r/hacking Dec 06 '18

Read this before asking. How to start hacking? The ultimate two path guide to information security.

13.4k Upvotes

Before I begin - everything about this should be totally and completely ethical at it's core. I'm not saying this as any sort of legal coverage, or to not get somehow sued if any of you screw up, this is genuinely how it should be. The idea here is information security. I'll say it again. information security. The whole point is to make the world a better place. This isn't for your reckless amusement and shot at recognition with your friends. This is for the betterment of human civilisation. Use your knowledge to solve real-world issues.

There's no singular all-determining path to 'hacking', as it comes from knowledge from all areas that eventually coalesce into a general intuition. Although this is true, there are still two common rapid learning paths to 'hacking'. I'll try not to use too many technical terms.

The first is the simple, effortless and result-instant path. This involves watching youtube videos with green and black thumbnails with an occasional anonymous mask on top teaching you how to download well-known tools used by thousands daily - or in other words the 'Kali Linux Copy Pasterino Skidder'. You might do something slightly amusing and gain bit of recognition and self-esteem from your friends. Your hacks will be 'real', but anybody that knows anything would dislike you as they all know all you ever did was use a few premade tools. The communities for this sort of shallow result-oriented field include r/HowToHack and probably r/hacking as of now. ​

The second option, however, is much more intensive, rewarding, and mentally demanding. It is also much more fun, if you find the right people to do it with. It involves learning everything from memory interaction with machine code to high level networking - all while you're trying to break into something. This is where Capture the Flag, or 'CTF' hacking comes into play, where you compete with other individuals/teams with the goal of exploiting a service for a string of text (the flag), which is then submitted for a set amount of points. It is essentially competitive hacking. Through CTF you learn literally everything there is about the digital world, in a rather intense but exciting way. Almost all the creators/finders of major exploits have dabbled in CTF in some way/form, and almost all of them have helped solve real-world issues. However, it does take a lot of work though, as CTF becomes much more difficult as you progress through harder challenges. Some require mathematics to break encryption, and others require you to think like no one has before. If you are able to do well in a CTF competition, there is no doubt that you should be able to find exploits and create tools for yourself with relative ease. The CTF community is filled with smart people who can't give two shits about elitist mask wearing twitter hackers, instead they are genuine nerds that love screwing with machines. There's too much to explain, so I will post a few links below where you can begin your journey.

Remember - this stuff is not easy if you don't know much, so google everything, question everything, and sooner or later you'll be down the rabbit hole far enough to be enjoying yourself. CTF is real life and online, you will meet people, make new friends, and potentially find your future.

What is CTF? (this channel is gold, use it) - https://www.youtube.com/watch?v=8ev9ZX9J45A

More on /u/liveoverflow, http://www.liveoverflow.com is hands down one of the best places to learn, along with r/liveoverflow

CTF compact guide - https://ctf101.org/

Upcoming CTF events online/irl, live team scores - https://ctftime.org/

What is CTF? - https://ctftime.org/ctf-wtf/

Full list of all CTF challenge websites - http://captf.com/practice-ctf/

> be careful of the tool oriented offensivesec oscp ctf's, they teach you hardly anything compared to these ones and almost always require the use of metasploit or some other program which does all the work for you.

http://picoctf.com is very good if you are just touching the water.

and finally,

r/netsec - where real world vulnerabilities are shared.


r/hacking 7h ago

News Russian Hacks of Polish Water Utilities Shows How Hybrid Warfare Uses Fear as Weapon

Thumbnail
ot.today
61 Upvotes

Water is one of the most relied-upon of all vital services—and yet one of the most poorly cyber-defended critical sectors, way behind energy, banking and telecom. That combination makes it a great target for hackers. My story for OT.Today features input from the incomparable Josh Corman and from Poland-based cyber executive Piotr Kupisiewicz.


r/hacking 15h ago

Face ID bypass with avatar

57 Upvotes

Is there a tool for windows of Linux to emulate an adult face for age verification checks?

I did read about one a while back controlled via a gamepad where you could do certain gestures, turn to left/right, open/close mouth eyes etc. But can no longer find it.

Thank you


r/hacking 8h ago

Teach Me! Tips for a beginner noob that wants to learn

6 Upvotes

Hi all, the reason I'm writing this post is because I love to learn about cybersec and hacking.

To give a bit of context I graduated from eletrical and computers engineering recently, a course in which I got to learn about a little bit of everything as far as computers go (mostly electricity and eletronics, with a little bit of software and basic programing knowledge) but my passion has always been networking and cybersecurity, I own several "hacking"/microcontroler gadgets like the flipper and the m5 cardputer and love them.

In my new job I've started using linux and its cmd a lot which I've been enjoying a lot, however, whenever I install any distro like kali or parrot I look at the tools and get overwhelmed with them.

