Jump to content

articzebra

Active Members
  • Posts

    12
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

articzebra's Achievements

Newbie

Newbie (1/14)

  1. For a start, DON'T go installing anything else from unknown sources, on here or off. That would just be suicide. I'm not completely aware of how Apple smartphones work primarily because I've never had one. What I do know however is there is a feature built into Apple smartphones which allows you to track devices based on their phone ID (or something like that?). I don't know the specifics but I read somewhere that if you can hold of the device unique number (?) you can effortlessly track it's location. Again, this is not bona-fide factual information I'm providing but a clearly tangled assumption based on articles I've read. I don't know if it was a temporary vulnerability and has since been patched or whether it's a feature built into iPhone. Also, it's not difficult to imagine that you've been infected with spyware. From what I'm aware and again I'm no expert with Apple in the slightest, you need to jailbreak an iPhone in order to really do anything malicious with it. I'm guessing it may be possible to jailbreak it remotely just like you can root an Android phone remotely, or at least I've read somewhere. The limitations on tracking someone with an iPhone that is NOT jailbroken reduces the range and effectiveness to which someone can do anything malicious and I'm guessing this is a built-in security function. Again nothing I'm saying is concrete and so you are best off doing your research. However, if someone is capable of tracking you no matter what you do, it's safe to say someone has purposefully targetted you in some way or another with the sole purpose of being able to persist in their tracking. That in and of itself should be easily guessed considering that any sort of spying with the abiity of persisting beyond a blind attack shows that whoever is behind it is continuing to attempt to track you. Some basic interventions would be to change your phone number, completely format your phone and even try and wipe it completely with some sort of software that will not just perform a surface format but will purposefully ensure that all of the selected partition has been completely wiped, and replaced with useless data that cannot be recovered very easily. For example with Windows you have special software like DBAN that will not just format your hard drive but COMPLETELY nuke the motherfudger to the point where recovering data that was once there becomes pretty pointless. The same can be said for Android devices where you can get software that can securely remove data from the device. The only downside I'm aware with most smartphones these days, they are designed by default to have data made recoverable. I know governments have pushed quite hard to have the ability to backdoor smarphone devices and find ways in and I'm guessing this would also extend to the ability of data being recoverable even if you think it isn't and so - how can you be sure that your data has been wiped and that your device has completely been reset? I don't think you can, to be honest. One option would be to just get another phone. I'm sure that being stalked and spied on by someone else is considered a crime in your country and therefore it wouldn't be difficult to strike up an agreement with your phone provider and either get their technicians on the job and/or get a new phone altogether. Then you would have to choose new accounts across the board; all the way from your email addresses to passwords for these email addresses. You may even have to wipe any devices you have at home like your laptop, desktop etc because it may be possible the person has simply gained access to your home network and then been able to intercept traffic on it and got in the middle of this data and manipulated it to his/her advantage. It may very well be a game, or a prank, or something that isn't serious at all. The question is; do you want someone being able to freely spy on you? A global reset would be advisable. I would change ALL my passwords, set a LONG and difficult password for my home network, disable WPS, disable auto-login on my browsers, securely erase any hard drives, install a decent firewall on my home computer, decent antivirus, install recent software updates and patches, prevent any inbound connections to my home network, wipe my phone and potentially get a new one and at the least change the number. You should also report this to the police because this is a crime where I'm from (UK) and could be considered harrassment/stalking and potentially come with some sort of hacking charge as well combined. What may have started as a joke by one of your friends could actually be something a lot more serious depending on how you look at it and what sort of relationship you have with this person. You could also setup canary tokens on your home network ie your laptop, desktop, NAS, phone etc. These tokens will trigger whenever someone accesses the same directory, loads an image or views emails etc. They can be really handy in identifying an attacker or at the least knowing when you've been compromised. You could lay these tokens around and create a honeypot whereby you can collect evidence of a breach regardless of whether you can identify the attacker. If you know someone IS breaching your devices then you can take it further and report it but also take the necessary actions. You could also lock down your home network and assign strictly known MAC addresses to login. You can do this through your router. You can also use VPN on your mobile device too, this will encrypt your connections. You can also disable your location, location settings and find ways to prevent your location leaking. Smartphones these days are treasure troves for personal information like location data and the like and it's why governments love breaching them, and they can do very easily from what I've read. Anyway, hope this helps! Appreciate it's a lot and may be convoluted but hope it helps :) I'm no expert at all and so don't take my words for gospel.
