hak5 themselves. I watched a few of their tutorials on Linux stuff and here we are.
  4. Got it, script updated. I don't have my Alfa card on me atm, I'll test whether it works later. EDIT: Just tested it, updated script. It should work fine now.
  5. You right, you right. I changed the script to reflect this change, the old line is commented out just in case
  6. Hi guys, its been a while! I'm currently playing with some... legacy... hardware, and my old machine doesn't want to boot from a CD and is too old to USB boot. Luckily, I have a bunch of old floppies lying around, plenty large enough to fit Damn Small Linux or TinyCore onto! What is the best way to write/burn/enscribe a boot ISO onto a floppy disk from Linux? I tried to google it but all I found were windows utilities...
  7. I'm a bit late to the party but I've always viewed the term "hacker" as a sort of title, something bestowed upon you by others. A person can't really decide that they are a hacker, that isn't for them to say. It isn't about what you think of yourself, since that shit is all in your head anyway. It's all mostly about how other people view you. (just my opinion obviously)
  8. Just a heads up, you can get CPEH (Certified Professional Ethical Hacker) and CEH (Certified Ethical Hacker, up to v9) from places like LimeTorrents and The Pirate Bay, their lab exercises are very hands-on and are a great way to expand your knowledge.
  9. Only elite hackers can access the sticker set page ?
  10. Since the Hak5 stickers are no longer available for standalone purchase in the shop, I just had a great idea for a new product. Well actually not great at all but you know... Everyone knows that hackers love their stickers, and we often stick them to our laptops and other devices. So why not leverage stickers as a potential attack vector? A few of you may remember that concept iPhone case from a while back that claimed to absorb leftover RF signals to charge your phone (this concept is the basis for some wireless charging) but it charged the phone so slowly that it wasn't really the infinite power source it claimed to be back then. However... an entire smartphone is a very power-hungry device. What you could incorporate that same technology into a tiny IOT sticker that could, say, broadcast its GPS location or send deauth packets everywhere? It could use the extra static electricity from a laptop or 801.11 waves or whatever to slowly charge itself up, and once it reaches a certain threshold it will use that power to broadcast something or other, could be anything really, using a thin copper lining as an antenna. You could give these stickers out at conventions and other places, and all of the poor nerds who slap your sticker onto their stuff will be officially h4k3d! **rubs hands together connivingly**
  11. Check that your module is actually saved in a directory called /lib/modules/4.15.0-kali2-amd64 (i.e. try to cd into it). The directory may have a different name due to kali updates, in which case you simply must change the directory to the current one.
  12. You can find lots of cameras that are publicly on the internet through shodan.io
  13. May sound like a dumb question, but is your pineapple connected to the internet? Either through WiFi client mode or an Ethernet cable? (you can check by trying to load the news on the dashboard or checking for updates)
  14. Just got in, looks like a fun site!
  15. Why hello there, I was wondering what sort of software I should use for visual analysis of the XML files that nmap or masscan can generate. I want to be able to visualize the connections between several large networks in a fashion similar to zenmap's topology map, but zenmap has a limit to how many points can be plotted. Are there any good alternatives?
  • Create New...