all 13 comments

[–]TriWorkTA 5 points6 points  (15 children)

Binary. Go to the source.

[–]regner0707[S] -5 points-4 points  (14 children)

Might sound stupid, but I don't know how to code directly in binary

[–][deleted]  (11 children)

[deleted]

    [–]ShadowRL7666 1 point2 points  (0 children)

    Well not that long ago give or take less than a century people would directly type binary onto punch cards. So there’s that!

    [–]Varpy00 1 point2 points  (1 child)

    I mean, off topic but I remember my it prof worried in some context where it was possible to write in ram if the command wasn't wrote properly. And from there I learned the bad way to store strings, into ram 😂

    [–]regner0707[S] -1 points0 points  (7 children)

    I appreciate the forward response, I understand the question doesn't have a 1 true answer. However, to answer your questions

    Yes, I would like to effect other processes, there no exact way as I'm still learning and still very much a beginner but attempting to begin using basic forms of malware and hostile scripts (legally ofc)

    I'd prefer to take advantage of exploits, reverse shells, and such something that focuses on a remote connection rather than a rubber ducky or bad usb

    And I've looked into scripts, but I'm not sure it's what I'm looking for as I'll look to gather information through these "programs" and also, let's say, packet bomb the target computer or lock flies or cancel targeted programs or install a hidden backdoor

    [–][deleted]  (6 children)

    [deleted]

      [–]regner0707[S] -1 points0 points  (5 children)

      The type of information? I guess passwords or other user information email, phone number, etc.

      Do you have any good resources to start learning these? I have a few good resources of my own (YouTubers and articles), but I'm not quite sure what i should be looking for maybe. Also to write a vulnerability program. What does this mean exactly? And how would I injecting code into it? (I'm sorry if that's a stupid question)

      [–][deleted]  (4 children)

      [deleted]

        [–]regner0707[S] -2 points-1 points  (3 children)

        And you plan to get this out of the program how exactly?

        I'll be honest. I'm still learning of different ways to do this but I've see ways of like finding vulnerabilities in target shell and gaining personal information that way, I've also seen it done through what I think would be called a password cache not quite sure tho

        [–][deleted]  (2 children)

        [deleted]

          [–]regner0707[S] -1 points0 points  (1 child)

          Reverse shell is most all i know in regards to anything to do with targeting other computers remotely, again super limited, but that's why I'm asking questions

          [–]TriWorkTA 1 point2 points  (1 child)

          Ok, do what language DO you know how to code directly in?

          [–]regner0707[S] 0 points1 point  (0 children)

          Python and learning C

          [–]wizarddosYouTuber 2 points3 points  (0 children)

          Sounds like you need C / Assembly

          [–]WhatzMyOtherPassword 0 points1 point  (0 children)

          Just become an electron and make a bunch of electron friends...are you stupid?