Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
I'm kinda freak about my knowledge.
When i find out i've missed an epsilone of a topic , i start that all over again to make sure i'll cover everything !
New reads: C programming language by ghanaian and ritchie2
Simple ANTLR project for compiler class accepted .
(btw I had no idea about what antlr was , so i googled everything :D)
A developer said to me: developers may hurry to finish the project before deadline that they might miss many security bugs specially in the updates. That a creative hacker will later take his time and exploit them.
Is it correct ?3
I was trying to understand the source code of aircrack-ng which is written in C today.
Suddenly I saw sth strange !
WTF !! what is #ifdef ??? I've never seen that before !
So I told myself : hey ! You have to download a complete C programming course!
so I did , but when I skimmed through the titles , again:
WTF ! I know all of them! So why the fuck I could not fully understand the code ? Where can I find anything I missed ?
So... I'm asking U :)13
Honestly ! How many mugs of caffeine U get each day ?!
(Just wanna make sure i'm not indulging :) )25
Haha ! Can't balive i fanally broke this chain and joined a group for statistics final project !
It was soooo difficult but i did it 😎2
Just 1 cup of cappaccino can make me stay awake the whole night :/
2 nights no sleep , not gonna get anymore caffeine tonight !7
Am I a simple man ?
I had a small convetsation with a stranger and he suddenly called me "a simple man".
That made me wonder for 3 days and i thought i can ask U .
U can see my prev posts and share your thoughts with me .13
What is this ?
U call this wireless security??
Anyway what is the best way of securing hotspots in the airports , hotels , ... ?11
How do u validate the license key of your offline application ?
(In a way that a cracker would have less chance to find the serial like this )27
A bit confused !
Must prepare an article about network pentest and defense .
Since its a very wide topic and I've been told not to just mention tools , I'm confused about categorizing these tests !
Also the footprinting stage is not likely to have any defense !(no attack is lunched yet :) )
So... Any idea?8
Why am I so introvert ?
The statistics's homework was 63 problems and the prof said that we can solve them in groups so each person will have to solve less problems .
But me ! No friends , no group ! Must solve all of them on my own :(19
Cryptography and Network Security
Got the book ^ ^
Feel free to comment any cool book about security :)4
print('I love U world !!')
I'm back !! After being fired from my job (read my prev rants) , after a week they called me and told me that I can return! (If only I promise that I'll control my curiosity and i'll never make the same mistake ever again)
It is just like a dream !!
I'm really glad that I listened to your advice and didn't do anything stupid :)8
Any better way for breaking telnet ?
(I had no idea who was ever going to connect to this ip using telnet so i had no chance to sniff the password :(
Now it is taking ages to brute force )
//mac is already spoofed ;)1
Now that I have time to approach my ultimate dream ( being the pro penrester ) , asked a hacker for a road map and he gave me (U'll rarely see such open hackers that share knowledge :) )
Surprisingly I've been familiar with all the topics but being the most pro , requires u to be pro in every single topic .
Guess what ? I'm starting from basic linux commands all over again 😂
echo 'hello world :/'29
Looking for bug bountry online and trying to find sqli bug.
I tried using sqlmap but no success.
Is it about WAF they're using or sqlmap is not complete ?
(I set the level and risk to highest possible)
If I exploit ms server 2012 through a wifi hotspot , but logged in to someone else's account (assume it was sniffed) , and I do it using msfconsole connected to the tor with torify command , also I spoof my mac ,
will I stay 100% anonymous ?
If not , what can be done ?45
I fucked up !
Please tell me what is going to happen if a pentester fucks up ?
I was just curious about the codes the developer was typing remotely while they were containing important datas :/
Fuck me ! I thought it would be nice if i take some pictures of that amazing code so the other employees misunderstood !!
They think I was stealing data ! 😭
What should I do ?
What can I tell them ?21
Assume U've captured the cap using airmon-ng , airodump and aireplay .
The question is:
If I dont wanna use air crack-ng and wanted to use sites like hashkiller , how can i get the hash from the cap file?1