[ cyb / tech / λ / layer ] [ zzz / drg / lit / diy / art ] [ w / rpg / r ] [ q ] [ / ] [ popular / ???? / rules / radio / $$ / news ] [ volafile / uboa / sushi / LainTV / lewd ]

cyb - cyberpunk

“There will come a time when it isn't "They're spying on me through my phone", anymore. Eventually, it will be, "My phone is spying on me.””
Name
Email
Subject
Comment
File
Password (For file deletion.)

BUY LAINCHAN STICKERS HERE

STREAM » LainTV « STREAM

[Return][Go to bottom]

File: 1435223004517.jpg (181.57 KB, 1280x720, HackingGeneral.jpg) ImgOps Exif iqdb

 No.12423[View All]

Thread theme: https://www.youtube.com/watch?v=c6tQzMhqhLc

>College Course General howto https://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html

books needed for course Web application handbook and Hacking the art of exploitation

>hacking bootcamp mostly web appication: https://pentesterlab.com/


>Free online courses: http://www.cybrary.it


>Wargames

hack.me
https://exploit-exercises.com/
https://www.vulnhub.com/

for reversing, we have a thread for that already!
141 posts and 19 image replies omitted. Click reply to view.
>>

 No.15718

>>15717 I'm not >>15710 btw.

>>

 No.15719

>>15704
I didn't try the magnet, I copied it from kickass.to.
torrentz.eu is a good search too.

>>

 No.15720

>>15719
Oh, I'm guessing you mean this one: >>12432 and it got a part cut from pasting it as an email.
Thanks, but that torrent only includes the course "Penetration Testing and Ethical Hacking" and I'm looking for the A+ one.

>>

 No.15723

>>15720
That's the one, I didn't know they were different things, sorry.

>>

 No.15726

>>12493
Eat some addys and read TCP/IP Illustrated.

>>

 No.16052

Hey /HG/ You plan to write a tutorial for the zine?

>>

 No.16061

Juicy, easy to follow pwnage of an anti-virus product. Bonus points for clever usage of command line, check it out http://googleprojectzero.blogspot.de/2015/09/kaspersky-mo-unpackers-mo-problems.html?m=1

>>

 No.16090

Does anyone browse null byte?
http://null-byte.wonderhowto.com/

>>

 No.17233

Hey, i'm doing a CTF and my whole network is all web server / app stuff, any advice Lainion's

>>

 No.17248

>>15678
hack it

>>

 No.17253

>>15076
I'm looking to get into overthewire pretty soon. I've been avoiding it because I'm a newb and a bit paranoid about ssh-ing into someone else's server.
I don't even know if a server is capable of exploiting the client but I've been unreasonably nervous about it.

>>

 No.17271

>>17253
Just use a VM. It's perfect for Kali.

>>

 No.17290

>>14990
is poison ivy seriously a windows program? fuarrrking why m8

>>

 No.17460

>>17290
It's a RAT designed for Windows. No soykaf it's a Windows program, why would it not be?

FFS

>>

 No.17469

Checkout wechall.net for wargames. It regroups most other webistes.

>>

 No.17636

File: 1444976468994.pdf (4.7 MB, csapp.pdf)

Seeing as peeps keep mentioning the usefulness of learning the inner working of a computer, here's Computer Systems for a Programmer's Perspective.

Its a good read, enjoy!

>>

 No.17639

anybody save the social engineering thread?

>>

 No.17644

>>17639
Soykaf, no, but I do have some of the books.

Feel free to make a new thread about it!

>>

 No.17649

>>17644
This is why this chan needs a temporary archive like 4chan. It's too easy to not save a thread because posts are so infrequent that you wait and and check (likely forget) periodically to see if there any new posts so you can save it at when it's most content heavy. Too bad that's when it fuarrrking dies.

>>

 No.17981

i made a tiny thing today
http://141.255.164.34/

>>

 No.18498

File: 1446227616928.png (347.45 KB, 1920x1080, l33thax.png) ImgOps iqdb

Am I doing this right?

>>

 No.18701

>>17639

I saved something about hacking at humans from that thread that I tried to post more than once in this thread, is there anything beyond selecting files to place below in the box? That's what I have been doing, but it isn't posting...its my first pdf to post, don't hate, honest mistakes.

>>

 No.18722

>>18701
Could you upload somewhere else and link it here?

>>

 No.18906

>>18722
Its up in volafile, the only pdf in there, since I obviously didn't think to put the name to it as I haven't looked at it myself yet, but its Soc Eng: Art of Human Hacking.

>>

 No.18949

File: 1446984366416.jpg (116.61 KB, 1280x720, 2450.jpg) ImgOps Exif iqdb

>>17981
OS: Unix (Samba 3.6.6)
| Name: WORKGROUP\Unknown
|_ System time: 2015-11-08 12:02:36 UTC-5

Close 135,445 please

>>

 No.19009

i just competed at a local ctf
i got killed because it was mostly full of people who didn't even know basic security

regardless it was lots of fun!

any CTF stories Lain?

