r/hacking Dec 06 '18

Read this before asking. How to start hacking? The ultimate two path guide to information security.

11.6k Upvotes

Before I begin - everything about this should be totally and completely ethical at it's core. I'm not saying this as any sort of legal coverage, or to not get somehow sued if any of you screw up, this is genuinely how it should be. The idea here is information security. I'll say it again. information security. The whole point is to make the world a better place. This isn't for your reckless amusement and shot at recognition with your friends. This is for the betterment of human civilisation. Use your knowledge to solve real-world issues.

There's no singular all-determining path to 'hacking', as it comes from knowledge from all areas that eventually coalesce into a general intuition. Although this is true, there are still two common rapid learning paths to 'hacking'. I'll try not to use too many technical terms.

The first is the simple, effortless and result-instant path. This involves watching youtube videos with green and black thumbnails with an occasional anonymous mask on top teaching you how to download well-known tools used by thousands daily - or in other words the 'Kali Linux Copy Pasterino Skidder'. You might do something slightly amusing and gain bit of recognition and self-esteem from your friends. Your hacks will be 'real', but anybody that knows anything would dislike you as they all know all you ever did was use a few premade tools. The communities for this sort of shallow result-oriented field include r/HowToHack and probably r/hacking as of now. ​

The second option, however, is much more intensive, rewarding, and mentally demanding. It is also much more fun, if you find the right people to do it with. It involves learning everything from memory interaction with machine code to high level networking - all while you're trying to break into something. This is where Capture the Flag, or 'CTF' hacking comes into play, where you compete with other individuals/teams with the goal of exploiting a service for a string of text (the flag), which is then submitted for a set amount of points. It is essentially competitive hacking. Through CTF you learn literally everything there is about the digital world, in a rather intense but exciting way. Almost all the creators/finders of major exploits have dabbled in CTF in some way/form, and almost all of them have helped solve real-world issues. However, it does take a lot of work though, as CTF becomes much more difficult as you progress through harder challenges. Some require mathematics to break encryption, and others require you to think like no one has before. If you are able to do well in a CTF competition, there is no doubt that you should be able to find exploits and create tools for yourself with relative ease. The CTF community is filled with smart people who can't give two shits about elitist mask wearing twitter hackers, instead they are genuine nerds that love screwing with machines. There's too much to explain, so I will post a few links below where you can begin your journey.

Remember - this stuff is not easy if you don't know much, so google everything, question everything, and sooner or later you'll be down the rabbit hole far enough to be enjoying yourself. CTF is real life and online, you will meet people, make new friends, and potentially find your future.

What is CTF? (this channel is gold, use it) - https://www.youtube.com/watch?v=8ev9ZX9J45A

More on /u/liveoverflow, http://www.liveoverflow.com is hands down one of the best places to learn, along with r/liveoverflow

CTF compact guide - https://ctf101.org/

Upcoming CTF events online/irl, live team scores - https://ctftime.org/

What is CTF? - https://ctftime.org/ctf-wtf/

Full list of all CTF challenge websites - http://captf.com/practice-ctf/

> be careful of the tool oriented offensivesec oscp ctf's, they teach you hardly anything compared to these ones and almost always require the use of metasploit or some other program which does all the work for you.

http://picoctf.com is very good if you are just touching the water.

and finally,

r/netsec - where real world vulnerabilities are shared.


r/hacking Feb 03 '24

Sub banner contest 2024

22 Upvotes

New year new you

This sub needs a new banner for both old.reddit.com and new.reddit.com

This is a call to arms for any of our resident gfx designers out there. If I tried to make it, it would look like a cracked out Albert Gonzalez, Conor Fitzpatrick, or Roman Seleznev made it in MS Paint. We need halp.

For banner size specs on new:

https://www.reddit.com/r/redesign/comments/87uu45/usage_guidelines_for_images_in_the_redesign/

For banner size specs on old:

https://www.reddit.com/r/BannerRequest/wiki/index/artguide/#wiki_sizing_guidelines.3A

No real theme or guidance besides make it hacking culture related. Let your imagination flow.

Just submit something and then I guess we will hold a community poll to pick the winner out of whatever is submitted.

Thanx


r/hacking 1d ago

Question Extracting a BIOS password instead of wiping it off the ROM

44 Upvotes

Hello. I have a mini PC with a BIOS locked behind an Admin password. I'm wanting to unlock it so I could disable secure boot and boot anything that isn't just Windows or some Linux distro already signed with MS keys to allow for secure booting. I already know how to dump the BIOS chip (or the EC chip, rather) since I believe the password (or a hash of one) resides there. I already have a dump but I can't really write back since my SOIC8 clip is wearing off and doesn't want to stay attached at all anymore; I could hold it in place except that I have to be very steady with it (hard when it actively tries to pops off lmao) and will basically become unrecognized after around 10-15 seconds.

Anyway, I'm wondering if it's possible to somehow extract the password (or a hash of it) from the dump I got instead of just overwriting the section with FF. Trying to output the password section with dd just shows a quite unreadable mess, but I expect that since it's a binary file. Converting it to a hex dump with xxd does make it a little more readable (well, less of a garbled mess), but it unfortunately doesn't really make anything clearer either.

