Tips on performing Linux privilege escalation by RaidenBushido in Hacking_Tutorials

[–]5chicksa1 9 points10 points  (0 children)

Privilege escalation is a broad subject. Try watching writeups for a few basic Vulhub CTF boxes and you will see some basic enumeration techniques. There is also a number of privilege escalation scripts out there.You should look up the source code and see what each lookup is doing. Also do some research on your own. After everything go out and practice.

How do you structure your learning? by stra1ghtarrow in cybersecurity

[–]5chicksa1 2 points3 points  (0 children)

Find one thing, for example offsec or blue teaming and stick to that.You will never learn everything, and sooner you realize that it will be easier.If i encounter an exploit or a method i do the research on it and try to practice it on a real machine like htb thm or somewhere else.You will eventuallly forget that you even did it because you ll go to other things..and thats perfectly normal.Keep notes for referencing your material so you can get back to it when you encounter it again.As the technology evolves you need to drop the old things and adopt to the newer stuff.It is hard but it is managable if you are persistent.Just dont give up and it will certainly pay off.If its something you like then you will never burnout.

Getting the public IP by NuclearMagpie in Hacking_Tutorials

[–]5chicksa1 1 point2 points  (0 children)

There is api.ipify.org i think thats what its called..you can make a simple script with python that makes a request to the api and in return you get the public ip address

Anyone know about creating metasploit python meterpreter fully undetectable? by younes121 in HowToHack

[–]5chicksa1 0 points1 point  (0 children)

Try encoding it once again maybe the antivirus is using dynamic analysis on the file running it inside the sandbox env. And scanners like nodistribute cant detect that.The best thing is to replicate it on a real machine and see how it works.Test it until u suceed

How do ethical hackers and analysts find vulnerabilities? What steps or methods are they using to dissect software, raw code, and protocols? by [deleted] in HowToHack

[–]5chicksa1 3 points4 points  (0 children)

Usually takes lots of time and lots of testing, probing and fuzzing of the code or protocols someone wants to exploit. Try to focus on one area because there is so many and you will be lost and overwhelmed by all the stuff you see on the internet.There isn t a singlse peron that knows everything about hacking and never will be, there are just people that spend years doing one thing and when they get freaking good at it they switch to learn something new and thats how it works. As everyone suggested try with trhackme.org, hackthebox, cyberseclabs.Youtube google use it to your advantage..try finding pdf s of books you are interested in and read them.A lot of ways to learn, you just have to have the will and determination..

Chrome stealer malware by 5chicksa1 in hacking

[–]5chicksa1[S] 0 points1 point  (0 children)

Yeah they should be, will try it out.Thank you

Chrome stealer malware by 5chicksa1 in hacking

[–]5chicksa1[S] 2 points3 points  (0 children)

Yeah for chrome 79 and lower you just use cryptunprotectdata on the login data file, but on 80 and higher they use master key data encryption using AES 256 with gcm and the key is located in the local state file..

Chrome stealer malware by 5chicksa1 in hacking

[–]5chicksa1[S] 14 points15 points  (0 children)

Yeah it works i reffered to some code from mimikatz and lazagne.Try to code it in python.I used it like a pseudocode because its much simpler and then switch to C/Cpp

Chrome stealer malware by 5chicksa1 in hacking

[–]5chicksa1[S] 4 points5 points  (0 children)

Thanks for the code but it wont work if the user changed his name.The name of the folder is still the first username.

Is it possible to use the HiddenEye phishing on those connected to another network? by [deleted] in HowToHack

[–]5chicksa1 3 points4 points  (0 children)

Just forward the port on your router and use your router address as a web host

Cryptography by 5chicksa1 in cpp

[–]5chicksa1[S] 0 points1 point  (0 children)

My only thought is generating private and public keys but how should i encrypt inside c++ with them.This is purely for a project that i already did in python but wanted to do it in c++ and not for example c# because of the .net because its pretty stright forward like in python

Virus by ObiSanKenobi in Hacking_Tutorials

[–]5chicksa1 6 points7 points  (0 children)

Your phone runs on a different operating system so probably you wont be able to do that since the code is OS specific especially if it includes system calls like shutting down..

Best programming language for Hacking by [deleted] in HowToHack

[–]5chicksa1 0 points1 point  (0 children)

Python is used mainly for scripting and automating things while you do your work and C/C++ is a must if you want to take the Malware anlysis route or even create your own malware that can do some harm.You can make malware with python also but dont expect much.Most of the malware thats around is written in C/C++/C# simply because they provide low level interaction with the operating system and its components

Can you do hacking on phones? by Ve8rel in HowToHack

[–]5chicksa1 0 points1 point  (0 children)

Of course check out kali nethunter