[ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]

This entry is part 5 of 32 in the series [ Hacker Night School ]

Starry Sky and Glenn Norman discuss using a VPN or proxy server https://youtu.be/7CCuE5oobMQ Now take the Quiz: 1. What of these statements is the most accurate description of a proxy. a. Hides your IP address b. Makes it look like you’re coming from a different IP address c. Makes your web traffic (ports 80 and …

[ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]

This entry is part 6 of 32 in the series [ Hacker Night School ]

One of the trickiest things about hacking is knowing what kind of anonymity tool to use, when. If what you are doing involves only the Internet (i.e. web pages and web sites), the right anonymity tool is a proxy server. “Proxy” means “stand-in” or “intermediary” (look it up; research is your specialty, right?), and a …

[ Hacker Night School ] :: TOR Browser Search Engines

This entry is part 8 of 32 in the series [ Hacker Night School ]

Tor search engines Disconnect.me Torch http://xmh57jrzrnw6insl.onion/ Ahmia http://Ahmia.fi AlphaBay http://pwoah7foa6au2pul.onion/ Candle http://gjobqjj7wyczbqie.onion/ Not Evil https://hss3uro2hsxfogfq.onion.to/ The Hidden Wiki http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page Grams http://grams7enufi7jmdl.onion/helix/light Helix http://grams7enufi7jmdl.onion/ StartPage https://startpage.com Duckduckgo.com!

[ Hacker Night School ] :: Learn Python in 43 Minutes (if you’re a really fast learner)

This entry is part 10 of 32 in the series [ Hacker Night School ]

Learning new programming languages is an endless task, because languages go in and out of vogue, and new one offer some substantial improvements (none of them will find you a spouse yet, unfortunately). After a while I recognized that all languages have more in common than they have differences, so when I need to pick …

[ Hacker Night School ] :: Hacking Practice: the Command Injection ISO

This entry is part 11 of 32 in the series [ Hacker Night School ]

I love sites like HackThisSite.org and root-me.org, where you can practice your hacking skills legally and safely. There are also some cool pre-vulnerable-ized web applications/sites that you can download, unzip and use on your hacking lab, like DVWA and Mutillidae. Then there are the dedicated virtual machines like Metasploitable, that give you a whole OS …

[ Hacker Night School ] :: Got a foothold on a Windows target? Now enable Remote Desktop.

This entry is part 12 of 32 in the series [ Hacker Night School ]

Want to make your life easier once you’ve gotten a foothold on your Windows target? Enable Remote Desktop. See this article: https://www.interfacett.com/blogs/how-to-remotely-enable-and-disable-rdp-remote-desktop/ TL;DR: In cmd.exe: Reg add “\\computername\HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server”  /v fDenyTSConnections /t REG_DWORD /d /f In Powershell: Invoke-Command –Computername “server1”, “Server2” –ScriptBlock {Set-ItemProperty -Path “HKLM:\System\CurrentControlSet\Control\Terminal Server” -Name “fDenyTSConnections” –Value 0} Don’t forget to allow RDP through …

[ Hacker Night School ] :: [ Using Git ]

This entry is part 13 of 32 in the series [ Hacker Night School ]

This is a non-optional skill for anyone who manages systems, runs networks, develops software or hacks on any of these to make them work or break them. 😉 Git (in case you’re a total newb; otherwise skip this) is a code repository, a site where coder teams can work together on projects and check out …

[ Hacker Night School ] :: Tsuki CTF Pwns Access on HackTheBox

This entry is part 14 of 32 in the series [ Hacker Night School ]

Tsuki’s capture the flag Speedruns of HackTheBox machines are WAY too fun, and addictive as candy. I’m going to use this particular vid as a test, to see how useful a full explanation is for my Hacking 101 students. Hacking Access Database Files in Kali 00:00 – Port Scan nmap -sC -sV 10.10.10.98 You’ll see …