[ Hacker Night School ] :: Excellent, well-written hacking lessons: HackingTutorials.org

This entry is part 2 of 32 in the series [ Hacker Night School ]

It might seem funny for School for Hackers to like or endorse another hacking tutorial site, but the truth is that sites like Hacking Tutorials are terrific resources for all of us. This really excellent site features detailed, well-written step-by-step tutorials on up-to-the-minute vulnerabilities and exploits: The Top 10 Wifi Hacking Tools in Kali Linux …

Finding and Using Browser-saved Passwords: Another video from Starry Sky

This entry is part 3 of 32 in the series [ Hacker Night School ]

Yeah, we all do it, right? We let our browser store our passwords for all those sites we visit every day. It’s easy, it’s convenient, and it’s really easy to hack. Starry shows us how to reveal these passwords, swipe them and use them in another browser. Plus: he demos what you can do about …

[ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]

This entry is part 5 of 32 in the series [ Hacker Night School ]

Starry Sky and Glenn Norman discuss using a VPN or proxy server https://youtu.be/7CCuE5oobMQ Now take the Quiz: 1. What of these statements is the most accurate description of a proxy. a. Hides your IP address b. Makes it look like you’re coming from a different IP address c. Makes your web traffic (ports 80 and …

[ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]

This entry is part 6 of 32 in the series [ Hacker Night School ]

One of the trickiest things about hacking is knowing what kind of anonymity tool to use, when. If what you are doing involves only the Internet (i.e. web pages and web sites), the right anonymity tool is a proxy server. “Proxy” means “stand-in” or “intermediary” (look it up; research is your specialty, right?), and a …

[ Hacker Night School ] :: TOR Browser Search Engines

This entry is part 8 of 32 in the series [ Hacker Night School ]

Tor search engines Disconnect.me Torch http://xmh57jrzrnw6insl.onion/ Ahmia http://Ahmia.fi AlphaBay http://pwoah7foa6au2pul.onion/ Candle http://gjobqjj7wyczbqie.onion/ Not Evil https://hss3uro2hsxfogfq.onion.to/ The Hidden Wiki http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page Grams http://grams7enufi7jmdl.onion/helix/light Helix http://grams7enufi7jmdl.onion/ StartPage https://startpage.com Duckduckgo.com!

[ Bug Bounty ] :: Hack Facebook for Fun and Profit!

This entry is part 9 of 32 in the series [ Hacker Night School ]

Ashley King writes about an experience with bug bounty: “Whilst working on the Facebook Bug Bounty Program in June 2018 we had identified an issue with the webview component used in the Facebook for Android application. The vulnerability would allow an attacker to execute arbitrary javascript within the Android application by just clicking a single …

[ Hacker Night School ] :: Learn Python in 43 Minutes (if you’re a really fast learner)

This entry is part 10 of 32 in the series [ Hacker Night School ]

Learning new programming languages is an endless task, because languages go in and out of vogue, and new one offer some substantial improvements (none of them will find you a spouse yet, unfortunately). After a while I recognized that all languages have more in common than they have differences, so when I need to pick …

[ Hacker Night School ] :: Hacking Practice: the Command Injection ISO

This entry is part 11 of 32 in the series [ Hacker Night School ]

I love sites like HackThisSite.org and root-me.org, where you can practice your hacking skills legally and safely. There are also some cool pre-vulnerable-ized web applications/sites that you can download, unzip and use on your hacking lab, like DVWA and Mutillidae. Then there are the dedicated virtual machines like Metasploitable, that give you a whole OS …

[ Hacker Night School ] :: Got a foothold on a Windows target? Now enable Remote Desktop.

This entry is part 12 of 32 in the series [ Hacker Night School ]

Want to make your life easier once you’ve gotten a foothold on your Windows target? Enable Remote Desktop. See this article: https://www.interfacett.com/blogs/how-to-remotely-enable-and-disable-rdp-remote-desktop/ TL;DR: In cmd.exe: Reg add “\\computername\HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server”  /v fDenyTSConnections /t REG_DWORD /d /f In Powershell: Invoke-Command –Computername “server1”, “Server2” –ScriptBlock {Set-ItemProperty -Path “HKLM:\System\CurrentControlSet\Control\Terminal Server” -Name “fDenyTSConnections” –Value 0} Don’t forget to allow RDP through …