text stringlengths 0 1.99k |
|---|
I also want to write a little about things to not focus on if you don't want to entertain the idea of you hacking things just because someone has told you that you are not a “real” hacker if you don't know assembly. Obviously, learn whatever interests you, but I write these lines thinking about those things that you ca... |
[1] https://hausec.com/2019/08/12/offensive-lateral-movement/ |
[2] https://www.exploit-db.com/papers/41914 |
[3] https://blog.sevagas.com/IMG/pdf/BypassAVDynamics.pdf |
[4] https://www.trustedsec.com/blog/discovering-the-anti-virus-signature-and-bypassing-it/ |
[5] https://www.tarlogic.com/en/blog/how-kerberos-works/ |
[6] https://www.tarlogic.com/en/blog/how-to-attack-kerberos/ |
[7] https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/ |
[8] https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/ |
[9] https://adsecurity.org/ |
[10] https://github.com/infosecn1nja/AD-Attack-Defense |
[11] https://github.com/jhaddix/tbhm |
[12] https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/ |
[12 - Recommended Reading] |
******* |
_______________________________________ |
/ When the scientific level of a world \ |
| far exceeds its level of solidarity, | |
\ that world destroys itself. / |
-------------------------------------- |
\ _.---._ . . |
* \.' '. * |
* _.-~===========~-._ |
. (___________________) . * |
.' \_______/ .' |
.' .' |
' |
- me |
******* |
Almost all hacking today is done by black hat hackers, for personal gain; or for white hat hackers, for the benefit of the shareholders (and in defense of the banks, companies and states that are annihilating us and the planet in which we live); and by military and intelligence agencies, as part of their war and confli... |
* Ami: El Niño de las Estrellas – Enrique Barrios |
* La Anarquía Funciona: https://es.theanarchistlibrary.org/library/peter-gelderloos-la-anarquia-funciona |
* Viviendo Mi Vida – Emma Goldman |
* The Rise and Fall of Jeremy Hammond, Enemy of the State: https://www.rollingstone.com/culture/culture-news/the-rise-and-fall-of-jeremy-hammond-enemy-of-the-state-183599/ |
Este cuate y el hack de HBGary fueron una inspiración |
* Días de Guerra, Noches de Amor – Crimethinc |
* Momo – Michael Ende |
* Cartas a un joven poeta – Rilke |
* Dominion (Documentary) |
"We cannot believe that, if we do not look, what we do not want to see will not happen" |
- Tolstoy in Первая ступень |
Bash Back! |
[13 - Heal] |
The hacker world has a high incidence of depression, suicides and certain battles with mental health. I don't think it's because of hacking, but because of the kind of environment that hackers mostly come from. Like many hackers, I grew up with little human contact: I was a girl raised by the internet. I have my strugg... |
Why did I rob banks? Because I enjoyed it. I loved to do it. I was more alive when I was inside a bank, in full robbery, than at any other time in my life. I enjoyed it so much that one or two weeks later I was already looking for the next opportunity. But for me money was a minutiae, nothing more. |
Hacking has made me feel alive. It started as a way to self-medicate depression. Later I realized that, in reality, I could do something positive. I don't regret the way I grew up at all, it brought several beautiful experiences to my life. But I knew I couldn't continue living that way. So I began to spend more time a... |
Hacking, done with conscience, can also be what heals us. According to Mayan wisdom, we have a gift granted by nature, which we must understand to put it at the service of the community. In [1], it is explained: |
When a person does not accept his job or mission he begins to suffer from seemingly incurable diseases; although he does not die in a short time, but only suffers, in order to wake up or become aware. That is why it is essential that a person who has acquired the knowledge and does his work in the communities must pay ... |
If you feel that hacking is feeding your isolation, depression, or other conditions, breathe. Give yourself some time to meet and become aware. You deserve to live happily, with health and fullness. |
****** |
________________________ |
< All Cows Are Beautiful > |
------------------------ |
\ |
\ ^__^ |
(oo)\_______ |
( (__)\ )\/\ |
_) / ||----w | |
(.)/ || || |
`' |
****** |
[1] Ruxe’el mayab’ K’aslemäl: Raíz y espíritu del conocimiento maya |
https://www.url.edu.gt/publicacionesurl/FileCS.ashx?Id=41748 |
[14 - The Bug Hacktivist Program] |
It seems to me that hacking to get and leak documents of public interest is one of the best ways in which hackers can use their skills for the benefit of society. Unfortunately for us hackers, as in almost every category, the perverse incentives of our economic system do not coincide with what benefits society. So this... |
- the mining, logging and livestock companies that plunder our beautiful Latin America (and kill land and territory defenders trying to stop them) |
- companies involved in attacks on Rojava such as Baykar Makina or Havelsan |
- surveillance companies such as the NSO group |
- war criminals and birds of prey such as Blackwater and Halliburton |
- private penitentiary companies such as GeoGroup and CoreCivic / CCA, and corporate lobbyists such as ALEC |
Pay attention when choosing where to investigate. For example, it is well known that oil companies are evil: they get rich at the cost of destroying the planet (and back in the 80s the companies themselves already knew about the consequences of their activity [1]). But if you hack them directly, you will have to dive i... |
I will pay up to 100 thousand USD for each filtration of this type, according to the public interest and impact of the material, and the labor required in the hacking. Needless to say, a complete leak of the documents and internal communications of any of these companies will be a benefit for society that exceeds those... |
How you get the material is your thing. You can use the traditional hacking techniques outlined in this guide and the previous one [4]. You could do a sim swap [5] on a corrupt businessman or politician, and then download his emails and backups from the cloud. You can order an IMSI catcher from alibaba and use it outsi... |
[1] https://www.theguardian.com/environment/climate-consensus-97-per-cent/2018/sep/19/shell-and-exxons-secret-1980s-climate-change-warnings |
[2] https://theintercept.com/2019/08/19/oil-lobby-pipeline-protests/ |
[3] https://www.bloomberg.com/features/2016-como-manipular-una-eleccion/ |
[4] https://www.exploit-db.com/papers/41914 |
[5] https://www.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin |
[6] https://blog.rapid7.com/2019/09/05/this-one-time-on-a-pen-test-your-mouse-is-my-keyboard/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.