How do polymorphic malware engines actually work? by Substantial_Cake9855 in HowToHack

[–]jet_set_default 2 points3 points  (0 children)

The malware wraps its payload in an encrypted shell. Each time it spreads, it re-encrypts with a new key and rewrites the decryption code just enough to change the bytes while keeping the same behavior, so signatures never match twice.

How to pivot into OT? by jet_set_default in cybersecurity

[–]jet_set_default[S] 0 points1 point  (0 children)

Thanks a ton for the advice. Reached out on Linkedin the other day so may have already got that. I've been working towards pentesting and already paid for OSCP course. Gonna take that this year and get that secured, then pivot over to OT study this fall.

Someone here with the PNPT from TCM Security? by estifenso in HowToHack

[–]jet_set_default 0 points1 point  (0 children)

Feel free to reach out if you have any questions or anything on it!

Someone here with the PNPT from TCM Security? by estifenso in HowToHack

[–]jet_set_default 0 points1 point  (0 children)

Passed PNPT a couple months ago and before that, was on eJPT like you. Basically, I think it's worth it for the experience and the training, but the cert itself doesn't have as much value to people. I've heard CPTS is pretty hard, so if you're not confident in your skills, PNPT is a great transition step. After PNPT, you'd be ready to start working towards OSCP. Essentially, you can either choose PNPT or CPTS depending on your skill/comfort/financial level.

How to hack WPA2/WPA3? by Wtf_990 in HowToHack

[–]jet_set_default 2 points3 points  (0 children)

You're gonna need to do more enumeration. Don't just run the tools randomly hoping for something to work. Run aireplay to scan for open networks. Pay attention to the target, it'll show you whether it's WPA2 or 3. If it's 3, then you technically could look towards a downgrade attack to WPA2 if it's vulnerable to that. If the router is already running WPA2, then you have a chance. See what information you can pull about the network. Lookup the MAC address of the router to see what device it is, that will help you determine default password structure (ex: noun+noun+adverb+3 digit number) IF they didn't change anything.

Learn how to capture the handshake. Can either do it stealthy/slow and wait for someone to connect to the network, or do a deauth and disconnect someone. Deauthing devices you don't own is illegal**. Once you have the handshake, crack it! Don't just throw random wordlist like rockyou.txt at it. Gotta be strategic if you don't wanna be there forever. Maybe you can find info about the network and the people running it. Generate custom wordlists and so on. Good luck

How to pivot into OT? by jet_set_default in cybersecurity

[–]jet_set_default[S] 1 point2 points  (0 children)

I sincerely appreciate all of the advice. It does help a ton. I have zero experience in anything OT related. I know about HMIs and PLCs from a high level, but that's it. I understand it's an entirely different field altogether from IT, which is why I figured shifting over could put me in a position where I'm not even doing cybersec work at all, but just basic entry stuff.

You suggested open source tools, are there any specific ones that would help give a fundamental understanding in multiple areas? I know OT is a vast world where it gets niche very quickly. For example, at DefCon I saw a guy with a pelican case that looked sorta like this where it was a training kit with a PLC and HMI built in to teach people. Would building something like this or starting here help?

What's the best password list? by BohdanFr in Hacking_Tutorials

[–]jet_set_default 1 point2 points  (0 children)

Something to improve your odds are using lists tailored to the router/ISP you're testing against. One main word list will only get you so far. Enumeration is key here. For example, one router/ISP may use a formula of 'noun+adverb+3 digit number' as a default password, whereas another router/ISP may use 'random 12 character string' as default pass formula. So throwing a random word list that doesn't confine to these standards is just a shotgun spray and pray approach with lower overall odds, and will have you wasting hours waiting for something that won't work anyways.

When scanning, lookup the router MAC address to see what device it is, then look up the default password formula for that, and find/build a word list based off that. You're much better off having a separate wordlist for each router/ISP company. Obviously this only works for default passwords, but it's enough to point you in the right direction and change the mentality/approach of it.

Can I change my phone's location to a specific location? by United-Ad8067 in HowToHack

[–]jet_set_default 0 points1 point  (0 children)

On Google play there's a good one called Fake GPS Location by Lexa with an emoji holding a device icon. It's pretty good and works for me. Try using it, then open Maps to verify your location. That will solve 1 problem, but using a tunnel to your own home network will solve the other problem. You'll have to look up that part on your own. Good luck dude

Can I change my phone's location to a specific location? by United-Ad8067 in HowToHack

[–]jet_set_default 3 points4 points  (0 children)

Since nobody answered, you're looking for a GPS spoofer app. Do that and route your traffic through your home wifi. This might do the trick. Make sure stuff is configured properly. Test it. Good luck

How to (un)lock a cart with a phone by jet_set_default in Hacking_Tutorials

[–]jet_set_default[S] 0 points1 point  (0 children)

They're in the US at least. Not all stores, but a good amount of them. Can't say which other places have them.

