Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - d4rkcat

Pages: [1] 2 3 ... 15
1
Anonymity and Privacy / Re: Complete Anonymity
« on: April 15, 2015, 08:55:49 pm »
You are overcomplicating this rediculously.
Have you ever heard of KISS (keep it simple stupid).
You are opening yourself up to all kind of attacks by trusting so many different layers.
Of course you dont use javascript on tor thats fucking obvious isnt it?
Just use the tor browser and you dont have to worry about any of that shit.
like I said before, it's very simple:

1. get on a paid VPN
2. get on tor browser
3. signup for a gmx.com email account over that connection
4. make a PGP key
5. use it.

KEEP IT SIMPLE STUPID

say it with me.  :)

EDIT: I just realised you are trying to hide from government agencies. That's crazy, nothing I or anyone else can say will help you do that. Good luck!

2
Android / Re: [TUT] Root your Android with towelroot by geohot
« on: April 15, 2015, 12:53:33 pm »
Try using the newly landed metasploit module for it:

exploit/android/local/futex_requeue
https://github.com/rapid7/metasploit-framework/commit/af405eeb7dcd555cd6ef31cd8dbc225780c72a40
https://github.com/rapid7/metasploit-framework/pull/4287

If your phone is vulnerable, it will work.

3
Beginner's Corner / Re: wifi hacking question
« on: April 14, 2015, 08:54:40 pm »
yeh dude ther wur som cool hakurs in theis website bro I thank they can halp you with ur haking:
http://www.hackforums.net/

ppl here dont really know how to hakin I think u shuld try at that websit ^^^

4
Anonymity and Privacy / Re: Complete Anonymity
« on: April 14, 2015, 08:01:57 pm »
I don't know about all those web services you mentioned, but take a look into PGP.
With PGP you can sign and encrypt your emails, so that the recipent knows that only you could have sent it.
The anonymity side of it is just the ususal procedure, connecting to a VPN then connecting to the TOR network should be good enough, then create an new email address over that connection and create a PGP key for it.
Thunderbird with Enigmail addon is the easiest way to get started with PGP.

Edit: Also with PGP it doesn't really matter who see's the contents of the emails, because only the person with the private key can read them. No need to trust anyone but yourself and the friend who recieves the messages.

5
Hacking and Security / Re: attack in a LAN
« on: April 12, 2015, 03:19:38 pm »
is it your home network?

6
Operating System / Re: make awesome kali linux desktop with conky
« on: April 12, 2015, 03:18:21 pm »
Nice desktop customization, but seriously there is no point.
Customize your host desktop, as TheWormKill and v32itas have said, use a real distro like arch, and use kali in a VM.
If you have it in a VM you can get it to the state you want and take a snapshot, which you restore after every use.
Kali is good at what is does, which is have a shitload of pentesting tools that work out of the box, but it is an awful idea to use it as a main OS.
The packages are so outdated it's not even funny. And running outdated packages as root is just....


7
Networking / Re: Pentesting my DMZ
« on: April 11, 2015, 03:32:14 pm »
I set the ip of the WAN side of the router to 192.168.1.15

I don't get what you mean here, only your ISP can decide the WAN IP address you are assigned, and the 192.168.x.x will never be an external ip address.
There are just some cookie theives runnig around, don't worry I have replenished your cookie jar lol.

8
Networking / Re: Pentesting my DMZ
« on: April 11, 2015, 01:46:33 pm »
I don't think you are understanding what a DMZ is.
Whatever IP you set the DMZ to in the router panel, that machine connected to that INTERNAL IP will be exposed to the whole internet, and so if you scan your EXTERNAL IP, you will be scanning the machine that you specified on your INTERNAL network to be the DMZ.
ie, whatever machine you designate as your DMZ will bypass the NAT and become your external IP.

9
General discussion / Re: Post your deskTOP
« on: April 11, 2015, 11:21:00 am »
Antergos Arch GNU/Linux with Openbox, conky widgets, cairo-dock and tilda as a wallpaper terminal.
Shell is zsh with oh-my-zsh pimpyness and my own theme for the prompt.



10
Anonymity and Privacy / Re: Fake Identity Document Fiverr
« on: April 09, 2015, 01:44:53 pm »
Code: (Bash) [Select]
apt-get install rig
http://rig.sourceforge.net/

11
Beginner's Corner / Re: Where can i download Kali tool Manually?
« on: April 03, 2015, 04:14:24 pm »
1 second startpage.com search for:
"adding kali repos to debian"
found:
http://www.blackmoreops.com/2013/10/30/add-official-kali-linux-repositories/

Knowing how to search for things on the internet and reading things are the most important hacking tools available.
If you ask more stupid questions like this people will throw giraffe poo in your soup.
You're welcome.

12
General discussion / Re: RAT SURVEY
« on: March 31, 2015, 11:46:57 pm »
what's a RAT?
what's illegal activity?
what's completely anonymous?

14
General discussion / Re: Anyone Want To Code A Python (RAT)
« on: March 25, 2015, 08:08:20 pm »
Sorry did OP ask for your opinions on if python is a good language to write malware in?
No that's right, he didn't. He asked for help and ideas coding a PYTHON rat.
So why don't you very respectable admins stop derailing this guys thread and go and make yourself a bitch a moan thread, where you can bitch and moan about python all you want.
Or even better make a thread with your source code for a C/C++ rat, and explain why you think that it's better?
All i'm hearing is a bunch of whiny elitist garbage about my football team is better because I say so.
LOL.

15
General discussion / Re: Anyone Want To Code A Python (RAT)
« on: March 25, 2015, 07:03:48 pm »
herp

Yeah because everyone knows apples will never beat basketballs, that's a fact.

Pages: [1] 2 3 ... 15