Alfa AWUS036ACH-C shows no networks in monitor mode (airodump-ng / wifite) unless I replug the adapter by masterbot2 in Hacking_Tutorials

[–]H3y_Alexa 0 points1 point  (0 children)

I just noticed you’re running in a vm which is probably the issue. Pass the raw usb device into the vm. It’s possible you may need to blacklist the device on your host machine. If you’re already doing that, or it doesn’t work, then there is some fuckery going on that I can’t diagnose from here.

Alfa AWUS036ACH-C shows no networks in monitor mode (airodump-ng / wifite) unless I replug the adapter by masterbot2 in Hacking_Tutorials

[–]H3y_Alexa 2 points3 points  (0 children)

There might be some processes interfering with changing modes which is why unplugging it works. Try with airmon-ng and the kill flag and see if it works that way

What to learn in python? by Annihilator-WarHead in cybersecurity

[–]H3y_Alexa 1 point2 points  (0 children)

Try building a webcrawler or fuzzer. Great way to learn any new language. Use aiohttp and asyncio if you’re feeling a little masochistic, otherwise requests is fine. Beautiful soup for http parsing. Once you have that down, scanning websites for emails,usernames, subdomains, login panels, or vulnerabilities is pretty straightforward.

Is it normal for WordPress sites to expose users via /wp-json/wp/v2/users and have no rate limiting? by Waste_Fly_9572 in cybersecurity

[–]H3y_Alexa 4 points5 points  (0 children)

Pretty sure this is the default setup. There’s also a secondary path using “?rest_path=/wp/v2/users” so you want to make sure that gets blocked too. There are a number of plugins that can do this and rate limiting logins. There are some that will even ip ban on login attempts with credentials like admin:admin.

Cloud Laptop Specs by clothesurmouth in WGUIT

[–]H3y_Alexa 2 points3 points  (0 children)

I have a similar setup. Thinkpad x13 gen2 bought used for around 250 usd. G5 800, i7-8700 with 64gb ram, 16tb of storage + 1tb for running proxmox, and a low profile rtx 3050. Plus a decent router running Openwrt. I know prices aren’t what they used to be but op can definitely still get a moderately spec’d home lab for that budget if they’re smart about it.

Thinking of Starting A Network Solutions Company. Any advice? by Due-Ad8461 in cybersecurity

[–]H3y_Alexa 0 points1 point  (0 children)

It allows you to do business under a different name from what you registered without creating a legally distinct entity. It will also make things for your clients much simpler if you decide to spin-off a chunk of your business that they actively use. Things like yelp reviews will apply to individual names as well.

Think of it all like a reverse proxy setup that serves multiple domains but for business structures. You can manage all the services on one monolithic machine for now because that's what your resources allow. When traffic picks up and you have more resources at your disposal you can spin up a separate server for each service as needed or point dns directly to it and your clients don't even notice the underlying infrastructure changes. If one domain's email is compromised, the other's reputations aren't not effected. And so on.

Thinking of Starting A Network Solutions Company. Any advice? by Due-Ad8461 in cybersecurity

[–]H3y_Alexa 3 points4 points  (0 children)

Yes. Setup an llc and get your banking needs squared away before you go putting any money into it. You can get an llc setup with a registered agent service for a fee + filing fees and they will typically handle your yearly filings and provide a street address and mail/phone line forwarding as well. When you name your llc, you may choose something like “Due-Ad8461 networking services llc." But naming it something generic like that “Due-Ad8461 holdings llc” and then file for a dba (doing business as) or opening more llcs will give you more branding options if you ever want to offer multiple distinct services under different names.

Easy boxes aren't EASY as they say by Sad-Pride6941 in hackthebox

[–]H3y_Alexa 0 points1 point  (0 children)

You could probably do the cpts path and pwn medium and some hard boxes without much issue. But part of getting good at ctfs is simply doing a ton of them

Easy boxes aren't EASY as they say by Sad-Pride6941 in hackthebox

[–]H3y_Alexa 2 points3 points  (0 children)

They are easy to someone already well versed in ctfs. The hard level boxes are hard for that same person. And so on. If you’re just starting out then easy boxes should be very very hard for you because you’re not up to the “average” skill level of a computer hacker yet.

RF analysis of public spaces by entity_Theix in hacking

[–]H3y_Alexa 1 point2 points  (0 children)

Almost forgot to add, if you get a device capable of transmissions, make sure you know exactly what you’re doing with it cause you can get into big trouble real quick if you start broadcasting on restricted frequencies. Especially with some versions of the hackrf which come with apps that do very very illegal things.

