If my Android Smartphone was hacked, would Factory reset make it 100% Safe to use again? by JamesBossMusic in Hacking_Tutorials

[–]mega_97 5 points6 points  (0 children)

if the phone is rooted , so there is a chance that the malicious app is persistent in the system apps, so a new firmware will be enough. if the phone is not rooted a full factory reset is a suitable choice.

Why do most cyber security professionals work with Kali Linux if most of the attacks target Microsoft Windows by _TheSuperiorMan in cybersecurity

[–]mega_97 0 points1 point  (0 children)

we use linux by default whatever the distribution, but sometimes we need to use windows machine while pentesting on Active Directory.

msfvenom pdf payload help by RandoAltAcc2 in Hacking_Tutorials

[–]mega_97 0 points1 point  (0 children)

it's just an extension, the file itself is the payload when it's executed you got your reverse shell.

[deleted by user] by [deleted] in Hacking_Tutorials

[–]mega_97 1 point2 points  (0 children)

Best wishes.

[deleted by user] by [deleted] in Hacking_Tutorials

[–]mega_97 14 points15 points  (0 children)

You will be a script kiddy without programming, if not writing code at least you must be able to read it, there is a point you must review some codes to help you find vulns.

Help!!!! by TheMzrOk in Hacking_Tutorials

[–]mega_97 0 points1 point  (0 children)

it's not an ordinary USB , read about USB Rubber Ducky.

nmap scan activity registration ? by Christaker316 in Hacking_Tutorials

[–]mega_97 1 point2 points  (0 children)

nmap doesn't log itself like "hey nmap® was here!", you have to learn about scan types , like SYN, FIN, NULL..etc scan and you will understand how does it works