  2. I've been using some of the work done by Daniel in my lab environment and I some of his work has been featured in popular frameworks and scripts. Thanks for the share!
  3. Hi guys, I think I've got to 'that' particular point in my journey to understand penetration testing and ethical hacking. And it's led me to the belief that many of the frameworks and automated scripts are likely to be flagged by antivirus/IDS. How I came to this conclusion? I've tried out many of the frameworks from Veil to Metasploit and although they are all incredibly useful and are by no means obsolete in their usage and potential they do end up being flagged A LOT by virus scanning. I do my scanning with scanners that are known not to share results, by the way. That being said, I'm beginning to wonder if learning how to program will make the process of exploiting a system easier. My question is; Will AV detect a program based on it's behaviour? If so, is it likely to flag any program which acts suspiciously? I'm aware that modern AV uses more than static detection and depends on heuristic analysis as well as sandboxing etc. So, how far does the knowledge of programming go towards developing and compiling something which is likely to evade AV detection? I mean, obviously it has to depend on certain factors like how well programmed your malware is and no doubt how obvious it is at performing certain actions etc. Can anyone who develops/compiles their own code enlighten me on this area a little more? I've read articles online pertaining to highlight the advantages of coding your own programs and then executing them but I've found so far that none really give any sort of information on the advantage compared to using automated scripts and frameworks alone. If I was to begin learning how to create a backdoor in Python, compared to an automated backdoor made in Metasploit or Veil, what are the chances of it being detected? Also, how would you factor in utilizing common evasion techniques like packing and crypting and file pumping etc when these tools are usually, from my knowledge anyway, likely to have been reverse engineered? Thanks guys!
  4. Choosing a VPN provider is hard if you want to have a greater level of privacy. Many are free and they fund their existence through marketing and other means which sometimes means they may sell your information on to make a profit. Some will have sketchy privacy policies and there are many free VPN providers today popping up which won't be as sincere as others. Some will claim they don't keep logs but I can bet that most do and because it's hard to prove whether they do or not you have to take their word for it. Many providers in the past have claimed to not keep logs only to be involved with legal action and suddenly they do have logs to hand over to the authorities. Then there is server location for the VPN connection in question; if it's a server in a country where there are laws that give government easy unquestioned access to user data you are merely putting on another pair of jeans hoping to prevent an arrow piercing your flesh. Also, VPN on it's own is not an ultimate solution. You can connect with VPN and Tor to increase your privacy, you can also use proxies as well. You could use DNSSEC and DNS over HTTPS to help prevent DNS leaks although many VPN solutions offer this built into their services it is common for VPN software to leak data every now and then. Software like DNS Crypt can help to add a little layer of privacy when using the internet as it can be used to prevent your default DNS resolver (your ISP) from being revealed. You can also disable OpenGL and WebRTC to prevent data leakage, limit referrer data being transmitted to the destination address, disable offline cache in Firefox, prevent canvassing, disable webcam/microphone accessibility in browser, disable telemetry configurations, you can also prevent Google from sending links to download links you access for scanning for malicious content (which it does by default in Firefox). You can also help prevent browser footprinting, tracking cookies, social media beacons and find a program like BleachBit or CCleaner to wipe your browser data after a session to prevent any sensitive information from potentially being accessed in any way.
