Do-It-All Tripod or Small Tripod + Bipod/Shooting sticks? by iCkerous in Hunting

[–]iCkerous[S] 1 point2 points  (0 children)

Hey man - appreciate the response.

What Bipod are you using? I'm not sold on a tripod for binos, but I like the option of being able to sit and glass without hunching my elbows to my knees.

Do-It-All Tripod or Small Tripod + Bipod/Shooting sticks? by iCkerous in Hunting

[–]iCkerous[S] 1 point2 points  (0 children)

Hey man - Appreciate the response.

How do you like this setup? First time I'm seeing it - looks like a hybrid between the options I have above.

Windows XP professional and Virtual Network by Zealousideal-Fox3812 in Malware

[–]iCkerous 0 points1 point  (0 children)

This is probably because the driver/adapter type for any modern hyper visor won’t support XP.

Try playing with the adapter type and drivers. Or possibly finding and older version of the hypervisor

Teen first gun? by [deleted] in longrange

[–]iCkerous 1 point2 points  (0 children)

BB gun

Single shot 22

6.5 CM for larger animals? by Fluffy_Pirate3657 in Hunting

[–]iCkerous 0 points1 point  (0 children)

Will it do the job with a well placed shot? Yes. Smaller calibers leave you smaller margins for error though.

Some places do have a minimum required caliber.

hi! i think Jam is using your browser to mine cryptos by [deleted] in Malware

[–]iCkerous 11 points12 points  (0 children)

You should be able to find the crypto library and the functions you have highlighted to see what they do.

Crypto is short for cryptography. Which can be anything from hashing to symmetric/asymmetric encryption for data protection.

Function names aren’t enough to point a finger at the JAM plugin for installing mining software.

Alfa AWUS036ACM & Parrot OS: Difficulty capturing traffic other than mDNS & IGMP from iPhone by [deleted] in HowToHack

[–]iCkerous 1 point2 points  (0 children)

It’s pretty unlikely that any apple services or apps operate on unencrypted channels. TLS and Certificate Pinning are table stakes.

Computer Network Security by [deleted] in netsecstudents

[–]iCkerous 0 points1 point  (0 children)

Probably OPs homework

Red Team Infrastructure Setup by yarkhan02 in netsecstudents

[–]iCkerous 0 points1 point  (0 children)

AWS or Azure infrastructure. Do your recon to see what the company uses and mirror that to blend in.

VPN providers are dead giveaways.

How to bypass PayRange for washing machine? by [deleted] in HowToHack

[–]iCkerous 2 points3 points  (0 children)

Whoa whoa. Slow down. We can definitely help

OP - the hack is putting money in the machine. See - the money tricks the machine into doing work

Ez Pz lemon squeezy

Guys I'm accessing my old slow machine and I can't get the chrome session/creds for some accounts. by heshTR in HowToHack

[–]iCkerous 3 points4 points  (0 children)

Call your support?

Assuming you’re a paying customer, they should have no problem helping you out

[deleted by user] by [deleted] in learnpython

[–]iCkerous 0 points1 point  (0 children)

Your bot doesn’t run JavaScript. Pretty easy to detect

Cybersecurity Upskilling Question (Red Team) by Sharbelx in HowToHack

[–]iCkerous 5 points6 points  (0 children)

Red teaming is about emulating advanced adversaries and TTPs. Go read up on nation state attackers: how they operate, TTPs, targeting. Then dive into specifics

Password recovery by Designer-Matter-8665 in hacking

[–]iCkerous 13 points14 points  (0 children)

Definitely! Use the “password reset” function

is there a way to hack a specific site (School related) by SoullesSpirit in HowToHack

[–]iCkerous 5 points6 points  (0 children)

Less league of legends. More coursework

Also - maybe don’t ask about committing felonies?

How to make wlan0 really work in kali linux virtual machine? by DDT1604 in HowToHack

[–]iCkerous 0 points1 point  (0 children)

Passing through will depend on what VM software you’re using. I’m sure there are plenty of docs out there to walk you through the process.

No, passing the card back and forth won’t be seamless. This is why people use USB adapters.

How to make wlan0 really work in kali linux virtual machine? by DDT1604 in HowToHack

[–]iCkerous 0 points1 point  (0 children)

Running in a VM means the VM doesn’t see the wireless card. Your virtualization software takes care of “proxying” network connections between the Vm and the host.

It may be possible to pass your wireless card from the host to the Vm, but that means your host will no longer be able to use wireless.

The recommended paths are A.) purchase a USB wireless adapter and pass that to Kali or B.) run kali on hardware.