-
cyber.spirit replied to the topic Anyone know where I can find the original pdf or jpg? in the forum Other 5 years, 7 months ago
I have similar poster (not the same thing) sounds like it’s not official poster. However is it really important to have it??
If your a student i sugget you to keep learning each day instead of wasting your time with these things. CEH does not make
a real hacker, its not a very technical course either. So just keep going , learn it, then take the…[Read more] -
cyber.spirit replied to the topic Alternative to Kali linux in the forum Tools 5 years, 7 months ago
@Grendel wrote:
Glad to hear there is work on a different distro of hacking tools.
However…
As with ANY distro, a high level of cynicism should exist amongst adopters. It is simplistic to include malicious (or simply annoyance) code that is undesirable in any setting. As I mentioned in my book, I always recommend installing the apps you want on…
-
cyber.spirit replied to the topic When brute force becomes useless!!! in the forum News from the Outside World 5 years, 7 months ago
We’ll if you go to my other posts, you’ll see reference but in this case i forgot the links sorry.
-
cyber.spirit replied to the topic When brute force becomes useless!!! in the forum News from the Outside World 5 years, 7 months ago
@UNIX wrote:
Source..
http://www.eurekalert.org/pub_releases/2015-06/bu-brt060215.php
Yeah but this is one of four sources!!
-
cyber.spirit replied to the topic ClickBank.Pk in the forum Links to cool sites. 5 years, 8 months ago
The website provides links to download ilegal copy of windows 8. Bro this is ETHICAL hacker forum so everything must be ETHICAL.
-
cyber.spirit replied to the topic What is so importatn about version numbers anyway? in the forum Network Pen Testing 5 years, 8 months ago
The first phase of hacking is information gathering
the information that you collect will be useful during
other phases of hacking for exploiting and password crack
social engineering and etc.in order to exploit a service you need to know 3 things about your target:
1- The Operating system and it’s version (Windows server 2008 r2 for example)
2-…[Read more] -
cyber.spirit replied to the topic Proprietary web sever vs IIS in the forum Web Applications 5 years, 8 months ago
security is not one thing my friend even if you implement HTTPS,
there is thousands of ways that a hacker might use to compromise
your server in other hand the web server might not have any
vulnerability but for example your web application is vulnerable
to XSS, SQL injection and etc. Even if you secure your server and
web application, a hacker…[Read more] -
cyber.spirit replied to the topic possibly just been hacked in the forum Network Pen Testing 5 years, 8 months ago
Welcome to this forum
Well, It was OK it’s a browser’s behavior every time you log in to any website it wants to make your life easier and remember your password! So don’t worry.If your using your windows based computer as a hacking platform, its not a good idea because most of hacking tools does not support windows, they are Linux based. I…[Read more]
-
cyber.spirit replied to the topic "Hacking with Kali: Practical Penetration Testing Tchniques" in the forum News Items and General Discussion About EH-Net 7 years, 3 months ago
Hello
Well, Kali Backbox, Backtrack are just tools that can make your life a lot easier But keep in mind that you need knowledge and experience behind all of these tools in order to use them correctly. For example imagine that you have a great saw but you don’t know how to use it’ so in this situation the saw is nothing for you.Hacking or let’s…[Read more]
-
cyber.spirit replied to the topic Anti Keylogger in the forum Tools 7 years, 4 months ago
@SephStorm wrote:
You can write your own Malware of any kind and it would not be detected by traditional AV that is signature based.
I already Know that man because i can write key loggers with C++ or … and that’s not just because of signatures, different algorithms might decrease the chance of detections.
Thank you for the link that you’ve…[Read more]
-
cyber.spirit replied to the topic Nessus and Nikto in the forum Web Applications 7 years, 9 months ago
i can’t watch that movie IDK why anyway:
is network established between you and the target? can you ping it?
Can you scan the target with nmap?Is your target on internet? if it is:
Are you behind any firewall? If you are, try this scan:
nmap --scanflags SYNFIN
This may bypass the firewall.
Always scan the server using IP address because they…[Read more] -
cyber.spirit replied to the topic Finished Python Course in Codecademy now what? in the forum Programming 7 years, 10 months ago
if you wanna be a programmer, the story is diferent but if you wanna be a hacker i suggest u to buy http://www.hackingdojo.com shodan course and learn c and assembly after python
Happy stuDYING!
-
cyber.spirit replied to the topic Friends of Friends on Facebook in the forum Social Engineering 7 years, 10 months ago
i don’t know any tool but i think it’s not easy and you won’t be able to find those people for example who sets his/her friend list on only me to see the list or someone who is not searchable on fb and so on. It needs alot of work.
Create an attractive fake person on fb and send him/her friend request, if you failed, then try to send friend…[Read more]
-
cyber.spirit replied to the topic Change is Coming to EH-Net!! in the forum News Items and General Discussion About EH-Net 7 years, 10 months ago
1. yes
2. Sometimes
3. I am
4. I like to help EH as much as i can because EH helped me alot.
5. WoW! Is it possible? I do love to do this.
6. Web designing yes but mysql no
7. Good idea
-
cyber.spirit replied to the topic Where is the router/firewall ??!!!!! in the forum Tutorials 7 years, 10 months ago
@ajohnson wrote:
Switches and routers are Layer-2 and -3 devices, respectively, and do not use TCP or UDP ports to operate. Anything at a higher level than the frame or packet is simply seen as the data payload.
Well, Well, yup that is right TCP/UDP ports are for higher levels in osi or tcp/ip models and i already know that. As i mentioned…[Read more]
-
cyber.spirit replied to the topic Where is the router/firewall ??!!!!! in the forum Tutorials 7 years, 10 months ago
@Grendel wrote:
It may not matter. The purpose of identifying the customer’s routers and switches is to see if you can attack an administrative port (ssh, telnet, and/or snmp). Otherwise, just keep moving on.
BTW, we discuss that in the Nidan class.
Hi Thomas.
How are you? Thanx for your help i know that, your are right and i don’t know cisco…[Read more] -
cyber.spirit replied to the topic Where is the router/firewall ??!!!!! in the forum Tutorials 7 years, 10 months ago
Wait Wait Wait!!!
The problem is solved i have found a 20 range of their public ip address, seven of the are up 5 of that 7 are servers with alot of same configs and 2 of that 7 are Cisco devices there is no open TCP ports on that two but nmap aggressive scanning says tat they are cisco devicesnow tell me please
1- how can i find which of them…[Read more]
-
cyber.spirit replied to the topic SQL injection in the forum Tutorials 7 years, 10 months ago
@Jamie.R wrote:
hmm I would say learn SQL you may not have time but being pen tester I think is about being professional. Trying find a tool that you can just run and hope it works is just so wrong. You going to run a tools that you don’t really understand how it works and what is it doing. How do you know it wont break the database.
I not saying…
-
cyber.spirit replied to the topic SQL injection in the forum Tutorials 7 years, 10 months ago
@MaXe wrote:
Havij is a script kiddie tool just like Pangolin is, except Havij is more widely used by script kiddies especially in the middle east. A pro tool, which can do a lot more, but is also a lot harder to use is sqlmap.
However, using a tool only, without knowing what causes SQL Injection, how to fix it (in the code!) and how to test…
-
cyber.spirit replied to the topic introduce me exploitation books in the forum Tutorials 8 years, 1 month ago
so you wanna say most or its better to say all of exploits are in assembly?
Ok if you say i accept because i have no experience with exploitation. But i bought hacking AOE it teachs programming part all C and a little bit of assembly(however idk exactly because i didn’t read it i just read the table of content) but if i am right tell me why it…[Read more]
- Load More