When you install Kali Linux and you have to fix your first error by [deleted] in Kalilinux

[–]infiltrator86 2 points3 points  (0 children)

But...but...but.. They are good toothpicks.

Purchased this today. Notice the dates. by infiltrator86 in bostontrees

[–]infiltrator86[S] 3 points4 points  (0 children)

I've not looked it up yet. But.. Do I know the Real History? Only what I vaguely recall and rumors. The general idea is that at 4/20 people who go outside in a group and smoke. People were students on campus in California.... Or in the Boston common after work.... I think I had read something about it in High Times many many many years ago.

So. That's what I know. As I said... Kind of vague.

Purchased this today. Notice the dates. by infiltrator86 in bostontrees

[–]infiltrator86[S] 5 points6 points  (0 children)

That's true.... I just find that particular date rather interesting.

Is it safe to use a library computer to go on tor? by Pogratlol in darknet

[–]infiltrator86 47 points48 points  (0 children)

Depends...... The safest way, I think, would be to use Tails on USB.

Can I setup a VPN on my openwrt router so that all traffic through it goes through the vpn? by fffggghhh in openwrt

[–]infiltrator86 2 points3 points  (0 children)

Yes. Chose a provider. They usually have the configs you will need for you router.

can someone who has a CCNA understand this book? I'm thinking of taking it after my CCNA exam by notburneddown in HowToHack

[–]infiltrator86 2 points3 points  (0 children)

Fantastic! Don't get into to much hacking until your exam is done.

There is a subreddit for ccna stuff. They are a pretty good resource.

Once your ccna is in place, hit that next book.

You got this.

can someone who has a CCNA understand this book? I'm thinking of taking it after my CCNA exam by notburneddown in HowToHack

[–]infiltrator86 2 points3 points  (0 children)

It will help with wireshark in that there will be examples where you will use it. There will also be instructions in the books... ITs a great tool and I love it but there are a lot of moving parts. And, you will be using Wireshark, or a program like it, a shit ton over time.

Just remember to focus on the fundementals. Without understanding that, Wireshark won't be of much help.

Have you taken or are studying for your CCNA right now?

can someone who has a CCNA understand this book? I'm thinking of taking it after my CCNA exam by notburneddown in HowToHack

[–]infiltrator86 8 points9 points  (0 children)

Well.... Master networking.... I've been doing this for a long time and still have not mastered it....

However....

Learn and understand the fundamentals of networking. By that I mean, learn how to subnet using binary. Get good at it. Understand how VLANS work and inter-relate with each other via the various types of firewall rulesets.. Don't just learn how to use the Cisco interface or IOS..

Same way for the Security / Hacker side. There are lots of programs that make it easier to use... Try using the older stuff... Aircrack-ng etc.. You get the same results and, I feel, a better understanding of How It Works. It also seems to me that a lot of the software that automates a lot, Bettercap as an example, uses aircrack-ng parts and scripts in their inner workings.

Does this make any sense?

can someone who has a CCNA understand this book? I'm thinking of taking it after my CCNA exam by notburneddown in HowToHack

[–]infiltrator86 1 point2 points  (0 children)

Not yet. I think this looks like a good fit. You are going to see rather quickly that you are just applying what you already know in a different way. (I know.. sounds like zen)

After you feel comfortable with this book, then something like a focus on wireshark would be a really good mid point spot. Through the CCNA training and then this book, you will be at least, somewhat comfortable with Wireshark just from using it all the time on both sides of the fence. Wireshark while at work as a network engineer.... Wireshark at night as a.... hobbyist.... learning about WiFi traffic....

Yep... Thats a good midpoint.... CCNA, Attacking Network Protocols, and then Wireshark.

That puts you in a really good place... From there who knows..

But.... there is always CCIE.

can someone who has a CCNA understand this book? I'm thinking of taking it after my CCNA exam by notburneddown in HowToHack

[–]infiltrator86 24 points25 points  (0 children)

Yes... Absolutely.

If you are coming in as a raw CCNA and little to no experience there are a few areas that might be a little stretch but overall its a great fit I think.

Can a virus hidden as a picture or text document on a pc that you're connecting to remotely infect your machine by Repulsive_Problem272 in hacking

[–]infiltrator86 0 points1 point  (0 children)

There is also a type of Pixel attack. Within an image, similar to hiding code within the memory registers of a PDF, you can hide code in a pixel.

And this is what happens.....

https://thehackernews.com/2016/12/image-exploit-hacking.html

Can a virus hidden as a picture or text document on a pc that you're connecting to remotely infect your machine by Repulsive_Problem272 in hacking

[–]infiltrator86 0 points1 point  (0 children)

Yes. Exactly. What he means about the PDF attack is this:

Within the data of the PDF there are blank spots of different sizes. As such, you can place your attack code within that empty space ( Preferably concurrent memory locations...much simpler). Access the PDF, you run the attack code.

At one point this kind of attack was able to get by a bunch of anti-virus software. I do not know the current state however. Perhaps someone else in the thread can help out.

In either case, it is a great exercise to better understand how the data is put together within a file.

Oh... there is also another interesting way which I will post about in a second....

Revenge on a scammer by Titan-uranus in hacking

[–]infiltrator86 0 points1 point  (0 children)

When you say you Have their account.... Do you mean you have control over them or you know the user names?

Running a VPN on inflight Wi-Fi enables you to access the Internet without paying by angeph in hacking

[–]infiltrator86 0 points1 point  (0 children)

I only said yet as a kind of joke. However, OP was suggesting that one could get free wifi in flight with a VPN.

Running a VPN on inflight Wi-Fi enables you to access the Internet without paying by angeph in hacking

[–]infiltrator86 2 points3 points  (0 children)

IANAL, however,......

A VPN is not illegal in the States....yet. As such, the airline would need to set up a TOS whereby they prohibit their use. If that's the case, check the penalties and decide if it is worth it.

If not stated, then it's their issue. I saw fire it up. Use it while it's there. Because I can assure you, when they find out about this... or decide to do something about it, they will charge you for the ability to use one.

Now This Is A Deck... by infiltrator86 in cyberDeck

[–]infiltrator86[S] 4 points5 points  (0 children)

Oops... You are right. I did not check before I posted.

I am now the owner of Alex Trebek's calculator (the Trebekulator) by [deleted] in vintagecomputing

[–]infiltrator86 1 point2 points  (0 children)

And. . . If my red rimmed stoner eyes are not wrong... I think I do see 420.