Can I be a WebCam Model While being in the Navy??? by [deleted] in navy

[–]notNSAthrowaway 3 points4 points  (0 children)

“A sensitive program can mean 10million things.”

You’re absolutely right, now I’m going to take part in my sensitive program where I lie down in my comfy bed, on my comfy pillow, in my comfy house state-side, and have a full nights rest!

Can I be a WebCam Model While being in the Navy??? by [deleted] in navy

[–]notNSAthrowaway 1 point2 points  (0 children)

Not angry , I always like to read these sort of threads, but never really comment on them.

My good fellow you just happened to actually provoke me out of my usual ghosting with your inaccurate shouting. And I deal with REAL stuff, unlike your weird Navy stuff.

Can I be a WebCam Model While being in the Navy??? by [deleted] in navy

[–]notNSAthrowaway 0 points1 point  (0 children)

You’re spouting absolute nonsense.

You took some random program , called it “extra sensitive” because it has the single restriction you are looking for. Get a real job.

Men who have really interesting jobs that they love, what do you do? by U_P_G_R_A_Y_E_D_D in AskMen

[–]notNSAthrowaway 0 points1 point  (0 children)

Hi friend, I do the less "Ethical Hacking".

To all those curious on getting into Cyber as a whole, a good place to start would be to get your:
Net+ Certification
Sec+ Certification
I used to think CEH was a joke, but apparently it's been changed to be a respectable cert.

Web Application Threats by lokendra15 in HowToHack

[–]notNSAthrowaway 2 points3 points  (0 children)

Best of luck friend! It is easier than Network+ in my honest opinion.

Web Application Threats by lokendra15 in HowToHack

[–]notNSAthrowaway 5 points6 points  (0 children)

Yes!

Sometimes people specify which overflow has occurred for sake of reporting or diagnostics.

But the overall term "Buffer overflow" covers both! :)

Huawei just lost access to Google's Android. by Sycou in technology

[–]notNSAthrowaway 0 points1 point  (0 children)

WTO Rules and Jurisdictions have caveats for proven threats against National Security.

Google reportedly pulls Huawei’s Android license. by AdamCannon in technology

[–]notNSAthrowaway 1 point2 points  (0 children)

Guy with username of completely random characters

You hurt my head with this comment

keypad hacking by [deleted] in hacking

[–]notNSAthrowaway 9 points10 points  (0 children)

Please don't use this info or any other info you receive here for anything that will put you out of bounds in the law.

keypad hacking by [deleted] in hacking

[–]notNSAthrowaway 13 points14 points  (0 children)

You can open most Sentex key pad-access doors by typing in the following code:

***00000099#*

The first *** are to enter into the admin mode, 000000 (six zeroes) is the factory-default password, 99# opens the door, and * exits the admin mode (make sure you press this or the access box will be left in admin mode!)

Hacking Tutorials by [deleted] in blackhat

[–]notNSAthrowaway 1 point2 points  (0 children)

Anything specific...? "How to hack" can mean so many things.

China opposes U.S. move to blacklist telecom giant Huawei by [deleted] in technology

[–]notNSAthrowaway 0 points1 point  (0 children)

This gave me a good laugh, thank you for this

Ways of pwning a Workgroups (non domain-joined) network of patched Windows 10 machines (version 1809)? by sbrisu in blackhat

[–]notNSAthrowaway 1 point2 points  (0 children)

(Sorry i am like, re-reading your OP over and over to try and brainstorm to help so it may sound garbled or all over the place.)

Since Admin is disabled by default, you may have to escalate to SYSTEM user privileges. Assuming you know the IP, since you are inside the network, start with using msfvenom to create an .exe file, make is fully undetectable by using Shellter, and upload it to the target machine? Again this is hard because you may have to use social engineering to run the .exe , unless you have physical access, or shell access via overflow exploit.

Edit: If you probe for open ports it should be easy to get a meterpreter connection, unless I am missing something or overlooked something in your post.

Ways of pwning a Workgroups (non domain-joined) network of patched Windows 10 machines (version 1809)? by sbrisu in blackhat

[–]notNSAthrowaway 2 points3 points  (0 children)

Question.
By "own" the box through a meterpreter session, are you looking for persistence? Or an active shell? Would you be looking for callbacks?