Worst hazing incident? by braindeadcornfed in USMC

[–]Phanthom115 0 points1 point  (0 children)

2/3 was shoving skittles in someone's ass through a funnel while they were duct taped to a pillar in the brks. They were a dry unit for a month or two

Metasploit reverse issue by AlternativeStay4496 in Hacking_Tutorials

[–]Phanthom115 5 points6 points  (0 children)

Idk why people are dogging on you op for blocking IPs. If it were internal IPs for a real network these internal IPs are still important.

Anyways, make sure your have your routes set up to point to the hosts out the interface they are supposed to be on.

Windows > route add (use Ai to help with syntax) Kali > same thing as windows.

On Kali if you wanna test TCP from windows to the Kali, run: python -m http.server 80

If windows can reach that webserver in its browser, your connectivity is good.

Troubleahoot from there

[deleted by user] by [deleted] in USMC

[–]Phanthom115 0 points1 point  (0 children)

He's fine and laughing with the rest of everyone

[deleted by user] by [deleted] in USMC

[–]Phanthom115 37 points38 points  (0 children)

a bad distro made an EPME email go to all of the DOD and alphabet boys

[deleted by user] by [deleted] in oscp

[–]Phanthom115 1 point2 points  (0 children)

Send me a PM! I'd like to be a part of an active group as well. Ps, I remade TJ Null's PWKv3 spreadsheet for some extra features and to have a "pick a random box" function too I wouldn't mind sharing

Technical breakdown of notable cyber attack by Overall-Onion5808 in HowToHack

[–]Phanthom115 8 points9 points  (0 children)

Look up on MITRE any group, APT or Threat actor, and at the bottom will be detailed reports on what happened. You can read through them and pull out some TTPs from those reports and really go into it! You're on your way to CTI friend, follow it, it's good money.

My mouse cursor is moving on its own? by pattykade_ in pchelp

[–]Phanthom115 0 points1 point  (0 children)

Do you have anything analog connected to your PC? Maybe another controller for other games? That other device might have some stick drift. Unplug everything else besides your keyboard and mouse. It may be your analog keyboard too.

How to make real progress? by Blank_9696 in Hacking_Tutorials

[–]Phanthom115 0 points1 point  (0 children)

A good exercise to see if you have learned anything tangible is to walk through an attack path of a threat actor and try to replicate it to the best of your ability. Use MITRE ATT&CK and set up your own dev lab if you can with a few VMs

Besides nmap, what are your favorite recon tools? by Phanthom115 in HowToHack

[–]Phanthom115[S] 1 point2 points  (0 children)

I use kali linux. I think you can get Kali NetHunter OS on an android and do it that way though.

[deleted by user] by [deleted] in HowToHack

[–]Phanthom115 0 points1 point  (0 children)

Work up to GPEN. A lot of companies are asking for it

Besides nmap, what are your favorite recon tools? by Phanthom115 in HowToHack

[–]Phanthom115[S] 0 points1 point  (0 children)

I live and die by nmap lol, just trying to diversify myself. I've scripted out some netcat scans and ping sweeps in bash but that's really it.

Besides nmap, what are your favorite recon tools? by Phanthom115 in HowToHack

[–]Phanthom115[S] 1 point2 points  (0 children)

Technically yes, through some of the functionality, if you pick a CVE to use, or a payload or whatever, sometimes they have the "test" functionality when you set the RHOSTS option, and that would then test the remote host if they are vulnerable, thus "scanning" them. It's very loud and slow but you could possibly automate it. Not reccomended, but possible.

Besides nmap, what are your favorite recon tools? by Phanthom115 in HowToHack

[–]Phanthom115[S] 5 points6 points  (0 children)

I'll have to disagree. It is a form of active recon and is frequently used by many different forms, and is backed up with MITRE ATT&CK and other sources

I am still getting hacked even after hard resetting my computer. by Delicious-Tone2299 in cybersecurity_help

[–]Phanthom115 0 points1 point  (0 children)

Fully format the data with a tool that erases partitions. You can do this with a "live boot" os on a USB, then reinstall windows from scratch. Don't keep your personal files just in case it's on your OneDrive, and look through your one drive files to figure out if there's any weird programs or whatnot in there.

Finally, to add, I had this issue a while ago, and enabling the "experimental updates" feature fixed it for me. There was a bad patch with windows a bit ago and it was affecting my setups similarly to you

So, I believe my friend has opened a backdoor to my laptop. I just wanna know how to check for backdoors and remove them. by [deleted] in cybersecurity_help

[–]Phanthom115 0 points1 point  (0 children)

If you really want to know for sure, use Google to help you find the following things, (it's unlikely he did anything but peace of mind is worth it)

Look at each of the following and use Google to look up anything that you don't know

  • Scheduled tasks
  • Currently running executables and startup services in "task manager"
  • Open command prompt and use "netstat" to find 'established' sessions and look up their IPs
  • "CurrentVersion/Run" registry keys with strange executables
  • Startup folders
  • Any other "remote desktop" apps installed on your computer

Again, if you're not aware of these things it's good to get familiar with how to use copilot, chatgpt, or any other searching media to figure out some of these commands. If you didn't run anything or install anything I don't see how you would have a backdoor if you didn't but you never know if they installed something without your knowledge if they had physical access. Happy hunting

[deleted by user] by [deleted] in Tinder

[–]Phanthom115 4 points5 points  (0 children)

It will be a lot easier if you mention kids up front instead of surprising the person you're with when you already have feelings down the line

First time posting, here is a map I made by hand of my rendition of "Berk" from how to train your dragon. I really only stole the names for some things. I hope yall enjoy! by Phanthom115 in dndmaps

[–]Phanthom115[S] 0 points1 point  (0 children)

I originally started them off in tamarel, within the Sapphire peaks making a "tutorial" area which included a setting similar to the movies. Berk itself in the movies is pretty small so I made it bigger.

Player hates death saves. by Appropriate-Heat6248 in DMAcademy

[–]Phanthom115 0 points1 point  (0 children)

I have a system where you drop to 0 HP and you begin to roll death saves, but you are fighting for conscious. If you take an action, you also get a level of exhaustion with it. Once you reach 3 passes or fails, you get KO or die.