  5. The sad reality is, at least from what I've read; most security experts put the emphasis on security on the individual and following pretty much straightforward op sec. I read a research paper by Google which conducted research on both the average user population and security experts around the world to find out what the average user believes is enough to protect them and then what the expert believes is enough. The experts put emphasis on methods like regular software updates, password managers, 2FA and forced HTTPS whilst the average user put emphasis on antivirus and specific software solutions. Most experts avoided recommended software to protect the user against specific threats. The naivety of modern society implies we can be secure if we download something from the internet and when you think about it it's not so different from how most of the western world believes they can just turn up at hospital to fix their issues in life or seek therapy hoping for a quick fix to their issues. It's never been that simple. I read another article about information security and it pretty much said this; the only way to truly protect yourself is to choose to become completely isolated from any network whatsoever ie have NO connection to the internet, local area networks or utitlize any sort of connectivity whatsoever that connects one machine to another. A simple example of this is how the pros advise on stopping your phone from being compromised; put it into a faraday bag. The only down side to this is you can't use it at all! From what I've read that's pretty much the same for computers like laptops and desktops etc. In 2012 the "Five Eyes" hacked into a Belgium telecommunications company which gave them unparralled access to a large portion of the worlds telecommunications data from Europe to the US and beyond. One of their intentions was to intercept traffic in order to access it before it was encrypted and/or received by the intended destination address ie a server. In 2014-15 they hacked into the network infrastructure of Iran and had control of pretty much every single critical system in the country. Their real intentions were to stop them from making weapons grade nuclear material but they also had a backup plan if it was to spark a war and their plan was to take down every single system that made the country run; banks, energy plants, the financial economy etc. Such attacks render an app from the Play Store pretty much obsolete I feel. Not just that but then we can talk about the mass surveillance conducted as we speak by the US government. They recently began building their very own data farm to store the world's data they have/are sucking up. I think it's pretty dumb to assume that your phone calls, text messages, email etc have not inadvertingly been intercepted by these programmes and are sitting on a hard drive somewhere. What about MITM attacks the government can do very easily by setting up rogue APs and cell towers? They've been selling hardware like this for years. Whose to say they haven't already used it in your area? You may encrypt communications on your computer but very few are that technically gifted to have specialized cell phones to circumvent surveillance. Then we have the issues with ISPs complying with government surveillance and their requirement to allow the government access to their data whenever these governments wish. It's pretty naive to assume downloading software is going to save you. Sure, PGP will encrypt your emails for example but whose to say the software you used to encrypt the communications hasn't been backdoored or has an unknown vulnerability? The NSA have a collection of 0 day exploits for endless amounts of software and they also can implant on a whim exploits into software and hardware. I read the other day how a popular PGP software had a flaw whereby an attacker could compromise the encryption of a PGP key rendering it fairly useless and easy to decrypt. The Tor network has had flaws in it and yet people use it often believing it offers the ultimate protection; rogue exit nodes just to name one example. It's now also becoming known that the government can deanonymise users of the Tor network and even websites hosted on the Tor network. Sure a VPN will help but whose to say your VPN provider hasn't been compromised? Whose to say they don't keep logs? Says who? Them? How do you know? HMA ratted out a customer a few years back who was believed to have hacked a number of companies using a HMA VPN account. They were asked to comply and provide details and so they did and the resulting after effects was the individual in question was revealed and later arrested. Just think about how the government themselves have been hacked in the past. Just think how ransomware has taken over many parts of the US and these attacks have been targetted at the US government, namely in the very area where the NSA works - Baltimore. The government have trouble preventing attacks from happening and sometimes it's as easy as opening a dodgy attachment and you're in. The EternalBlue exploit was known for a long time by the NSA and was only patched some years after when the ShadowBrokers leaked it to the world and the NSA had to in decency report the vulns and subsequently the SMB exploit was patched. Whose the say there are not these sorts of inherent vulns in the very software you are using right now? How can you protect yourself when your system could now be compromised by a bad guy simply executing a particular set of instructions which gives them access to your system? Goodbye to your protection then. VPN won't matter when persistence has been planted and the backdoor firmly opened. The best security is to get off the grid, disconnect from the WWW and completely isolate yourself and your digital life from the outside world. Even then, look at the attack on the air gapped Iranian nuclear power plant not that long ago. It was air gapped! And all it took was an insider to plug in a USB stick into a computer and the rest is history. Goodbye to your AV, firewall, VPN, encrypted chat software etc. Game over. You lose.