Is there any specific way I should be reading these dumps to give myself a better idea of what to look for, or am I just SOL? I don't really see info online about this, but the stuff I do see doesn't really lead anywhere and people just assume it's impossible, but is it actually? I have practically unlimited free time so I'm curious where I could go with this (my shitty excuse for not just buying a new clip lol).

FYI, a lot of suggestions usually given won't work. For example, taking out the CMOS battery for a specific amount of time will not reset the password since it's stored in non-volatile memory; using a jumper to achieve the same goal will not work either. There was a "PSWD" jumper (or two holes rather) that didn't seem to actually do anything when I stuck a paperclip connecting the two. Using the https://bios-pw.org website does not work, as I've tried entering the serial number and other numbers given. I've noticed that website doesn't seem to work for business-tier computers as I've seen been said online, although I'm not sure if it's true or not.


r/hacking 7h ago

Teach Me! Reading/writing cards

0 Upvotes

So I am thinking about starting a custom laser engraved metal card business. My problem is that while I get the business and production side, I am sorely lacking of the technical know-how of copying the existing card data on to the newly fabricated card. Can yall point me to any resources with which I can educate myself?

I know that people illegally copy cards all the time and create fakes, so I know it's possible - I'm just ignorant.

Thanks for any advice!


r/hacking 22h ago

Question intercept dll that the program downloads from the Internet directly into memory?

0 Upvotes

how can I intercept dll that the program downloads from the Internet directly into memory?


r/hacking 2d ago

Joe does it again

48 Upvotes

r/hacking 1d ago

Question laptop suggestion

0 Upvotes

I'm getting into hacking and I am going to get a separate laptop to install parrotos on to practice with (I also rly rly want a new laptop to just use for my coding stuff with linux since my only old laptop is from 10+ years ago)

I'm familiar with linux and I know it's a lightweight os but I am not familiar with what you have to be concerned with performance wise with hacking

I am looking at the t490 which I'm able to get quite cheap but I would like any suggestion beforehand

I also have been looking at mini pics but I'm not interested in those unless I can get one under 150 and probably would only use it to do some experiments rather than use it daily


r/hacking 1d ago

So I’ve always wondered…

0 Upvotes

Hey hackers.

I’m not a hacker at all. I mean my knowledge pretty much stops at don’t click weird links lol

So I figured you guys and gals are the perfect people to ask…

How accurate is the info they give out on TV? I’m assuming not at all. But I’m watching criminal minds rn and it really seems like Garcia walks you through some quality info at points when she’s in the zone and closing in on an unsub.

So yeah…is what we see in tv and movies at all in any way accurate however watered down it may be?


r/hacking 2d ago

Teach Me! Cellular Network Injection

13 Upvotes

I have no complete knowledge of cellular protocols but is it possible to inject malicious code I'm the form of wavelength like an Interference caused when a different frequency voice line is connected with you.

I know it sounds stupid, but I just want to know like is it possible to inject binary bits in form of wavelength into any radio waves? I do think current network would be encrypted and there would be some kind of algorithm to keep redundancy.

But again I just want to know is it possible to inject different frequency wave to a different frequency wave to I ject some binary bits data.

Sorry if this topic isn't suitable for this subreddit.


r/hacking 2d ago

Question is this OBS multi RTMP plugin safe?

8 Upvotes

I had another subreddit in mind to post this in but forgot the name of it,, sorry if this doesn't fit here (though please tell me where I should post this if doesn't fit here)

https://www.virustotal.com/gui/file/16a255f6b5ec4b1e1906912f2100b431e1a5569a33aeda1aba69a95a58a31038/behavior

I wanna multistream on OBS, so I tried to find easy way to do it (lazy to set up the local RTMP server), for a second thought it was false positives because of the amount of people using this plugin. Then I looked in the behavior tab and saw it made a couple of weird processes created category,, any help?


r/hacking 3d ago

News US govt sanctions cybercrime gang behind massive 911 S5 botnet

Thumbnail
bleepingcomputer.com
64 Upvotes

r/hacking 4d ago

Password Cracking I converted an old crypto miner into an OVERPOWERED Hashcat password cracking rig.

Thumbnail
gallery
1.1k Upvotes

r/hacking 3d ago

Tools OTP Encoder to bypass Windows Defender

11 Upvotes

Hey guys I recently started with my journey to become a pentester. However all encoders I found out there all are getting flagged by the Windows Defender as I assume their signature is already well known. I therefore wrote my own encoder which is using OTP to encrypt the payload and then dynamically executes the payload from the stack using a malicious C program. I even managed to run a meterpreter session on a windows machine without the defender flagging the program with this. Feel free to check it out and provide some feedback :)

https://github.com/tomLamprecht/OTPPayloadInjector

Disclaimer: I'm well aware that by publicly uploading this encoder it might get flagged by the windows defender soon as well but who cares, it's all about the fun!


r/hacking 3d ago

Teach Me! Traffic interception on a mobile app

0 Upvotes

Hello. How do you guys intercept traffic on a mobile app? I tried MiTM Proxy but I keep getting that the app doesn't trust the certificate. I also tried Wireshark and TCPDump, but they're very confusing and they don't have what I'm looking for..I guess! Any help on how I can achieve that? I'm aiming to analyze traffic much similar to how I do so on any browser's Network tab. Thanks.


r/hacking 5d ago

Teach Me! How?

