Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
Which ons is less risky and which one Is most profitable to succeed ?
0- telling the admin you forgot your password and as he's logging in, sniff his password (you already placed sslstrip)
1- gain access to router using its vulnerabilities and redirect the traffic to a fake page and get the password.
2- exploiting smb port of admin's system and placing a krylogger or stealing his cookies if available
3- brute forcing admin password :/
4- pressing forgot password on admin account and staying close to him and sniff the SMS containing the otp using rtl-sdr (and of course you will be prompted to set a new password)
5- any other way .
Also the website itself is almost secure.
It is using iis 8.5 and windows server 2012
Only open ports are 80 and 443.6
Today I took a taxi to work.
I put on my hands free on my both ears and started watching an online course.
After a while I payed the driver with a bill expecting him to give back the rest.
He started whispering sth (but I couldn't hear him!) Then he started looking at me!
Oops! Looks like he was talking to me...
I took of my handsfree and he started talking about young people have became deaf these days ! They have lost their minds !!! (He repeated these all thr way !!)
I did not know what yo say, so I stayed silent and just smiled :)3
He he he!
Matching software version and vulnerabilities in NIST then exploiting it is not HACKING !
I wanna find new zero day vulnerabilities that no one ever noticed before!!7
-almost there ...
My little sister: hey! Can you install this game on my tablet?
Me: no! I'm busy right now
Me: okay! okay!
<installation process >
What was I doing?...
That's how everything gets ruined :/7
Will this code be compiled ?
using namespace std;
If a pentester find a very critical bug and the boss is not aware of him knowing this type of exploitation (no one is expecting him to find such flaws)
Should he report it ? Or reporting will make him suspicious ?7
Tired of all those timetables, application, motivational quotes ...
Coded my own assistant : Robo1100
Still full of ifs but properly understands what I mean (I don't have s very wild vocabulary )
Can I call it artificial intelligence?
Some of his features:
- determining current tasks according to date and time
- tracks the task and show you how many percent you've done
- plays different musics according to your mood (if you start nagging he'll play motivational rock and so on)
- does simple calculations for you
-gives you simple informations like time , whether,...
- remind you the events of the day
- reads a rsnfom cool quote at startup
- most importantly speaks with s human voice
imagine a big network with mikrotik routers around. each user must login to the hotspot to access the internet (login page is always the same ip)
i am connected to one of those routers using winbox but i dont see any of those user/pass in the hotspot section of this router. and this router is the only router winbox has detected.
so... what am i doing wrong? where are the use/pass stored if they are not in this router?1
/ | | \
Now I know :
Hacker wallpaper , motivational quotes, drinking dark coffee, listening to metal music, wearing black hoodies and other stuff like this ...
WON'T MAKE ME ANYTHING !
I feel like a dummy :/9
A backdoor means an open port so...
If anybody in including the admin checks the open port he will definitely notify the port and probably will close that port so...
Maintaining access means nothing?8
I hate being invited to a party!
Specifically when I have no chance to refuse (family parties mostly)
Though I'm still able to code or read a book with my phone but WHY SHOULD I??
Idk ... what do you do in such complicated situations?3