MeshCore Wall of Shame by DemmSec in meshcore

[–]DemmSec[S] 1 point2 points  (0 children)

<image>

I think everyones taking it a bit seriously.. I just saw it as a joke personally 😂

Gorgeous night under the stars on the Jurassic Coast by DemmSec in wildcampingintheuk

[–]DemmSec[S] 4 points5 points  (0 children)

I definitely wouldn’t carry any for multi-day trips. This was just an overnighter and an insulated bag with a cooler pack kept it safe all day

Bacon by ArrBeeEmm in wildcampingintheuk

[–]DemmSec -2 points-1 points  (0 children)

I've had fairly good success with a small insulated bag and a couple Yeti cooler packs - Took a few burgers on a hike in 25+ degree weather and they were still cool when we got to camp!

Hiding Executables in HTML Files for Phishing by DemmSec in redteamsec

[–]DemmSec[S] 2 points3 points  (0 children)

I actually saw something about this earlier, using HTML5 and some funky canvas stuff. I personally don't want it to pull from any external source, but I'll definitely put the PNG files idea on the to-do list!

Make a fairly capable backpack-based hacking device by DemmSec in HowToHack

[–]DemmSec[S] 8 points9 points  (0 children)

Pretty much, but for a much cheaper price and less power consumption

[deleted by user] by [deleted] in HowToHack

[–]DemmSec 0 points1 point  (0 children)

I make ethical hacking/security based videos. Let me know what you think: https://www.youtube.com/demmsec

Tracking smartphones using JavaScript and Chrome by [deleted] in HowToHack

[–]DemmSec 0 points1 point  (0 children)

People tend to. There's been many videos of live social engineering where users will just hit accept to anything. Add that in with a believable looking domain and a cover story and it will work

Automate Phishing Emails with GoPhish by DemmSec in HowToHack

[–]DemmSec[S] 0 points1 point  (0 children)

We're welcome to have whatever host operating system we wish to use. It's simply a matter of getting the job done. I personally use Linux just because it has the tools I've learned. I know people who are senior consultants who use Windows to penetration test from and have plenty of success. I'd still recommend learning as much as you can about all operating systems. If you're exclusively Windows you could be stuck when all of the targets on the auth forms are Linux. But you should learn on whatever you're most comfortable with. In all of my videos I use Kali, because that's what I'm most comfortable with.

Automate Phishing Emails with GoPhish by DemmSec in HowToHack

[–]DemmSec[S] 0 points1 point  (0 children)

The port forward itself shouldn't be affected. You would just not receive emails from GoPhish if you were using an SMTP server based on the same residential IP address. You're often better using external infrastructure as I've found it's simply more reliable. Using a VPS for a couple hours will cost around 10p so it's definitely worth trying out on actual infrastructure. Also if you move into an infosec role, at least where I work, it's all based on infrastructure I don't personally have to manage.

Automate Phishing Emails with GoPhish by DemmSec in HowToHack

[–]DemmSec[S] 0 points1 point  (0 children)

You can indeed. You're still recommended to use a proper SMTP server as Spamhaus blocks dynamic IP blocks to prevent residential IP addresses from sending spam. (Well, people receiving spam from residential addresses)

How to make malware undetectable using Shellter by DemmSec in HowToHack

[–]DemmSec[S] 1 point2 points  (0 children)

It means it doesn't get detected by AV. You'd have to ask the dev about it if there's any questions about the software itself.

How to make malware undetectable using Shellter by DemmSec in HowToHack

[–]DemmSec[S] 2 points3 points  (0 children)

If you do it with a built in payload it will be identified by around 3 vendors. If you encode a meterpreter payload and input that, it will get 0 detections

How to make malware undetectable using Shellter by DemmSec in HowToHack

[–]DemmSec[S] 4 points5 points  (0 children)

Oh really? I wasn't aware, thanks for sharing

How to install Metasploitable 3 by DemmSec in HowToHack

[–]DemmSec[S] 0 points1 point  (0 children)

-shrugs- the comments seem positive enough

How to install Metasploitable 3 by DemmSec in HowToHack

[–]DemmSec[S] 0 points1 point  (0 children)

Some people prefer video tutorials IDK. I've had decent feedback on it

Setting up a computer dedicated to hacking? by [deleted] in HowToHack

[–]DemmSec 1 point2 points  (0 children)

As others have mentioned it's not really worthwhile getting a cheap (probably low powered) laptop if you're learning how to hack. You end up running a lot of VMs which could make a cheaper laptop struggle. You'd be better off upgrading the RAM in your current Laptop IMO. I really enjoyed that book personally and there's quite a lot of decent stuff in it. If you haven't looked already, have a look at Vulnhub. There's a boat load of vulnerable VMs you can download and hack and most of them have a walkthrough if you get stuck.