  6. It can be easy to form a reply which is biased towards your own preferences, beliefs, philosophies in examples like this and so I think all that stuff should be left out. You can monitor someone pretty easily, especially if they use the same computer. In fact, it's probably the easiest thing to do when and if you share the computer. You could use something like TeamViewer which can be setup to be configured so to not require authentication upon logging into the machine. I'm not sure how far you can take TeamViewer in terms of discretion though, I think no matter what you do with TeamViewer the branded menu pops up at the bottom of the screen informing the user there is an incoming connection and then subsequently shows a connected session as well. The only alternative would be something like VNC whereby you can monitor what's going on much like TeamViewer but usually with reduced functionality. The only solution for something like this would be assuming total control over the system by means of installing a remote administration tool which has been specifically designed to be discrete and powerful. TeamViewer will work but it can easily be uninstalled, reconfigured and even blocked from connecting through the internet ie firewall rules etc. VNC would also work but again, if you're using a known branded product, the chances are, it's not going to be hidden away on the system which means more chance of your presence becoming visible. A RAT on the other hand will operate completely silently (if setup correctly) and will allow you to monitor and control users logged in on the system. It will also quite easily pick up passwords and anything else sent and received in clear text so then it becomes a question of whether knowing exactly what your daughter is saying or doing and why is actually acceptable in this instance. I mean, sure, monitoring someone for their own privacy and safety, especially your own kids is great but reading their incoming chat messages, knowing all their passwords, and potentially knowing their secrets? Yeah, that's probably not acceptable in any decent person's mind. I can understand where you are coming from with the desire to watch her movements whilst she uses the computer but I would advise ensuring what you do does not go over the threshold for actions considered ethical and acceptable. I mean, if you wouldn't want this whole thing being blown out of proportion and thrown in a newspaper (not that it will happen but it's a wise idea to act based on what if such a situation could happen) it's probably a good idea to stick to something minimal and not completely instrusive and well, weird. I've read quite a few articles about family members, partners and so-called 'friends' going to ridiculous lengths to see what the other(s) are doing and it never looks good from an outside perspective. What you do now could come back to bite you in the ass and so self preservation and your goals with all this should be completely ironed out and make complete sense before committing to potentially invading the personal privacy of your daughter. Again, not that I'm saying that what you are asking about is wrong because hell, the fact that sites like this exist which show HOW EASY it is to exploit computer systems, to steal info, to manipulate people, to hack etc makes for implementing solid contingency plans and security frameworks. I just don't think most dads want to be THAT dad who goes THAT far, if you get what I mean? There is protecting your family and then being a control freak and potentially abusive and yeah, having studied counselling/therapy for quite a while; being able to assume control over the private lives of another person, be it family or friend or whoever, can be abusive if taken to the extremes. That being said, securing her computer is completely acceptable in the context of providing basic security and privacy and the MORE secure it is I would argue, the more acceptable and commendable it is. You could start by ensuring all the software she is using is as safe and secure as it can be. That means removing Internet Explorer, Edge and all other browsers with obscene about of consistence security flaws. Ensuring she uses a VPN and that the VPN client is reliable. You could even configure the computer to connect automatically to a VPN server as apposed to not doing. Just the other day I was able to simulate a Flash Update on my lab version of Windows and then download a payload using IE as the first target to exploit and so talking about IE, and browsing, it's frightening how easy it is to take advantage and get into a system. Firefox is so much more secure and many of the simple stumbling blocks you find with IE and Edge for example just aren't there with Firefox. That being said, it's also A LOT more customizable and so you can mod Firefox to the point where it's a whole lot more safer and secure. Make sure all software is updated in general. Making sure the system is clean moreover is probably a good start which means ensuring it hasn't already been compromised or is easily a sitting duck and waiting to be compromised. Here are a few good extensions you can get to add for Firefox just that little bit more security and privacy; - NoScript Security Suite (when configured correctly will block ALL scripts on a website, even the ones which aren't potentially harmful. Yup it will BREAK a website if it has to and it won't load at all or will be completely messed up if NoScript is enabled but this is good because it means you can choose what scripts are running and from who, where and when. It's also installed on the Tor Bundle (or was) and so that says a lot about it's potential for increasing security and privacy - HTTPS Everywhere (extension that pushes traffic through the encrypted HTTP protocol and can even be configured to ONLY accept traffic through HTTPS, which can admittedly break some sites which do not offer complete encryption but is well worth getting because it enforces a very important feature of web browsing to be active and in use at all times) - AdBlock Plus/uBlock (Both amazing extensions for blocking pretty much ALL of the popups, malicious ads and even scripts and trackers found on the internet and have been around for a long time, especially AdBlock) - Privacy Badger (another great extension for customizing what trackers are enabled on what site and combined with other extensions like AdBlock, Disconnect etc add even more layers of privacy potential) - Disconnect (same as above, great extension for blocking and monitoring trackers on the web) - Facebook Container (this will prevent Facebook from following you around the web and can be set so that the Facebook icon/beacon is not enabled on the sites you visit so it cannot identify that you visited the website upon which the icon/beacon was placed) - LastPass (very popular password manager which can effortlessly store as many passwords as you can throw at it which makes securing them a lot easier and also you can forget them as you can easily log in and autofill them when visiting websites) In certain version of Windows 10, especially the ones about the Home edition you can go into your Local Group Policies and enforce specific controls on the computer, either on a user basis or globally on the system; things like removing access to the registry, control panel, task manager etc can be done. Other settings like ensuring a password is of a certain length, disabling