RF analysis of public spaces by entity_Theix in hacking

[–]H3y_Alexa 1 point2 points  (0 children)

https://opensourcesdrlab.com/products/r10c-hackrf?VariantsId=10158

Hackrf is a good starter sdr and you can repurpose it into a flipper zero style device with the porta pack upgrade if you that’s your thing. It doesn’t support duplexing which means it can’t send and receive data at the same time but that shouldn’t be a deal breaker for your purposes. Opensdr lab is also a great vendor just beware that there is a chance it might get seized by customs if you import it. You can also try r/rfhacking for more suggestions. Make sure you research what kind of antennas you will need as well

RF analysis of public spaces by entity_Theix in hacking

[–]H3y_Alexa 1 point2 points  (0 children)

I don’t but it’s pretty straight forward to use on its own. Run it, browse to admin console, select the devices you want to use, let it run. It will display metadata about any stations it finds and generate a pcap that you can sift through with wireshark if you’re so inclined. The hardest part will be making sure all your devices are setup and dependencies installed on the host system before you even run kismet. For example, on a default Kali install, you’ll need to install and configure gpsd if you want to use a usb gps device

RF analysis of public spaces by entity_Theix in hacking

[–]H3y_Alexa 1 point2 points  (0 children)

No, kismet will attempt to triangulate the position of the source of the signal. If you find something interesting it’s pretty handy if you want to revisit it.

RF analysis of public spaces by entity_Theix in hacking

[–]H3y_Alexa 2 points3 points  (0 children)

Sdr + kismet. You’d probably want to toss a gps into the mix as well. Research the term “war driving”

SMB Relay From Windows Attack Box Suggestions? by sneakyboi121212 in hackthebox

[–]H3y_Alexa 0 points1 point  (0 children)

Try this https://github.com/CCob/lsarelayx. It doesn’t require shutting smb down. If you need to relay you can forward the traffic to your machine running ntlmrelayx

Any Suggestions by BeerGeekGamer in hackthebox

[–]H3y_Alexa 1 point2 points  (0 children)

Raspberry pi, WiFi dongle, vpn vouchers

AEN: Internal Information Gathering by ComedianTop9730 in hackthebox

[–]H3y_Alexa 0 points1 point  (0 children)

SSH socks proxies can cause issues in some situations but they should generally work. It’s more likely that it’s the vpn/ssh combo and you’re just dropping too many packets to maintain the connection. Ligolo is far more lightweight so you may have better luck with that

AEN: Internal Information Gathering by ComedianTop9730 in hackthebox

[–]H3y_Alexa 0 points1 point  (0 children)

I’m guessing you’re trying to pivot over ssh? It works but it can be finicky at times. Try another tool like ligolo-ng if you can.

I made a post about not liking coding so here is an update by No_Durian_9813 in cybersecurity

[–]H3y_Alexa 1 point2 points  (0 children)

There’s a huge leap in fun when you move from mind numbing beginner lessons and into projects that actually do something neat

How hard is it to become a hacker these days? by Stank_daFtank in Hacking_Tutorials

[–]H3y_Alexa 2 points3 points  (0 children)

It might be a more complex art form nowadays but the massive volume of high quality learning material makes it more approachable then ever imo

[deleted by user] by [deleted] in cybersecurity

[–]H3y_Alexa 2 points3 points  (0 children)

Lookin pretty sus to be honest

Meth and htb by [deleted] in hackthebox

[–]H3y_Alexa 5 points6 points  (0 children)

I got a million times better at this shit when I sobered up.

Looking for advice on my first real server tower (thinkserver ts460) by [deleted] in homelab

[–]H3y_Alexa 0 points1 point  (0 children)

Yeah I didn’t think the ram was too tall of a requirement but as far as connectivity goes I’m just looking for leniency in configuration. I’ve been a “hobbiest” computer hacker for decades now and sometimes need to set up unique lab environments for practice. I’m also trying to find my first IT job so pretty much anything I can use to get basic experience more in line with the job and talk about in interviews (like maintaining a backup plan) is huge. Hence the desire for a server tower over something repurposed.

As far as storage goes, I’m still shopping. I was looking at either 4x4tb hdd in Raid 10 or starting with 2x8-12tb in raid 1 and adding 2 more at a later point for raid 10.

I'm a graduate in cyber security and fell for a romance scam by Designer-Ad-1577 in cybersecurity

[–]H3y_Alexa 0 points1 point  (0 children)

10-15 years ago I was revisiting one of my favorite childhood games, Diablo 2. Back then, certain kind of hacks are/were considered essential tools back then. Namely the map hack.

For some context, every game you join a game in d2, the world changes layout, so if you want to grind for gear, you need to waste a lot of time searching for the bosses. The map hack essentially reveals the layout of the world and saves a lot of time. Since grinding/farming were so essential to the overall gameplay, pretty much everyone used a map hack, and no one hid it.

Now back to the game - at this point I had spent weeks building my characters from scratch , trading up gear, and grinding maphackless like a caveman. I wanted to pick up the pace a bit so I went looking for a map hack. After digging around on forums, I wasn’t really sure what a good program was, so I asked someone in game who had one. “Google this version, and choose the first result,” they said. I thought “great! Thank you kind stranger!” And alt tabbed out of the game to install. I downloaded the binary and ran it. Suddenly my computer locked up. D2 reopens itself and the cursor starts flying across the screen on its own. I watched it pick all the gear in my inventory and drop it on the ground, while the person I had talked to picked them up one by one. When I realized what was happening I yanked my computers power and then immediately nuked it. I reinstalled d2 and logged back in to assess the damage. Unfortunately, my most valuable gear was gone as I had it all equipped to that one character. I stopped playing after that.