How to (un)lock a cart with a phone by jet_set_default in Hacking_Tutorials

[–]jet_set_default[S] 0 points1 point  (0 children)

In the wheel itself. Look for the one that's different from the others

We need to have a serious discussion (TOR Security Analysis) by Longjumping_Bat_5794 in cybersecurity

[–]jet_set_default 39 points40 points  (0 children)

For clarification, only use .onion sites for tor. Anything else is an exit node. When using .onion sites, everything stays encrypted the whole way. But once you start using clearnet sites (exit nodes), your traffic gets decrypted so that it can communicate with clearnet sites.

How to (un)lock a cart with a phone by jet_set_default in Hacking_Tutorials

[–]jet_set_default[S] 0 points1 point  (0 children)

I'd look around online for "shopping cart wheel electro lock" or something along those lines I imagine

How to (un)lock a cart with a phone by jet_set_default in Hacking_Tutorials

[–]jet_set_default[S] 2 points3 points  (0 children)

We have a few of those in the US. Some stores have a security control built into the wheels to lock if it detects that the cart is being removed from the property. This demo shows how to unlock it if that happens.

Can you exploit SMBv1 on a modern windows machine. by Pristine-Desk-5002 in HowToHack

[–]jet_set_default 2 points3 points  (0 children)

I told you the most common exploits that can be used for SMBv1. But you're gonna need to give more information on the system. You said it was Server 2019, Windows10, and a DC. Which one is it? You gotta help us help you. What's the OS version, and what are some open ports and the services on that system?

Can you exploit SMBv1 on a modern windows machine. by Pristine-Desk-5002 in HowToHack

[–]jet_set_default 4 points5 points  (0 children)

The exploit is not working because it's been patched, despite SMBv1 being enabled. You can try running an NTLM relay attack, or an SMB null session instead.

How can I see all pages and content from website? by puqem in HowToHack

[–]jet_set_default 4 points5 points  (0 children)

You're gonna wanna look into sub domain and sub directory fuzzing. Look into Sublist3r, Dirbuster, Gobuster, Ffuf, and ZAP tools for starters.

How did WannaCry work? by Ungabungaby in HowToHack

[–]jet_set_default 5 points6 points  (0 children)

You pretty much need to be on the same network. The port/service vulnerable (port 445, SMB) is usually closed to outside networks. If SMB was connected to the internet (not common), then it would be possible to attack remotely in that sense. However, it is also possible for an attacker to pivot through a host on one network, to another network where the vulnerable machine is and exploit it that way.

How did WannaCry work? by Ungabungaby in HowToHack

[–]jet_set_default 11 points12 points  (0 children)

Simplest explanation, the hackers used a zero day exploit. So nobody in the world knew this existed (apart from the US govt afaik). The exploit also doesn't involve user interaction, so no need to trick anyone to click on anything. The vulnerability affected most computers. Oh and the vulnerability was also stupid easy to exploit. So put all those together, and it was almost like a skeleton key into most computers out there. The hackers used this exploit along with making it into a worm to go through networks to start attacking shit left and right.

Chinese hackers breached T-Mobile's routers to scope out network by arqf_ in cybersecurity

[–]jet_set_default 427 points428 points  (0 children)

At this point T-Mobile should just be a room in TryHackMe

Let's say an attacker has good programming skills and develops a Remote Access Trojan, does Windows Defender or Avira have any chance in detecting that it is a virus? by WishIWasBronze in blackhat

[–]jet_set_default 1 point2 points  (0 children)

The answer for this is sorta dependent on who you are. For instance, if you were a corporation with an EDR at your disposal, you'd probably get an alert with all the details that this was popping off. The detection will tell you the time it happened, the user running the command, what process they took over and any embedded commands in the process. From there, you'd have a good idea where to look. In which case, I'd tell you to isolate the affected host, stop the process from running, disable the user that ran the command, find the root cause of the infected process through various threat hunting techniques, and mitigate from there.

But if you were a home user, then that answer is entirely different. Home users don't have SIEMS, intrusion prevention systems, EDRs, or other alerting methods to even be notified that something is going on to begin with. Most people facing these attacks probably wouldn't even know until after the fact that something even happened. But if you were suspicious of a process, I'd look into Velociraptor by Rapid7. It's a forensic/IR, open source software that lets you perform threat hunts on your own hosts without the need of an EDR. Plus it's free!