>>

 No.19039

>>15198
People calling other people skiddies as a kneejerk response is what's killing the community. The majority of situtuations you'll ifnd yourself in if you ever manage to try to run a personal army op is this: A bunch of ideas guys egging on a few somewhat competent individuals. While all the dissenting opinions are being shot down with "shut up skiddy."

As cyb as you think hacking is, it's a rather boring exercise in patience. 99% of the time you'll either have an automated script fuzzing for low hanging fruit, and the %0.9 is weeding past false positives, while the %0.01 are actual success rates for something that isn't absolutely trivial.

>>

 No.19088

Great read for noobs flew by on HN today https://blog.filippo.io/the-sad-state-of-smtp-encryption/

>>

 No.19100

>People calling other people skiddies as a kneejerk response is what's killing the community.
How? It only gets script kiddies to fuarrrk off. And nobody likes them anyway.

>The majority of situtuations you'll ifnd yourself in if you ever manage to try to run a personal army op is this: A bunch of ideas guys egging on a few somewhat competent individuals. While all the dissenting opinions are being shot down with "shut up skiddy."

Wow, so if I'm a massive script kiddy trying to "run a personal army op" then I can expect to be egged on by other script kiddies and telling people who disagree with me to shutup? How surprising!

>As cyb as you think hacking is, it's a rather boring exercise in patience. 99% of the time you'll either have an automated script fuzzing for low hanging fruit, and the %0.9 is weeding past false positives, while the %0.01 are actual success rates for something that isn't absolutely trivial.

Maybe if your job is auditing things, or if you're a script kiddie and that's all you know how to do.

>>

 No.19106

File: 1447315091001.png (2.86 MB, 1920x1080, lockscreen.png) ImgOps iqdb

>>19039

>As cyb as you think hacking is, it's a rather boring exercise in patience. 99% of the time you'll either have an automated script fuzzing for low hanging fruit, and the %0.9 is weeding past false positives, while the %0.01 are actual success rates for something that isn't absolutely trivial.


If hacking is this boring for you, you need to find a different pastime.

I have lost track of hours sitting balls-deep in assembly, lost in the massive puzzle that is reverse-engineering. There is nothing more stimulating figuring out with exploits work, fine-tuning them, revising shellcode, all in pursuit of that dopamine-soaked moment when you get shell on the box.

Hacking is by far the most rewarding hobby I have. It doesn't sound like anything you described.

>>

 No.19127


>>

 No.19130

>>19106
You sound like someone speaking fiction, that's nothing like hacking in real life.

>lost in the massive puzzle that is reverse-engineering

Reverse engineering is pretty easy, it's not some huge mystical puzzle. And what's

>fine tuning an exploit

You've probably never developed an exploit in your life, what the fuarrrk is "fine tuning"?

>Reversing shellcode

now I think you're just using buzzwords.

I've been in the computer security industry for five years and have been hacking soykaf since I was 12. NONE of it is like you described, unless I'm trying to impress girls at the bar or something.

>>

 No.19134

list of past ctf's with various challenges!
ranging from crypto to offsec, reverse engineering.

>>

 No.19153

>>19130
19106 wrote 'revising shellcode',
not reversing.

>>

 No.19168

>>19106
Assembly is a pretty good language, I read a book on COBOL a while back that was some 1000 pages long. But yeah assembly is something a lot of people need to read over if they want to get familiar with hacking stuff

>>

 No.19172

>>19168
It depends on what type of hacking you're trying to get in to. If you're looking to develop exploits in software and reverse-engineer shit, then yes, you'll need to pick up a book on 80x86 ASM, whatever syntax suits you better.

If you just want to use other people's exploits or publicly known exploits to wreck servers, then you don't need to know any of that. It all depends.

>>

 No.19214

a directory of recordings from various infosec/hacking cons:
https://infocon.org/

>>

 No.19219

>>13435
Wouldn't making an img of a hdd (with windows/anything else vulnerable installed) and uploading it somewhere be easier?
You could run it in a vm, and lots of people have old towers lying around so they could put the img on their own hardware, and do it in sortof hardmode.

Or am I missing some sort of point here?

>>

 No.19224

>>15214
But what where you before you knew your soykaf? I mean, I'm just a 15 year old skiddie, and I'd like to grow above being one, if that's possible.
I'm studying for the CAE linux+ exams (I already knew most of what I saw in the A+ exams), I guess I'm sufficient in PHP, and I sorta know regexp'es and stuff, I've also read clean code, the pragmatic programmer, basic mathematics by serge lang, and some other books on compsci, programming and maths. What would the next step in de-skiddy-ing be?

