Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - HexEngineer

Pages: [1]
1
Operating System / Re: Switch to BSD.?
« on: January 06, 2015, 06:15:26 am »
http://www.ossec.net/ and keep calm! I really don't like BSD mainly because I always have lack of drivers on it....

2
Operating System / Re: Kali Linux Installation Process
« on: January 06, 2015, 06:10:07 am »
Well I don't like Kali at all, totally agree that is far away from Debian. Also who would need so many tools on one place.

3
Hacking and Security / Re: Where to Start
« on: January 06, 2015, 06:07:36 am »
1. In my opinion just pick one, but build strong base on it. I'm not programming guru, but i've spend a lot of time on C and now I apply this knowledge on every programming language. However you can start with everything python, ruby, java... But at some point you will need to get your hands durty with C and some kind of ASM.
2. You don't need to, you can use vm fusion, virtual box...
3. Why unix? It's open-source and it's used for the most servers, they usually run on Linux of FreeBSD.

4
The privacy policy seems fairly good.They say that they store cookie which will only track your activities on bitport, anonymously - only Google Analytics get information which may identify you.

5
General discussion / Re: Tech Confessions?
« on: January 04, 2015, 09:40:41 am »
My list is endless
1. When I was really young (4-5 years old) me and my dad(who doesn't speak English), we were trying to start a game for hours(2-3 don't remember) at all my mum come home and start it for us.
2. When I was about 8-9 years old I decided that I'm hacker, downloaded VB 2006 and stared crawing the web for topic such us "vb 06 malware", "vb 06 worm" of course I didn't know what a for loop is but I was downloading source codes and modifing them and for some reason I always fucked up the OS installation, for that time I thought that those who can reinstall Windows are the best hackers on the world, sadly soon I understood that my mom can do it too(after she tryed to use the PC).
3.When I've find the BIOS I set password to it, I was unable to remove it.
4. I've used IE until 2008(could you imagine this ??? )
5. I tried to infect somebody via skype somebody from USA don't remember his name I think he was pedo anyway I didn't know that AVs detect trojans nor what a port is, useless to say that I failed.
6.Before 5 years I tried to hack the skype of my girlfriend, I tried to guess the password of the mail used to create skype, sadly the mail was by her mother and I blocked the mail for 48 hours (too many login attempts)=D
there are many more

6
General discussion / Re: Where are you from?
« on: January 03, 2015, 08:57:15 pm »
I'm from Bulgaria - Europe.

7
Hacking and Security / Re: Learning Efficiently
« on: January 03, 2015, 08:30:30 pm »
I didn't read other commends, I'm too lazy so sorry if I repeat somebody. You said that you have read and learn about full-stack development(front and back end dev.). Well I will recommend you to write your own social network something like facebook, with Ajax(or webSockets if you are using HTML5) with chat system, profile system etc.. The idea is to get practical expirience not to destroy facebook.While you are writing the social network don't care about the security .Write the system and then start reading about web security there are plenty of books that will give you basic introduction to the most common attack(like XSS, SQLi, CSRF...). After you get the theory behind those attacks, try to exploit those vulnerabilities in your social network, after that patch them.

P.S. Sorry for my bad grammar.

8
Hacking and Security / Re: Blind SQL with WAF
« on: January 03, 2015, 08:24:57 pm »
Well it's seems that the WAF is searching for numbers(what for god sake ?!?), you said that you are stick with the "order by" command well did you try [ order by (10)-- ] and [union select (1), (2), version(),(4) ....(9)--].

9
Hacking and Security / Re: Server Security from Bruteforce - FTP
« on: January 03, 2015, 08:13:00 pm »
I don't see any way to avoid(or patch in other words) brute-force attack without attempt maximum. I was unable to understand at least 90% of the things you said, but you said something about "tools", what will happen if I write a custume brute-force tool for your script? Hacking isn't just for using tools. Also I can try to guess the user:pass by hand, how would you stop me without attempt max? The only way I see is to wait for delays between logins. For example if from given IP you get 100 attempts per second this is 100% attack, this  cannot be done by human, but again I can add delay in my tool(for example one attempt per second).
P.S.
Sorry for my bad grammer.

10
Hacking and Security / Re: Router Cracking
« on: January 03, 2015, 08:01:14 pm »
In addition to what Ech0x7 said I will add:
WPS brute-forcing isn't the only vulnerability in WPA. Some routers have poor implementation of the algorithm, also there are other vulnerabilities like WPA/TKIP. http://dl.aircrack-ng.org/breakingwepandwpa.pdf this document will be useful to you(it's old but still good introduction). But as others had mentioned you will need some networking background(at least the theory). If you want for future to research vulnerabilities in crypto algorithms, I would recommend you to get with math and cryptography.

P.S.
Sorry for my bad grammer.

11
Hacking and Security / Re: Error while SQL injection.
« on: January 03, 2015, 07:47:04 pm »
You could try adding -- after you query. If you aren't familiar with SQL better learn it first before start exploiting. Also mysql_fetch_assoc() is function in PHP, this is probably the most widely used programming language for back-end development it's good to learn it too.
In case you want recommendation about resources, in my opinion it depent on your experience.

P.S.
Sorry for my bad grammar.

Pages: [1]