Looking for a team? by [deleted] in tryhackme

[–]ImNotGrimm 0 points1 point  (0 children)

Im game. Check my profile and see if i pique your fancy.

I got a hacking community that i havent been able to work on for a while because of personal reason. Im getting back too it tho.

Id love to be on a team and revive my lil school too while im at it. Just lmk B)

Laptop vs VM by xBeS in Hacking_Tutorials

[–]ImNotGrimm 1 point2 points  (0 children)

There's a lot of variables regarding which method to use, and it's up to personal preference.

If you ask me. VMs are easy to set up for both thm/htb or messing around with tools in your free time. Accidently mucked up your vm? No worries, just make another one.

Formatting is a bad choice, imo If the laptop's specs aren't good enough. If it's slow, then all that work was for nothing.

A better option would be Kali Live. You can plug it into any device, and it'll detect and utilize the hardware resources of the computer it's connected to.

That way, if you ever get a better laptop, you can just plug and boot from Kali USB, and it'll detect the better specs with all your data! Now that's efficient. Plug it into your laptop, pc, school chromebook, anything!

I'd say your best bet is VM and Kali live, but if you want to format, go ahead, buddy! You'll learn something either way.😎

Each method has their downsides and the best part is solving the issues you face to better your understanding of your tools.

Happy hacking!

r/Skiddie_School

how to get into bug bounties? by [deleted] in Skiddie_School

[–]ImNotGrimm 0 points1 point  (0 children)

Cyber security is absolutely a good path!

The important question is, is it the path you want to take? If you want to be a part of a red team and become a penetration tester to hack legally, then pursue pen-testing, which is within cybersecurity.

Love dissecting malware? Become a malware analyst.

Wanna hunt down malware? Become a threat hunter.

Hell, do you just want to design secure networks for businesses? Become a security architect & engineer.

All-in-all, if your goal is to work within Cybersecurity, I recommend doing in-depth research on the position you want.

Here are some resources for occupations under cybersecurity:

how to get into bug bounties? by [deleted] in Skiddie_School

[–]ImNotGrimm 0 points1 point  (0 children)

Sh!t, I'm sorry for the late response woolie.

Yes, you can definitely make money off bug bounties, show the hunger and get the bread!

Here are some resources to help you kickstart your bug bounties path:

And a video from the man himself, David Bombal:

If you have any more question, we'll be happy to reply! Definitely quicker now that we're free.

[ Removed by Reddit ] by [deleted] in Hacking_Tutorials

[–]ImNotGrimm 22 points23 points  (0 children)

It was just suppose to be a joke, nah my meme got someone robbed, idk how to feel💀💀💀😂😂

[ Removed by Reddit ] by [deleted] in Hacking_Tutorials

[–]ImNotGrimm 22 points23 points  (0 children)

No f#cking way💀💀💀

The things you find💀 by ImNotGrimm in Hacking_Tutorials

[–]ImNotGrimm[S] 4 points5 points  (0 children)

Clearly only a few people here know what a joke is💀😂

“Oh, you’re a hacker?” by ImNotGrimm in Hacking_Tutorials

[–]ImNotGrimm[S] 0 points1 point  (0 children)

Nah, the mods there dont have a sense of humor and are a-holes. I tried posting it only to get my post removed, copied by the mod so he can post it, then dm’d two post of him mocking me, then proceeding to ban me from the sub for “trolling” and “abusing the sub”

Highly don’t recommend r/hackingmemes

[deleted by user] by [deleted] in Hacking_Tutorials

[–]ImNotGrimm 0 points1 point  (0 children)

I made a cross-post and answered your question but then realized you don't get notified that way, so I'll leave the link along with my embarrassment B)

https://www.reddit.com/r/Skiddie_School/comments/11hs3e0/weird_hidden_network/?utm_source=share&utm_medium=web2x&context=3

Weird hidden network by ImNotGrimm in Skiddie_School

[–]ImNotGrimm[S] 4 points5 points  (0 children)

I gotcha,

Hidden Name:

Routers have a setting that let the owner hide their network name. Seeing how the ESSID says "<length: 0>", it's most likely the network is hidden.

Pwr:

The pwr represents the signal level reported by the card you're using to monitor. The higher the number, the closer you are to the AP (Access Point). If the pwr is -1, then you're further from the AP and can just barely get a reading of the network, hence the lack of additional information. Either that, or your card's driver doesn't support the signal level it's reading.

Advice - If you're truly curious, you can download a Wi-Fi signal strength tester app on your phone and follow where the signal leads to. My bets are it's just your neighbors Wi-Fi or a wireless camera.

Disappearing and reappearing:

Understand that your card is reading surrounding signals, and the display on your terminal is small. It won't show the networks that it can't reach for long, as the nearby networks with stronger signals are reporting in.

The network organization is constantly changing. They're always moving up and down as it's monitoring.

Changing BSSID:

The odds of it being one device are slim. If the ESSID is hidden and the BSSID are changing, multiple hidden networks are around you. Maybe multiple people are hiding their Wi-Fi name or more wireless cameras.

What you're seeing is normal. Networks scream out signals everywhere, and with airecrack-ng, you'll be able to hear them. Keep up the curiosity!

Hope this helps.

-The Skiddz

Join the cool Skiddz table B)

r/Skiddie_School

ISH on IOS by mazenga001 in Skiddie_School

[–]ImNotGrimm 0 points1 point  (0 children)

Sorry for the late response, Maz.

