Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - ferf

Pages: [1]
1
Beginner's Corner / Re: How would i gain access
« on: January 06, 2016, 03:03:54 am »
I think you're gonna wanna enable port forwarding on the remote router if you have access to it, then ssh into the target pc. More specifics and details please.

Thanks that clarifies things a bit :)

2
Beginner's Corner / How would i gain access
« on: January 06, 2016, 02:40:15 am »
Just wondering, say i have access to a remote networks router, from there, how would i gain access to said remote networks computer from the router? I'm sure the commands are going to vary depending on the router, but what does it basically come down to? I'm guessing i'd have to open a port.from there not sure... also command line access, that is what i'm asking... Would appreciate some knowledgeable insight! thanks!

3
Beginner's Corner / How exactly does the exploit writing process work?
« on: December 21, 2015, 01:08:12 pm »
I've been curious about this for a while.... Say someone wants to write an exploit for skype, what would the have to do to go about writing one? Would they need to reverse engineer skype to examine code to find bugs in the code to write an exploit for? I'm not sure exactly how the whole process works, if someone could explain it to me i'd really appreciate it!

4
Beginner's Corner / Re: What kind of attacks viable here
« on: December 21, 2015, 01:06:26 pm »
I'm guessing using a packet sniffer might be a good idea?

5
Beginner's Corner / Re: What kind of attacks viable here
« on: December 21, 2015, 11:33:49 am »
If you already have access to the network, metasploit it is. If you don't, first break it. Theres hundreds of ways that you can gain access to a computer, you just have to find the present and most viable flaw on the machine. Anyway, my guess only..

Heres a good free metasploit tutorial -> https://www.offensive-security.com/metasploit-unleashed/
One of the best free pentesting/IT Learning courses out there -> https://www.cybrary.it/

And of course, in the forum you will find a large amount of knowledge, tutorials and tips about everything you need to know about cybersecurity.

Cheers

Thanks so much!

6
Game Hacking, Modding & Discussing / Re: Game from your childhood
« on: December 21, 2015, 11:19:42 am »
Final Fantasy
Counter-Strike
Kingdom Hearts
Diablo 2
Warcraft 3
Tekken

7
Beginner's Corner / What kind of attacks viable here
« on: December 21, 2015, 10:48:26 am »
Please use the following template:

Problem: So I'm new or relatively new to the hacking scene.... and I was wondering what type of attacks are used for when you have access to a user/computer on a network, what kind of attacks you can do to gain access to other computers on the network

Background: I know this is very skiddish but I think most hackers started at the script kiddie level,haha, I am trying to learn java atm, but that's seperate from hacking and wouldn't help much i don't think

Things I've tried: Ummm nothing yet, Just looking for ideas to try... Netbios attack? Idk... Just looking for suggestions and from there i'll test/research



Sorry for this type of question, but u gotta start somewhere, and like i said, I'm sure a lot of great hackers started as script kiddies

Pages: [1]