>>

 No.19323

File: 1447578630435.png (144.01 KB, 469x344, 5013510 _2bd928200fce70514….png) ImgOps iqdb

>>19130
Fine tuning an exploit would be removing any bad characters in your shellcode (0xff and 0x00 come to mind) as well as making it more stable. Sometimes you need to add a jmp instruction to somewhere with more space to work with. Developing an exploit from a vulnerability you found requires fine-tuning. Its the difference between a program crash and actually getting shell on the target.

Reread my post. I didn't say reversing, I said revising, for the same reasons as above. Shellcode can be too large, requiring stub code or an entire rewrite for more elegant approach.

Both exploit fine-tuning and shellcode revising are essential not only for exploit development, but also if you pull down exploits from a public website. Even the public exploit rarely work without some re-working, which requires you to kind of know what you are doing.

In short, exploits don't just happen.There is still a lot to do even after you notice a vulnerability. I don't get why you are so angry. If you don't like it, you should probably stop doing it. The whole process is fun and exciting to me, but maybe it's just a job to you.

Also, if you know a bar where there are girls who are impressed by this kind of stuff, please share the info. That bar sounds awesome.

>>

 No.19325

File: 1447579296327.jpg (112.18 KB, 775x1029, touching.jpg) ImgOps Exif iqdb

>>19323
>Also, if you know a bar where there are girls who are impressed by this kind of stuff, please share the info. That bar sounds awesome.

I second this, I'll be very interested to know where to find decent girls interested in CS and security

>>

 No.19340

>>19323
>If you know a bar where there are girls who are impressed by this kind of stuff
I know plenty of gay bars where people would be interested in this stuff if you're feeling adventurous.

>>

 No.19345

>>19224
Participate in CTFs. Do past CTFs. Read writeups. Read papers, blog posts, practice on hackmes. Read about opsec.

>>

 No.19527

>be me
>12 years old
>"I wanna be a supa 1337 h4x0r!"
>start by learning Objectionable-C
>big mistake
>anyway...
>fast forward a few months
>I've wised up a bit at this point, still don't know soykaf about actual compsec
>mfw I find out about SSH
>feellikeaboss.jpg
>quickly learn it's not invincible
>fast forward some more
>find out about open ports and ssh for phones
>well then
>keep learning
>find more cases of ultimate hax that aren't so great
>untill you learn more about them

Moral of the story is that trying to find the ultimate hack is for plebs. Don't be a skid, learn about computers if you wanna hack them. Also, Objective-C is like kicking dead whales down the beach .

>>

 No.19679

I need help from someone who knows whats going on.
I am starting on Shellcoders Handbook and I am already experiencing difficulties on chapter 2 overflow.c
The idea is that I have to put the adress of call to return_input into adress after function return_input ends.

0x08048422 <+0>:push %ebp
0x08048423 <+1>:mov %esp,%ebp
0x08048425 <+3>:and $0xfffffff8,%esp
0x08048428 <+6>:call 0x8048404 <return_input>
0x0804842d <+11>:mov $0x0,%eax
0x08048432 <+16>:leave
0x08048433 <+17>:ret


0x08048404 <+0>:push %ebp
0x08048405 <+1>:mov %esp,%ebp
0x08048407 <+3>:sub $0x28,%esp
0x0804840a <+6>:lea -0x1e(%ebp),%eax
0x0804840d <+9>:mov %eax,(%esp)
0x08048410 <+12>:call 0x8048310 <gets@plt>
0x08048415 <+17>:lea -0x1e(%ebp),%eax
0x08048418 <+20>:mov %eax,(%esp)
0x0804841b <+23>:call 0x8048320 <puts@plt>
0x08048420 <+28>:leave
0x08048421 <+29>:ret

Basically what I need to do is put "\x28\x84\x04\x08" at end of 36 A's as piped input to ./overflow. Whenever I do that I just get segmentation failure and it doesn't return the input twice but just once.
Am I putting too much/little of A's? Am I fuarrrking up something?
I already had to do -fno-stack-pointer to allow me to smash the stack, is there any other flag I need to put up?
Thanks in advance

>>

 No.19680

>>19679
here's the overflow.c

void return_input (void)
{
char array[30];

gets (array);
printf("%s\n", array);
}


main()
{
return_input();

return 0;
}

>>

 No.19681

>>19679
>>19680
Okay, yea, I fixed the problem
I was putting too many A's (had to put 34 instead of 36)

>>

 No.19683

>>17233
That's a very vague question anon. What exactly do you need advice on?

>>

 No.19684


>>

 No.19778

If you're going through Shellcoder's handbook and are experiencing problems with Address space layout randomization(different stack pointer address every time) just simply do

sudo /sbin/sysctl -w kernel.randomize_va_space=0



Delete Post [ ]
[ cyb / tech / λ / layer ] [ zzz / drg / lit / diy / art ] [ w / rpg / r ] [ q ] [ / ] [ popular / ???? / rules / radio / $$ / news ] [ volafile / uboa / sushi / LainTV / lewd ]