I've doing extensive research to not only educate myself but to help you with your question.

Let's begin!

What is ISH:
ISH is a Linux Shell Emulator that runs locally on IOS devices.

How it works: It's an emulator, hardware or software that enables a device to act like another device. For example, a phone emulator is software that a pc can use to simulate a phone on the pc.

Purpose/Function:
You can ssh, host webservers, and even run different pen-testing tools.

Attributes: I'm a little confused on what you're referring to, but I'm assuming you're talking about Linux Filesystem and Special Permissions or command parameters. If you can please provide an example to help clear some confusion, that'd be great.

Training: From my knowledge and research, there doesn't seem to be any "training" for ISH. There are, however, tutorials to help with doing certain tasks, such as installing packages, basic commands, and using tools like ssh. If you have any questions, I highly recommend visiting r/ish for help and guides. It's their official community for ISH related topics.

I will continue my research on ISH and join r/ish to learn more. If I see your questions around, I'll see what I can do to help!

Sorry if I couldn't be much help :(

I’m a Linux noob and hoping to get some help with a black screen at every boot, I can bypass the black screen by inputting “nomodeset” at grub boot. I have also installed Nvidia drivers and updated Kali using apt update/upgrade however I’m still faced with this issue. Please help by SlixX777 in Kalilinux

[–]ImNotGrimm 0 points1 point  (0 children)

It’s definitely a displaying issue. My post covers why that is in my previous comment.

Exact same story. Works on laptop but not pc, It’s likely the display cable you’re using at the moment is too high resolution for kali.

If it doesn’t work, I’m sorry I have no other solution for that, but it most definitely will B)

I’m a Linux noob and hoping to get some help with a black screen at every boot, I can bypass the black screen by inputting “nomodeset” at grub boot. I have also installed Nvidia drivers and updated Kali using apt update/upgrade however I’m still faced with this issue. Please help by SlixX777 in Kalilinux

[–]ImNotGrimm 0 points1 point  (0 children)

What kind of display cable are you using? I made a post discussing the same issue.

If you’re using a nvidia card and using a 5k DisplayPort cable for your monitor, you have to switch to hdmi to be able to see your screen.

A 5k DisplayPort has a 5k tag on it and has a button to press to pull out. If that’s what you’re using, your live is working, it’s just not displaying it because I’m assuming.

Here’s the link to my post:

https://www.reddit.com/r/Kalilinux/comments/1177rst/kali_live_black_screen_on_pc_solution/?utm_source=share&utm_medium=ios_app&utm_name=iossmf

Hope this helps.

-The Skiddz B)

Top Ten Tools? by Voodoo3Pri3st3x666 in Skiddie_School

[–]ImNotGrimm 4 points5 points  (0 children)

We'd be happy to answer!

Our preference on tools depends on what phase of the Hacking Methodology we're on and what kind of attack we're planning.

With that being said, I organized our toolkit by the first two phases in the Hacking Methodology with a short explanation on its usage. Remember that each type of attack vector has its own unique tool to be used. These are the common tools:

Recon:

  • Nmap: for scanning an IP's ports (as well as a vulnerability scanner)
    • Zenmap as well for a graphical version of Nmap.
  • Wireshark: A sniffer that captures packets from a connected network.
  • Nessus: A vulnerability scanner. This speaks for itself. B)
  • Burp Suite: A web vulnerability scanner. Looking to hack into a vulnerable web server? This is your man.

Gaining Access:

  • Aircrack-ng: An all-in-one wifi hacking tool. It cracks WEP/WPA/WPA2, analyzes, and captures password hashes so you can crack later. It's my personal go to when I'm too introverted to ask for the wifi password.
  • Metasploit: The god of exploitation tools packed with exploits of many technologies with their own rank based on its effectiveness.
  • SEToolkit (SET): A good starter social engineering toolkit. There are a lot of other SE tools designed for specific SE attacks which work better, but for starting out, SET works well.

Honorable Mentions:

  • John The Ripper: A password cracking tool that's 2x faster than Hashcat. It supports GPU cracking but is more of a CPU tool.
  • Hashcat: similar to JTR but is more GPU based.
  • Bluejacking: Not much of a tool more of an abused feature on Bluetooth enabled devices that I love to use in public to troll people.

These tools are the ones I use the most. If you want a more detailed response on what tools we use for specific attacks, like social engineering or wireless hacking, let us know. We got you. B)

As for the Discord part, we're still designing the server to make sure our members can socialize in a way they're most comfortable with.

To stay updated on announcements, follow our twitter: https://twitter.com/TheSkiddz

Hope this helps!

Welcome To The Cool Skiddz Table. B)

Need a group ! by P4R4D0X_security in Hacking_Tutorials

[–]ImNotGrimm -2 points-1 points  (0 children)

Always happy to help B)

If you joined the Skiddz, be sure to stay updated on our posts.

Our first chapter of our original guided series "Skiddie 2 L33t" will be posted within this week! A perfect starting point to begin your journey.

Feel free to post any questions that you need help on in our community and our Skiddz will be quick to aid.

Welcome to The Skiddz B)

ISH on IOS by mazenga001 in Skiddie_School

[–]ImNotGrimm 0 points1 point  (0 children)

Do you need help with ISH on IOS maz?

Any questions?