hacking

  1. K

    I leaked my IPv6 address and MAC address, should I be worried

    I have a computer that stopped accessing the internet and I haven't been able to figure out the issue, so I went on another forum to ask for help. I was urged to post the results from command ip a && ip r because I was told that's the most basic network diagnostic. So I posted it. Then I...
  2. S

    Farewell Blackbuntu, Hello SnoopGod Linux!

    I wanted to share a bit of backstory and an update on a project I've been involved with for some time now. Some of you might remember Blackbuntu, a Linux distribution born in 2011 but unfortunately abandoned by its original developer a few years later. In 2018, I took on the responsibility...
  3. S

    How could a hacker accessed Admin's Home directory?

    I request everyone to read full and help me and, sorry for my English. I often got few text files (named as "New Text Document.tmp" / "WindowsUpdate..log", WindowsUpdate-1.tmp" / "0000001.tmp" / "0000001 copy.tmp" / "0000001 copy (2).tmp" ...) in my desktop while using Windows (7 & 10), even...
  4. U

    Weird Command Execution I Encountered

    I am using OpenSUSE Leap latest version and my kernel version is Linux 5.3.18-59.19-default I start learning Assembly out of curiosity and I was following the tutorial on the tutorialspoint I accidentally wrote the code wrong and the code should have output the number I gave but instead of doing...
  5. djohns7061

    Netgear ReadyNAS Duo v2 Ports Lockout

    ISSUE: While attempting to update the apt-get functionality the server locked up and rebooted. On reboot, there are no ports open and I do not have anyway to resume terminal commands. DISCUSSION: I was working to update the kernel image when this all went south. I am aware there are some...
  6. Confused_nerd

    The Mint 2016 hack?

    I was a reading a book, and it mentioned "the linux mint 2016 hack". I looked it up and apparently some hackers put a backdoor to the system. Does anyone know more about this? I would also like to know how the sha256sums work(I verified mine before installing), cause like why couldn't the...
  7. R

    Android Kernel Debugging (kmsg log)

    Hello, So I've been subject to some rather advanced hacking. Long story short, through means of brute force TTY and shell/root manipulation, the hackers have used ADB (android debugging bridge) and trace/printk to debug my kernel and place kernel hooks. (They've done the same to my...
  8. C

    Can i create a wlan1 with a tethered smartphone connection?

    Hello, i would like to know how to make my phone a wlan1 because my wlan0 is too weak for pentesting. Is it even possible? I'm on Kali Linux, very recently updated.
  9. Gleis

    Which is the best way to learn penetration and hacking using Kali Linux ?

    Which is the best way to learn penetration and hacking using Kali Linux ? For the moment I'm mostly interested in wireless attacks. Can you guys please recommend any tutorials , books etc ? Thanks!
  10. W

    Ghost Framework

    Hello I recently discovered ghost framework on Kali Linux. Lately I've been thinking that,if we connect to random ADB(android debug bridge) through Ghost framework and sniff the information (knowing it's illegal!). If the person get to know that we are peeping on this device. Is it possible for...
  11. D

    Parrot OS 4.0 (Debian-based)

    Parrot Security OS 4.0 has just been released! This is a serious pentesting distribution that is based on Debian. I highly recommend getting acquainted with it: https://www.parrotsec.org/ For any newcomers who are migrating from Windows, this course might be helpful...
Top