iamnoangel Posted March 8, 2017 Share Posted March 8, 2017 Just a suggestion, assuming you want to know how to exploit to be able to increase or apply security measures, it is best to create/understand penetration codes/apps first.It will help you in the long run rather than using pre made code/software/hardware. Just my humble opinion Quote Link to comment
k4t5u Posted March 8, 2017 Share Posted March 8, 2017 Just a suggestion, assuming you want to know how to exploit to be able to increase or apply security measures, it is best to create/understand penetration codes/apps first.It will help you in the long run rather than using pre made code/software/hardware. Just my humble opinionI agree. It is better to understand the concept and build on that. Quote Link to comment
JayZip Posted March 24, 2017 Share Posted March 24, 2017 (edited) guys! may solution ba kayo if tinamaan kayo ng ransomware? Restore from previous working backup. If you do not have a backup, then ur screwed. You might as well re-do it. Just a suggestion, assuming you want to know how to exploit to be able to increase or apply security measures, it is best to create/understand penetration codes/apps first.It will help you in the long run rather than using pre made code/software/hardware. Just my humble opinion I agree. It is better to understand the concept and build on that. How would you understand code if you do not have a coding background much less understand logical security and why it is being exploited?Sure we could say that everyone on this thread has some knowledge of what hacking is but what really is hacking?I say understand the basic security concepts first and why it is being exploited i.e. what is http? what is https? what is the difference between http and https? why is https more secure? what kind of "security" does https use? - that sort of stuff before reading code and using apps. I've read this thread and most of the people in here for revenge porn, hacking their exes accounts or getting free wifi. LOL. Edited March 24, 2017 by JayZip Quote Link to comment
k4t5u Posted March 26, 2017 Share Posted March 26, 2017 (edited) Restore from previous working backup. If you do not have a backup, then ur screwed. You might as well re-do it. How would you understand code if you do not have a coding background much less understand logical security and why it is being exploited?Sure we could say that everyone on this thread has some knowledge of what hacking is but what really is hacking?I say understand the basic security concepts first and why it is being exploited i.e. what is http? what is https? what is the difference between http and https? why is https more secure? what kind of "security" does https use? - that sort of stuff before reading code and using apps. I've read this thread and most of the people in here for revenge porn, hacking their exes accounts or getting free wifi. LOL.Hacking is an often used term as if it's a specific language. It's more of a way / approach on things. e.g. learning / mastering programming languages then move to building with those languages. From there you learn to understand the best practices to keep what your buillding working well and secure -- in relation you understand what makes things NOT work either breaking them entirely or providing holes to unethical coders. What do you think? P.S. If anyone here is after revenge porn, hacking their exes, getting free wifi, other black hat goals:This isn't the thread for you If there is no stopping to what you want, just be a skid and buy the tools. CAUTION: you open yourself to the risk of being hacked back as you do not even know the contents of the tool you are using (karma is always there) Edited March 26, 2017 by k4t5u 1 Quote Link to comment
JayZip Posted March 28, 2017 Share Posted March 28, 2017 Hacking is an often used term as if it's a specific language. It's more of a way / approach on things. e.g. learning / mastering programming languages then move to building with those languages. From there you learn to understand the best practices to keep what your buillding working well and secure -- in relation you understand what makes things NOT work either breaking them entirely or providing holes to unethical coders. What do you think? Ok I get you dude. But honestly, you don't need to code to "hack".Ethical hacking encompasses both physical and logical security. i.e. I don't need code to break into a datacenter - I would just wait for a person with a key card to open the door for me and "sneak" in behind him. From what I understand, you kind of want to learn hacking in a coding point of view.But its like why break into something when its already open, you get what I mean? This is why we sort of emphasize on the security concepts first before we get into hacking and even before we get into coding cause we want to know why its being exploited in the first place. Quote Link to comment
k4t5u Posted March 29, 2017 Share Posted March 29, 2017 Ok I get you dude. But honestly, you don't need to code to "hack".Ethical hacking encompasses both physical and logical security. i.e. I don't need code to break into a datacenter - I would just wait for a person with a key card to open the door for me and "sneak" in behind him. From what I understand, you kind of want to learn hacking in a coding point of view.But its like why break into something when its already open, you get what I mean? This is why we sort of emphasize on the security concepts first before we get into hacking and even before we get into coding cause we want to know why its being exploited in the first place.I get this part as well. Social Engineering. Basically exploting the time and tested and so far hard to fix flaw of any system, us, people. Haha! I understand I need to learn that skill set as well. But IMO, for me, my soft skills is much harder for me to improve compared to my technical acumen. Honestly the scope is broad and big. I understand that I need to learn a multi-facted concept. Just wish there was a proper "curriculum" so I know how I can manage my time and focus per topic / skil set 1 Quote Link to comment
iamnoangel Posted March 31, 2017 Share Posted March 31, 2017 The pre made hacking tools (ex. pineapple) are giving a notion that hacking is a simple trade to learn. Guys keep it mind, the moment you learn a concept to exploit things, security measures for that are already in place. What makes a hacker successful is that he/she can find a hole in the system, with experts trying to safeguard it. So basically, you need to find the hole before the security guys do so (Day Zero) Quote Link to comment
p4tr1ck Posted April 20, 2017 Share Posted April 20, 2017 hack hack hack the black jack.. Quote Link to comment
xylem2016 Posted May 3, 2017 Share Posted May 3, 2017 Good afternoon ask ko lang kung pwede kaya ma trace yung isang cellphone number for black mail? Quote Link to comment
jab0ngga Posted May 4, 2017 Share Posted May 4, 2017 anyone here knows how to unlock password protected rar file? thanks in advance Quote Link to comment
ymax02 Posted August 25, 2017 Share Posted August 25, 2017 can the nbi track your ip via email and fb? Quote Link to comment
X0X0 Posted September 20, 2017 Share Posted September 20, 2017 can the nbi track your ip via email and fb?email yes. fb no. Quote Link to comment
ymax02 Posted September 20, 2017 Share Posted September 20, 2017 email yes. fb no.question pag dummy gmail and naka router ma ttrace ka pa din? kung wala silang ibang email na pang verify? Quote Link to comment
IgniT1on Posted February 14, 2018 Share Posted February 14, 2018 The pre made hacking tools (ex. pineapple) are giving a notion that hacking is a simple trade to learn. Guys keep it mind, the moment you learn a concept to exploit things, security measures for that are already in place. What makes a hacker successful is that he/she can find a hole in the system, with experts trying to safeguard it. So basically, you need to find the hole before the security guys do so (Day Zero)Preach! BTW guys sino sa inyo nakapunta na sa rootcon? Quote Link to comment
underwarranty Posted March 5, 2018 Share Posted March 5, 2018 I wonder, are there freelance ethical hackers here? How do you usually arrange to get paid if you are commissioned to do penetration testing? Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.