• OK, it's on.
  • Please note that many, many Email Addresses used for spam, are not accepted at registration. Select a respectable Free email.
  • Done now. Domine miserere nobis.

Any Penetration Testers/ Ethical Hackers here?

stoopid

Banned
Local time
Today 11:27 AM
Joined
Dec 30, 2016
Messages
29
---
Location
Texas. I absolutely adore the humidity.
I am about 5 months into penetration testing (professional term for hired hacker) and would like to gather around them to bounce ideas, gain insight, scheme/plot, post snippets, etc.

-I run kali linux 64 OS on an 8gb USB drive (Windows is for people, Kali Linux is for hackers)
-I can break into networks.
-I can hijack ios devices and android devices.
-I have plans to make amazing devices that are potentially illegal, but fucking awesome.
-I want to learn how to make custom PCBs and modify computer hardware.
-I want to learn how to code and automate my daily stuff. (BASH, Python to start) I am actively pursuing BASH.
-I want to program a better documentation application that has is brings all aspects of life together in a single program.
-I want to learn how to manipulate radio communications.

I want a tech team!! Doesn't matter if you're shit or NSA- (in terms of competency) please don't have government affiliations, I will not get along with you.
 

Ex-User (9086)

Prolific Member
Local time
Today 11:27 AM
Joined
Nov 21, 2013
Messages
4,758
---
Isn't breaking into networks and ios provided by scripts/apps developed by someone else?

Did you write any of the hacking tools that you're currently using?

Afaik Kali linux already comes equipped with most of the penetration testing software one would need.
 

stoopid

Banned
Local time
Today 11:27 AM
Joined
Dec 30, 2016
Messages
29
---
Location
Texas. I absolutely adore the humidity.
Isn't breaking into networks and ios provided by scripts/apps developed by someone else?

Did you write any of the hacking tools that you're currently using?

Afaik Kali linux already comes equipped with most of the penetration testing software one would need.

What does "Afaik" mean?

Why the fuck does any of this matter? Why are you interrogating me with questions that aren't related to the post?

Answering your questions anyways,
1st question. Yes
2nd question. No
3rd question. Yes

I am 5 months into the industry. Jesus.

Are you an INTP? Your words aren't spoken as one.

If any admins see this, please reduce the thread back to my original post, the above post and mine aren't necessary.
 

QuickTwist

Spiritual "Woo"
Local time
Today 5:27 AM
Joined
Jan 24, 2013
Messages
7,182
---
Location
...

stoopid

Banned
Local time
Today 11:27 AM
Joined
Dec 30, 2016
Messages
29
---
Location
Texas. I absolutely adore the humidity.
Music sharing? Yay

(My favorite band, please mind, its metal, the LYRICS are where the beauty is)

https://www.youtube.com/watch?v=Na4itwfNO6M

"Deliver Me"

Deliver me.
From the darkest abyss, from the depths of eternal rest.
Grasping at the threads of sanity, only to watch them slip through my hands.
I see the light.
I see the end.
I see a frail hope, crushed by the weight of the world.
My will is broken.
Sinking, always sinking.
The sands of time forever slipping.
Clawing at the emptiness, but a ghost I reach towards the end.
Lost in darkness.
Lost in time.
Losing a grip on my fucking mind.
Ignorance is an easy friend but in the end it takes everything.
Fear, it finds me and it binds me.
Illuminate the planes of consciousness.
Fear, it finds me
and it binds me.
But I'm lost.
Guilt draws me down like a stone.
it chokes my throat, and gnaws my bones.
Regret breeds a heavy heart.
Reality, torn in two.
Canonised, a life that fades before my eyes.
Ever faithful friend, sorrow, sets its teeth.
Eaten alive.
But I will survive.
I survive.
Fury, deliver me.
How can you defeat what you can't kill?
Deliver me.
I see the fear that twists inside.
Deliver me.
I watch the shadows fill with doubt.
Deliver me.
 

The Gopher

President
Local time
Today 10:27 PM
Joined
Aug 26, 2010
Messages
4,674
---
I am about 5 months into penetration testing (professional term for hired hacker) and would like to gather around them to bounce ideas, gain insight, scheme/plot, post snippets, etc.

How on earth do you plan to handle the social side? I assume you wish to turn this into work.

Python is good. I need to get back into that more.
 

Cognisant

cackling in the trenches
Local time
Today 12:27 AM
Joined
Dec 12, 2009
Messages
11,155
---
Don't over complicate it the most effective methods are the dumbest.

*calls someone*
"Hello sir or madam we just had to reset the network drive and I'm afraid we need to give you a new password, but first for security purposes please give me your old username and password just so we can verify your identity".
 

stoopid

Banned
Local time
Today 11:27 AM
Joined
Dec 30, 2016
Messages
29
---
Location
Texas. I absolutely adore the humidity.
How on earth do you plan to handle the social side? I assume you wish to turn this into work.

Python is good. I need to get back into that more.

I hate work. If it is ever considered work, I'll pass the torch to someone who is passionate. It will be what its worth, maybe something good, maybe something that didn't work. At least I can meet a couple of like minded people and get some experience too. The social side will be kept up with google hangouts, I'll launch a website, and we'll go to bed-bath-and-beyond to select our new living quarters/housing arrangements. Then we'll all fall in love and run away in the sunset.

-Whoops; romantic dreaming. Disregard the last 2 sentences.

Don't over complicate it the most effective methods are the dumbest.

*calls someone*
"Hello sir or madam we just had to reset the network drive and I'm afraid we need to give you a new password, but first for security purposes please give me your old username and password just so we can verify your identity".

That would be social engineering. Which is incorporated into penetration testing. If necessary, social engineering can be an excellent tool to get client side information/ confidential clearance/security information, corporate schedules, anything. This is just one of them. Typically being the most dangerous if you don't countermeasure your breadcrumbs you leave when using voIP./cellular networks.

I appreciate the KISS approach, but sometimes you need a larger spectrum of choices when your vulnerabilities aren't safe/anonymous. In the mind of a hacker, if it isn't 100%, it's not going to happen. Besides, INTPs won't settle out for easy, we love complexity and understanding shit that people are intimidated by.
 

Attachments

  • Screenshot from 2017-01-05 04-42-05.jpg
    Screenshot from 2017-01-05 04-42-05.jpg
    62.3 KB · Views: 278
Top Bottom