Microsoft account login, dialling up UAC to require credentials on every significant system change. Disabling and hiding the built-in Administrator account, enabling tampering mode in Windows Defender, configuring Windows Defender to be more strict and more aggressive. There are lots of options. Also, you can use software to apply website blocks which work client-side which means so long as that program is running, it doesn't matter whether someone uses a VPN or not to attempt to bypass the limitations, they aint getting through. You can find lists of known sites to block and can download and then import them as necessary. Chances are, you won't be able to block them all and many people find ways to get through these filters. I can remember doing it quite easily at school many many years ago and that was industry level protection, meant for enterprises and education environments, not a worried dad trying to prevent his kid(s) from accessing the wrong sites. You can take this as far and wide as you want. It all depends and why you want to do it which is of course your own story and you have your own reasons. Again, it's probably a good idea to think about this and work out both the pros and cons. Ultimately, you will no doubt end up falling back onto using a RAT or something very similiar to get the job done properly and many of the most popular variants have ALL the tools you could ever need to monitor someone/something/people and they are commonly used in a perfectly legal context in workplaces and closed environments for the purpose of protecting a network and it's vast amounts of users. You can also use them illegally too and if you wanted to piece together someones day to day life by merely tracking everything they do, everything they write, click, type, download, upload, install, uninstall etc. As someone mentioned above, you could fall back on Metasploit and a reverse shell backdoor and perhaps follow up with a bind to ensure a level of persistence. You could also backdoor the computer before someone else uses it which will save you having to effectively social engineer your own daughter and/or compromise the system in the process. That being said, Metasploit payloads are well known to AVs these days and most can pick them out easily without much trouble if they are simply executed fresh from being compiled out of Metasploit. That may mean encoding, compression, encrypting and even modifying the actual source code itself to evade detection and so you are now playing a cat and mouse game with your own computer and it's antivirus solution. If you disable it and revert back to say Windows Defender you leave it open to being exploited for real by real bad guys. If you have a good AV your backdoor will no doubt inevitably get detected if it's like any that is generated with little to no aftermarket configuration and/or knowledge about AV evasion etc. So how do you get that thing onto your system without compromising the system itself in the first place? And without disabling a whole load of features and potentially leaving the system open to further backdoors from people who really are bad in intentions? I've found to get past Windows Security alone in a lab environment requires several laborious steps and often trial and error and experimentation to reduce the AV detection by as little as a few numbers and then to get it past Windows Security whilst ALL of it's critical features are enabled. I can get past it easily by disabling it but then again that's a lab environment and not a computer I would share with a potential daughter and so that's a big difference. Anyway, there's my rambling and thoughts on the matter. Hope all that made sense. No one can tell you what to do. Just know your intentions and know the limits and at worst, imagine the worst case scenario and how it would impact you and the relationship with your daughter before committing to any decisions.
  7. There's nothing puzzling about. If you've been on YT for longer than a few years and have glanced out beyond your own scene you will have seen that channels have been threatened with video deletion, suspensions and bannings for quite a long time. I can remember when they started attacking drug harm reduction videos back in 2015 and began silencing channels which were uploading trip reports, genuine videos I may add, which were not in any way harmful to the viewer. Much like a hacker showing how they hacked a computer in real time, these guys were uploading their experiences on psychedelics so that the wider world could get a sense of what the experience was like, at least to look at. They then went after videos which had ZERO filming of actual drugs or drug experiences and took down videos educating people on the risks taking psychedelics, purely because of the content and the choice of words in the video title. Certain content uploaders were changing their titles to avoid the algorithm ie "t!h!is is N0T a tr!p Re...Port! video". The worst part of it all is how they can and will demonetize as many videos as they possibly can in order to get you to comply which for a person who relies on income from ads on YT is pretty harsh. YouTube has long since been a sitting duck. Ever since they brought in monetization through ads they also welcomed in the long arm of the empires behind the advertisment industry which have A LOT of power considering they are responsible for pretty much all purchases made around the globe for household items, beer, cars, technology etc. The advertisement industry began to get mad at YT because their customers (big corporations) wanted to choose what adverts went on what videos. That meant that YT had to change their rules and start enforcing ways to change how adverts were placed which meant changing the content of videos on YouTube. It's mainly a slow process of letting big corporations define YT like they have defined television; by pushing out what they don't want and bringing in what they do want. It also tries in with those who are in government who lobby on behalf of these big corporations to have laws put into effect. That's what happens when you get bankrolled by big industry. The answer has long been decentralized CMS, like that of dark web marketplaces. No-one can in theory take down content because there is no authority in charge of the content in the first place, besides the guys who own the servers and they have historically kept their ends of the bargain for example you look at the timeline of active dark web services. Many simply get taken down by authorities and are not actually regulated by said authorities until the last minute. If there was a version of YT which was held within a space that could not be regulated by any overarching authority and was not funded or had any reason to be funded by big corporations who support, or are partnered with the government, videos like these would not be taken down, accounts deleted and/or suspended and videos demonetized. Sadly, the whole of the internet is going in this direction; towards a world similiar to that of Bitcoin and the dark web. When the protocol behind that fails, another one will be created, ad infinitum. This is nothing new though. And if you ask the opinion of the finding fathers of the internet we know today, well, they are hardly happy about the repressive online world they see around them today but it has been something predicted as happening since the boom of the internet pre-millenium.
