cr0mll


























  1. You will need to google how to install a Kali Linux virtual machine. You will also need to buy a wifi adapter which supports packt injection and monitor mode. I recommend the Tenda U12.

  2. Create a few master passwords and add slight alterations to them (changing characters to symbols or numbers). Then order those passwords in a hierarchy depending on their complexity and use the more complex passwords for accounts you consider more important.

  3. You need a wireless adapter which supports monitor mode. If you have no experience, I can recommend the Tenda U12.

  4. The hacking space is very dynamic and while the basic techniques do not change much over time, no book will ever be able to be completely up-to-date. What I suggest is that you begin with youtube and tryhackme. Some good channels to check on there are TheCyberMentor, ippsec, John Hammond, and Hackersploit.

  5. https://cr0mll.github.io/cyberclopaedia

  6. Tenda U12 is what I use, supports both packet injection and monitor mode on 2.4GHz and 5GHz and it costs something like 20$.

  7. Someone watches too much Hollywood

  8. Yes they can. A simple reset does little to actually wipe the data. It is still there, but it just isn't kept track of anymore. If you had access to the device, you could inspect the memory contents and locate pretty much anything there.

  9. As sublime as this code is, please use something like pastebin.

  10. C++ is what you need. It will teach you the same concepts as C will, but it will make them more tractable.

  11. Bro Instagram is made on Python framework, Dropbox and so many giant apps are running python under the hood and here you are spitting shit.

  12. The real question is... what is Python running under the hood? C.

  13. Search up TheCyberMentor, Hackersploit and JohnHammond on youtube. You can then move onto TryHackMe, hackthebox and watching ippsec. The first resources are pretty much completely free.

  14. Install the drivers for the adapter

  15. Next up is windows privilege escalation... I just need to do the research lol

  16. Looking forward to that one! I always find windows privilege escalation to be harder than Linux. Thanks!

  17. I have scarcely done any windows exploitation/privilege escalation at all, so I do have my work cut out for me.

  18. Yes, I am, although it will take some time.

  19. Start by watching TheCyberMentor, Hackersploit and JohnHammond on youtube. You can then move onto TryHackMe, hackthebox and watching ippsec. The first resources are pretty much completely free.

  20. Start by watching TheCyberMentor, Hackersploit and JohnHammond on youtube. You can then move onto TryHackMe, hackthebox and watching ippsec. The first resources are pretty much completely free.

  21. Mark the executable as autorun. If the windows machine is old then it will execute. If not, then you need a larger investment into a rubber ducky.

  22. If you want to be a hacker, you will have to think.

  23. When your device is in managed mode (normal mode), it has to follow certain rules which are defined in the IEEE 802.11 standard. However, monitor mode disconnects the network card from any particular network and lifts many of the restrictions imposed by the standard.

  24. Is monitor mode a feature or lack of restrictions on a device and its driver?

  25. It's the former and the latter is its corollary

Leave a Reply

Your email address will not be published. Required fields are marked *

Author: admin