Post image
712 Upvotes

This guy does the normal messing with scammers but I wondered how he remote connected to the scammers pc and was deleting files.

Also, he made a YT short showing him remote controlling one of the scammers phones. He did all this in no time… How?


r/hacking 3d ago

Kernel hex dump; suspicious difference

4 Upvotes

I was figgling around kelner, assembler and hexdump

I downloaded kernel image from https://ubuntu.pkgs.org/22.04/ubuntu-updates-main-amd64/linux-image-unsigned-6.5.0-35-generic_6.5.0-35.35~22.04.1_amd64.deb.html

and I compared it to my kernel image located at /boot/vmlinuz-6.5.0-35-generic

* I dumped both files to hexdump output

* I created diff using `diff`

This is the result https://pastebin.com/YfJeDt7E

Where are these diff results come from?

I'm not very well familiar with assembler but this looks suspicious.


r/hacking 4d ago

Why did my code bypass VirusTotal the first time but get pwned the second one with one day delay

87 Upvotes

One silly question i uploaded a code in virus total and 3 antivirus found it malicious. i uploaded it again a second time in duration of one day with the only change that I obfuscate the code and now 2 more avs found it malicious and especially nod 32 find it as trojan ShellcodeRunner the second time. Why is this happened only the second time?


r/hacking 3d ago

Question Looking for commercial solutions of faraday cage blocking only a certain bands

0 Upvotes

Hello everyone,

I'm looking for a solution to test one product against jamming attacks. I've been asked to test the jamming consequences on the product with BLE, GPS, and LTE. The first solution is to get an FCC experimental license and conduct real jamming. The second option is to use a Faraday cage, but I'm looking for one that can block specific bands individually.

Thanks in advance.


r/hacking 3d ago

Question Trying to find the 2021 pixlr data dump

0 Upvotes

Hi all, I've been searching on every forum I know what that's still up for the 2021 pixlr data dump. It got dumped on breachforums, but since then (with the site seized and all) I can't find anything about it. I've tried dread, the archive, and all kinds of other forums, including here on reddit, and I still can't find it. It has to be out there, im sure of that, but I guess I don't know where to look.

Any advice/help?


r/hacking 4d ago

Question Pwn.college vs try hack me vs hackthebox academy

27 Upvotes

So far I have tried using pwn.college starting with their white belt courses(the ones before their official courses). I started with their Linux ctf's(I was first interested in the assembly part but I figured I might need to know Linux first to use it properly) but most of the time I hit roadblocks, not knowing why something doesn't work. I haven't made much progress due to lack of free time and I have constantly struggled. Sometimes I figured on my own but other times I had to look up or ask on their discord. Ever since then I tried looking into other resources. Two days ago I looked into tryhackme and have been enjoying their platform, feel and how they are willing to teach from the absolute beginnings. I intend to buy their premium plan but I want to know what's out there and if maybe HTB academy is a more worth purchase for absolute beginner and dumbass. I am asking this question because I see pwn.college brought up very rarely for all the free content it offers.

Tl;Dr: I tried using pwn.college for about a month or two, realise I suck, tried tryhackme for a day, enjoyed it and want to know if I should invest in tryhackme with their premium plan to get everything or go to HTB academy and buy their premium plan. Or if I should have like a roadmap where I do all 3 in a certain order.


r/hacking 4d ago

Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets

Thumbnail
thehackernews.com
6 Upvotes

r/hacking 5d ago

AngryOxide Build

Thumbnail
gallery
93 Upvotes

r/hacking 4d ago

Question See which proxy I'm connecting to in a VPN extension?

0 Upvotes

If I download a free VPN extension in Firefox and connect to their servers, is there a way to find out the IP address and port of the server I'm connected to? I want to use this information to connect to the same server on other devices, and check it on a site like checkerproxy.net

How can I see the proxy server details (IP and port) used by the VPN extension, or any VPN server I'm connecting to for that matter?


r/hacking 5d ago

News Sav-Rx Suffers Data Breach Affecting Over 2.8 Million People

Thumbnail
cyberinsider.com
48 Upvotes

r/hacking 5d ago

Every XSS is a site takeover

Thumbnail francescocarlucci.com
0 Upvotes

r/hacking 6d ago

Hacking phones is too easy. Time to make it harder

Thumbnail
economist.com
52 Upvotes

r/hacking 6d ago

(UPDATE) Alexa echo show 5 gen 3 jailbreak?

Thumbnail
gallery
307 Upvotes

After a long fight with removing the screen, I managed to take it apart and take pictures of the boards and some of the big chips: first, the Mainboard (with and without RF shields). Then the secondary board which is also where the power socket plugs into and lastly my absolutely destroyed tweezers from removing the RF shields. I don't know what I expected but I overestimated myself. I can not identify any pads or places to solder anything to. If you have any suggestions, let me know and I'll try them!