Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - b00ms1ang

Pages: [1] 2 3 4
1
Tutorials / Re: Try and Bring Back Privacy to Windows 10
« on: February 02, 2016, 08:03:13 pm »
Most artist I've came across uses Mac, but that might be out of a students budget?
Gaming, yip I've not seen the top end of games for *Nix.

Macs tend to have more tools at their disposal for editing and drawing. I've always preferred windows as I use a very small array of programs and just need my tablets to work properly, and I've never had a problem on windows getting it to work! Plus yeah, much cheaper. And I don't like how "locked up" macs are

2
Hacking and Security / Re: Your Hacking Routine
« on: January 23, 2016, 12:55:07 am »
If someone wants to learn, I will work hard to teach them. I don't care if they're a code kiddie right now. We're a smaller school, and I dont expect world champions right off the bat. We will work together, and the best of us will go to tournaments. People who aren't serious will drop out on their own to avoid embarrassing themselves. I'm looking for a means to teach, and progress. It'll be alright

3
Tutorials / Re: Try and Bring Back Privacy to Windows 10
« on: January 22, 2016, 02:23:05 pm »
What is locking you in to use Windows? Which of your programs can't you run on Linux?

Personally I'm an artist that uses primarily high level photoshop extensions that I can't get with Linux "equivalents". Also, gaming yo

4
Hacking and Security / Re: Your Hacking Routine
« on: January 22, 2016, 02:21:57 pm »
Well it really depends what you after but say for example, in a general scope: first you want to do a lot of recon to know what you're up against with. Secondly you'd scan for vulnerabilities and see if you can use any available exploits but surely you'd have to fix them for your needs. If you've successfuly gained access to admin/root you're in a post-exploitation phase so you'd want to maintain access by placing a backdoor.

That's pretty cut and dry, like that. That basic recon at the start is a step I feel a lot of people forget to do. So far this is what I've got

-Recon and Engineering (retrieving passwords etc)
-Fuzzing, Vulnerability Scanning
-Packet and Port monitoring and manipulation
-Password cracking and injections (we will also be trying to break and manipulate websites associated with the network)
-Exploitation
-Backdoor and manipulation

5
Hacking and Security / Re: Your Hacking Routine
« on: January 22, 2016, 02:19:38 pm »
Ironically I'm not much older than you if not younger and I never had a college education or learned a single algorithm and I do pretty well for myself. But really man don't let that all inclusive faggy open campus feel good bullshit weigh you down. There are always more faggots on campus who saw Mr. Robot and now they want to be hackers and have mommy and daddy drop 10 grand a semester to be bad at it. I'm sure if you're any good some of them will listen keep them discard the rest you have no use for people who suck or don't want to learn.

I'm 20. I win!
And anyway, everyone on the team is a computer science major going into the cyber security field. They're all smart and truly want to learn, it's just hard deciding where to start, especially in competition

6
Hacking and Security / Re: Your Hacking Routine
« on: January 22, 2016, 02:04:28 am »
College has taught some basic stuff in the security classes, but at the end of the day it isnt enough to prepare anyone for the real world at all. The team members who know the details and how to do things are people who learned on their own time and are just there for a degree.

7
Hacking and Security / Re: Your Hacking Routine
« on: January 22, 2016, 02:03:32 am »
Trust me man, I know that for sure. I've been running in the real world for a couple years now. But we're talking, these guys dont even know what wireshark is. I need a simple, baby way to break down a hacking routine for them. We can only do so much

8
Hacking and Security / Your Hacking Routine
« on: January 21, 2016, 10:39:21 pm »
So I just became a captain of my college's Cyber Sec team. We have a competition coming up, and most of the team is still very inexperienced. I've been working on the best way to teach what I know, as well as learn from the more experienced members of the team as well. One big thing I've seen and noticed when I do hacking work is that we follow an order of operations to test a system's security.

What is your routine/ order of operations? What do you start with, and where do you go from there? What tools or concepts do you use and how do you progress through to find as many vulnerabilities as possible?

We'll be working with networks specifically, constructed like business networks with servers, user computers, and virtual machines. Personally, I target the V-machines and try to hack away at defenses like passwords and more, but some of the more experienced members start smaller, using tools to try and access very shallow parts of a system first, and I found that fascinating. It breaks away from the brutality my cyber sec classes have taught me.

Tell me what YOU do, and what you like to use when you try to break a system!

9
General discussion / Re: Dream Car?
« on: January 21, 2016, 09:36:56 pm »

10
Scripting Languages / Re: TrumpCode
« on: January 20, 2016, 07:13:58 pm »
Good lord this is wonderful

11
General discussion / Re: Half-Life 3... and why it wont happen
« on: January 20, 2016, 04:07:33 pm »
Two words: Duke Nukem

You can't hype a game up for so long, it will never meet sales or expectations as it should. Sad we wont ever have a HL3, but it's for the best.

12
I have not found the challenges I would like, no. Sadly the dirty work is mostly things people should know how to do on computers anyway. The pay can be pretty good, but at the end of the day if the pay doesn't matter than I'm not sure if you'll find the challenges you want. It's a stupid social trope that people don't always trust people without degrees in their field despite knowledge. That being said, if staying where you are doesn't make you happy, it's worth a shot. See what you can find, don't quit your current job, and if worst comes to worst you don't lose out right off the bat if you can't find anything

13
Beginner's Corner / Re: Looking for Resources on Anti-Virus Architecture
« on: January 19, 2016, 04:01:09 pm »
Have you looked at this thread:
https://evilzone.org/general-discussion/av-source-code/ ?

I didn't look at that thread directly, but I DO have the bottom source code from a search last night! This is an awesome resource!

14
News and Announcements / Re: Board restrictions to new members
« on: January 18, 2016, 08:11:40 pm »
And where's your quality? Hrm I can't seem to find any...

OOOOHOHOOOOO

Anyway, as someone who leaves this forum on almost all day and reads every single post, but just doesnt post much, I see absolutely no problem with the way EvilZone runs. The activity level and quality is actually really nice compared to other security forums I have been a part of. Bullcrap is dealt with quickly, the IRC remains as an active social unit, and good tutorials and posts stay where they should be. All in all, 7.5/10 for forum crunchies (needs more titties). And if users have to earn their salt by participating? I think that's great. It really doesn't take that long to ask some questions, respond to feedback, and try out some of the readily available tutorials.

15
Beginner's Corner / Re: Anyone used the WIFI PINEAPPLE MARK V?
« on: January 18, 2016, 08:04:27 pm »
I have one of the do-it-yourself TPLink WR703N's, never saw a reason to dump a ton of cash into a pineapple. The code is nice, but the hardware is waaaaay overpriced. I could make a little army of these guys and spend a sixth of the cost.

Pages: [1] 2 3 4