  8. At this point, at least to me anyway, there's a message being conveyed here. If you can't get past antivirus detection using readymade generated scripts compiled into an executable ready to be ran from a target computer, it's then time to learn other ways to evade antivirus. That might mean learning about how antivirus works, where the weak points are in AV detection, simple tricks to reduce the number of detections, customizing payloads etc. The answers are not going to jump out at you. The antivirus business is worth BILLIONS. It's their job to make your life as hard as possible. If it was as easy as downloading a custom Linux distribution with an exploitation framework pre-installed, creating a backdoor and then sending it to someone the whole world would be infected. The point of antiviruses is to make it harder to gain unauthorized access to a computer, or a network or whatever. I just started learning about this stuff a few months ago and already I've already learned that the barebones packages, although feasible and amazing in their ability, do not provide the total answer. Again, it's just common sense that billion dollar industries will eventually pool together their incredibly talented resources and phase out the possibility of certain things working, or at least stop them from working as they are, or are known to work from a pattern of signatures. That being said, if it's just a signature you want to change, you can do that by modifying an executable with a hex editor. The chances are though, the AV will still detect it. From what I know, most modern AVs work on behavioural analysis and they measure this behaviour on what their massive records contain on malicious code and the sort of stuff it does. It will then block that malicious code based on a hunch that it's going to cause damage. That hunch depending on the software and context, will either be a false positive, or it will be justified and the AV has done it's job. All this being said, this is just the surface of a much deeper sea of knowledge. I've been looking at how payloads work from the perspective of a programmer and it's by no means a walk in the park creating something as glorious as the Metasploit framework and then creating a payload which is effective and can be used time and time again. You have to remember that by you simply asking this question, you are no doubt one out of many thousands if not tens or hundreds of thousands who have asked the same queston and if that's true, how many of those have used the Metasploit framework? It's like asking how many people have had missionary sex. It's only when you start branching out and finding out about the dark and erotic stuff beyond the vanilla that you begin to see there is more to the original question you asked. Then you find out answers you didn't even know existed. Bottom line from my experience anyway, if you are relying on something you can download for free and start up and compile a file without doing anything, you are always going to get the same results. From what I've learned so far, you don't have to be an elite level programmer to get past AV by designing some sort of amazing code which no AV has ever seen before, which is amazing by the way and commendable and like getting being the first in line at a concert when it gets passed down to the public, but you do need to be prepared to widen your skillset and look beyond easy solutions. If you look in any of the good places on the internet you will find the same answer to your question; look deeper, learn, evolve your perspective, try new things, don't expect the answer to pop out at you. The fact that you are asking this question means you must sort of understand how complex the field of ethical hacking and pen testing is and why the antivirus industry is worth billions and why they hire some of the best brains in the world to find out ways to prevent people like you (and me) from simply downloading something and then without much knowledge just sitting back and watching it do it's work. I read somewhere that the AV industry has stepped up it's game so that it's becoming harder for those who want an easy victory to get anywhere. They are pushing out those who run pre-made scripts without any awareness of what they do. In the mean time it's creating an environment where the ones who are focused solely on breaking through by learning and adapting to thrive and to raise the bar. I mean essentially your question is like asking; How do I become a world star in Formula 1 racing? Hard work, learning, knowledge, failing, experimentation, trial and error etc.
×
×
  • Create New...