Skillssmall amount of js, Lua and Python. I'm also dabbling in pentesting (I suck at it, honestly, but I find it really cool and I want to learn more about it)
Joined devRant on 6/11/2017
Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple APILearn More
Acquaintance of mine brags that he made a "Facebook password cracker" that took less than 30 lines of code.
I take a look at it, then I realize it's brute force password cracking.
Facebook doesn't even let you do that many password attempts, not to mention that brute forcing passwords is going to take more time than the expected lifetime of the sun. (exaggeration? Maybe. But you get my point.)
Why are we still here? Just to suffer?6
Trying to learn AdonisJS. Looks like a really cool framework, but having a really hard time how all of it really comes together. I get the model-view-controller philosophy that Adonis abides by, but not really how it's implemented.
So my friends USB drive suddenly doesn't work. It shows up in Windows' device manager (with no exclamation sign) but not in My Computer or even Disk Management (So I can't partition it) Reinstalling drivers doesn't work either. When trying to mount it in Linux, Linux complains that it can't see the drive. fsck and gparted don't read it either, but it shows up in lsblk. Dmesg complains it can't read the partition table (error -110). Any of you guys have bright ideas? Nothing like this has shown up in SO before so I've asked in both here and SO. Any ideas?12
I have a Kali Linux VM running on my Windows machine. I decide to try and exploit the Windows machine (THAT THE VM WAS RUNNING ON) because of a vulnerability with smb that requires NO user interaction. I decided to make my computer shoot its own legs and I thought "Hey, this is gonna be fine."
Aaaaand the whole system crashed on me.3
Some kid keeps asking me how to session hijack. I keep telling him there's no point if:
A. You're not on the same network as him / her (I'm sure there are exceptions to this but normally you'd have to be on the same network)
B. The connection is encrypted
He doesn't understand either of those things. Not to mention it's illegal unless you're given consent.7
School just started. New computer teacher seems like a bitch, hopefully her skills justify her attitude.5