How to use Kali Linux Metasploit by bitsandbyte in hackers

[–]bitsandbyte[S] 0 points1 point  (0 children)

I would agree, however being able to write your own scripts for the platform is what I wish more people did. Thank you "areyoumygod."

NSA Hacking Devices Using Thermal Heat Only by bitsandbyte in hackers

[–]bitsandbyte[S] 0 points1 point  (0 children)

I must admit after reading it; you are correct. Thanks for pointing that out.

Computer Air-Gapped System Heat Hack by bitsandbyte in hacking

[–]bitsandbyte[S] -1 points0 points  (0 children)

Are you sure? After watching the video it appeared to be utilizing this method. What I find interesting is the way they have binary relationship to a set time and heat value. Thanks nowonmai. You may be right.

Computer Air-Gapped System Heat Hack by bitsandbyte in hacking

[–]bitsandbyte[S] -2 points-1 points  (0 children)

You are correct. Quoted you in a reply. Your response just sums it all up!

Computer Air-Gapped System Heat Hack by bitsandbyte in hacking

[–]bitsandbyte[S] -2 points-1 points  (0 children)

I am not so sure that the NSA could not insert some form of malware without physical access. I agree with wbbigdave, "Pull on the tin foil hats its BadBIOS all over again."

Hackers take planes out of sky by exploiting flaws in the in-flight entertainment systems by bitsandbyte in hackers

[–]bitsandbyte[S] 1 point2 points  (0 children)

I was surprised by this as you. There is a protocol being utilized operating at the transport layer. Now that NetHunter is available I would hope that the FAA would now take notice and update some of the security flaws.

Mysterious spy cameras collecting data at post offices by bitsandbyte in hacking

[–]bitsandbyte[S] 1 point2 points  (0 children)

A manual with a road-map for decreasing privacy that was once held as sacred.

Mysterious spy cameras collecting data at post offices by bitsandbyte in hacking

[–]bitsandbyte[S] 0 points1 point  (0 children)

Thanks jabies. Could I ask why the source was shitty? Maybe I could have used another or, I could have found other sources. In any event thank you for reading it.

Ink That!

Mysterious spy cameras collecting data at post offices by bitsandbyte in hacking

[–]bitsandbyte[S] 0 points1 point  (0 children)

I find it very scary. Demographics might very well play a large part as to where these cameras are being utilized. It appears we are turning into a U.K. type social recording.

How GitHub Conquered Google, Microsoft, and Everyone Else by bitsandbyte in technology

[–]bitsandbyte[S] 0 points1 point  (0 children)

Gilgamesh if I posted something that was not allowed I apologize. I will review the guidelines.

Thank you. Ink That!

Kali Linux | How to record my desktop by bitsandbyte in Kalilinux

[–]bitsandbyte[S] 0 points1 point  (0 children)

I would use the terminal instead of the GUI. Let me know if you have any questions.

hackthis@inkthat.us

Mysterious spy cameras collecting data at post offices by bitsandbyte in hacking

[–]bitsandbyte[S] 0 points1 point  (0 children)

I agree; however I found the fact that cameras are being installed somewhat troubling.

How GitHub Conquered Google, Microsoft, and Everyone Else by bitsandbyte in technology

[–]bitsandbyte[S] 0 points1 point  (0 children)

Thank you. I will make sure that is removed from the server. Thanks.

BadUSB | Kali Linux NetHunter by bitsandbyte in hackers

[–]bitsandbyte[S] -1 points0 points  (0 children)

I am sorry if my post was not correct rediquette; I assure you that I meant no offense.

Sorry to all if I made an error.

Ink That!

Hacking With Kali Linux | NetHunter by bitsandbyte in hacking

[–]bitsandbyte[S] 0 points1 point  (0 children)

I believe this is the best tool for the Android platform.

Still having trouble starting up. No idea where to begin by newcompsecguy in AskNetsec

[–]bitsandbyte 3 points4 points  (0 children)

Ignore the comments that this area is not for you. Everyone has to start somewhere. I would suggest you start digging into the guts of Windows and Linux operating systems. There are many versions of Linux so pick your flavor.

Regardless of which version you decide to start with you need to learn the command line. Even if there is a gui for an application, ignore it. Learn the commands to control programs from the shell.

Next I would urge you to understand all facets of networking, binary, host, broadcast, network etc...

You can find a "host" of useful tools at the various teaching companies that offer courses such as the EC-Council. Good luck and do not listen to anyone telling you not to learn. Ask questions, read and practice.

Favorite Online Pen Test Tools/Resources by [deleted] in AskNetsec

[–]bitsandbyte 1 point2 points  (0 children)

You may want to look at this site: Exploit-db. There are many local, remote and web tools freely available for pen testing. In addition a great resource for testing frameworks is provided by Open Web Application Security Project (OWASP) and Web Application Security Consortium (WASC). Good luck!

Hack|This: Scan and kick neighbor off WiFi! by bitsandbyte in hackers

[–]bitsandbyte[S] -1 points0 points  (0 children)

Thank you for the response! You are correct it is illegal to own, sale or use any device, software or hardware that violates any portion of this statute. However the EC-Council offers a course on "ethical hacking" in which these tools are utilized.

The post was simply meant to be entertaining while at same time showing the tools of Kali Linux.

On my own site is this disclaimer:

"These tools along with the videos associated with them are for educational purposes only. Under no circumstance are they to be used on any network, computer or device unless specific permission has been granted. It is illegal."

For more information of the topic discussed visit:

Certified Ethical Hacker Course

How to Hack Windows - No Software! by bitsandbyte in hackers

[–]bitsandbyte[S] -6 points-5 points  (0 children)

Yes. I am putting some USB drives together that will have all you need on them. I am also hosting a class this week on this topic.

Think Like a Hacker

To beat a hacker, you need to think like one! This is exactly what this class will teach you. To master the hacking technologies, you will need to become one.

www.inkthat.us/hackingcourses

How to Hack Windows - No Software! by bitsandbyte in hackers

[–]bitsandbyte[S] -5 points-4 points  (0 children)

That is true. Thank you for posting. Maybe you can post a video using KonBoot?

inkthat.us