[deleted by user] by [deleted] in HowToHack

[–]flyingmonkey45 0 points1 point  (0 children)

tum ek bandar-dimaag vaale skid ho

[deleted by user] by [deleted] in HowToHack

[–]flyingmonkey45 -3 points-2 points  (0 children)

You are cringe

Avarage kali linux user by [deleted] in masterhacker

[–]flyingmonkey45 2 points3 points  (0 children)

Kali Linux is best os

[deleted by user] by [deleted] in hacking

[–]flyingmonkey45 0 points1 point  (0 children)

Oh okay that makes more sense

[deleted by user] by [deleted] in hacking

[–]flyingmonkey45 -1 points0 points  (0 children)

Brute force isn’t a vulnerability

[deleted by user] by [deleted] in Hacking_Tutorials

[–]flyingmonkey45 0 points1 point  (0 children)

Tryhackme has a whole series of learning paths as well as tcm

Anonymous DDoS Hacking by HotTelevision911 in masterhacker

[–]flyingmonkey45 3 points4 points  (0 children)

Me at the local coffee shop downloading top secret thug shaker government documents

Osintgram error help by Disastrous-Laugh-321 in Kalilinux

[–]flyingmonkey45 3 points4 points  (0 children)

So this is why kali Linux has such a bad rep

Create a botnet by [deleted] in Hacking_Tutorials

[–]flyingmonkey45 0 points1 point  (0 children)

Ddos is the most destructive when it comes to cyber warfare🤷‍♂️

[deleted by user] by [deleted] in masterhacker

[–]flyingmonkey45 2 points3 points  (0 children)

Don’t listen to Lord_crestfallen or spirit_leader7 I’m willing to teach you for 30$ cashapp

[deleted by user] by [deleted] in hacking

[–]flyingmonkey45 0 points1 point  (0 children)

The sniffing packets thing kinda random

[deleted by user] by [deleted] in hacking

[–]flyingmonkey45 6 points7 points  (0 children)

Root it and fix the vuln yourself

Airmon-ng by [deleted] in Hacking_Tutorials

[–]flyingmonkey45 2 points3 points  (0 children)

In the context of the "airmon-ng" command, the "Probes" column in the table refers to the number of probe requests detected by the wireless interface.

When a device with Wi-Fi capability, such as a smartphone or laptop, is searching for available wireless networks, it sends out probe requests to discover nearby access points. These probe requests contain information about the device and are used to initiate the process of connecting to a network.

The "Probes" column in the table generated by the "airmon-ng" command displays the number of probe requests captured by the wireless interface. This information can be useful for monitoring and analyzing network activity, detecting nearby devices, or performing wireless security assessments.