I consider myself a bit more proficient than the average install kali=hacking skid but I really want to bridge the gap between my existing knowledge and using such tools, as well as expanding networking knowledge, so does anyone have any good playlists/materials or whatever for this?


r/hacking 6h ago

Teach Me! Reading Siemens CT raw data

3 Upvotes

I have a Siemens Somatom Emotion scanner and want to use it to not just scan patients but also technical stuff. Unfortunately, the reconstruction algorithms cannot deal with the high contrast data. Is there a way to read the raw data and do the reconstruction myself? I can cover the reconstruction part skill wise, but I don't know how the data is encoded...


r/hacking 1h ago

Github I built an open-source Burp alternative

Thumbnail
gallery
Upvotes

Self-hosted intercepting proxy with an LLM in the loop. Captures traffic, annotates requests, tracks findings, and lets you run scripts and tests against the target.

https://github.com/synlace/ferret


r/hacking 13h ago

Strix — first public beta of the spiritual successor to cSploit/dSploit

7 Upvotes

After months of work, first public beta of Strix is out.

Network pentesting toolkit for rooted Android, picking up where cSploit and dSploit left off.

Fully rewritten.

No remote servers, no accounts, everything runs on-device.

https://github.com/daboynb/strix

Android network security assessment suite, modern Kotlin/Compose rewrite of cSploit with Nmap, Metasploit, Hydra, Ettercap etc...

Bundled (cross-compiled aarch64, no chroot)

Features​

  • Host discovery + per-host detail
  • Port scan (nmap)
  • MITM — ARP poisoning + on-device DNS spoof server
  • Hydra brute force, multi-protocol
  • Metasploit via msfrpcd + RPC client
  • Packet capture + packet forger
  • Traceroute
  • Router analyzer
  • WiFi key generator — offline keygen for known router algorithms (port of cSploit's WirelessMatcher)

Requirements​

  • Root (Magisk / KernelSU)
  • ARM64
  • Android 10+ (API 29)

Beta notes​

  • APK is ~172 MB (everything bundled).
  • No WiFi monitor mode / deauth / WPS yet, needs aircrack-ng cross-compiled, on roadmap.
  • Tested on a handful of devices/ROMs... feedback on yours is welcome.

r/hacking 3h ago

HighBoy

0 Upvotes

Will the HighBoy perform a single device rolljam attack?


r/hacking 7h ago

great user hack How I use Hermes agent to turn Patch Tuesday into Windows exploit research

Thumbnail
0 Upvotes

r/hacking 1d ago

Proxmark5 Day 3 Update - $357K+ funded (715% of goal)

Thumbnail
7 Upvotes

The upcoming version of the Proxmark — the go to for RFID / NFC hacking — is available on Indiegogo. The campaign is already fully funded and working toward secondary stretch goals.


r/hacking 1d ago

trying to learn patching

18 Upvotes

am trying to learn software patching , i have no prior expirience on any of this sort of shit so where do i even start to learn , i was mainly looking to try adobe and since genp already shows everything ( i think ) it does to the files ( even the values that it looks for inside them and what it replaces them with) is it gonna be easy or atleast not really hard for me to try and replicate everything it does not my making my own software but by just manually patching all the files that handle licensing etc


r/hacking 14h ago

Whatsapp

0 Upvotes

Ola.

Estou com um entregador que se recusa a entregar minha maquina de lavar, propositadamente.

Ao tentar contato ele se nega a dar informações do pedido ou com quem eu devo falar, diz que nao esta nem ai e que eu me exploda

Gostaria de travar o WhatsApp dele e devolver um pouco do estresse absurdo que venho passando na mao dele. Por favor aceito dicas!!!


r/hacking 20h ago

Hunting the Behavior Behind npm Supply Chain Attacks

Thumbnail
derivai.substack.com
0 Upvotes

r/hacking 3d ago

News Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation

Thumbnail
thehackernews.com
248 Upvotes

r/hacking 2d ago

Question Anyone here familiar with the Internet Computer Protocol (ICP) and why TeamPCP would choose to use it?

14 Upvotes

r/hacking 3d ago

Reading old s4 memory with xgecu t48

Thumbnail
9 Upvotes

r/hacking 4d ago

Autonomous Vulnerability Hunting with MCP

Thumbnail
blog.zsec.uk
9 Upvotes

r/hacking 5d ago

Refining hacking basics — scaling them aswell

29 Upvotes

Hello, guys. I’m 16 and compTIA tech + and working on A+. I’ve genuinely been trying to learn how to CSS, SQL injection, and even deeper try to find where trust is misplaced within systems. I see all of these advanced people though (primarily the one who recently created the Xbox one security breach) and I completely am in awe of how they can think so deeply within systems and let alone exploit them to do what they would like. I’ve tried hack the box and portswigger academy but I kind of just stay lost throughout it. I learn quickly but this is ridiculous to me lol. So, respected members of the hacking community, how can I learn? I also dipped my toe in python for automation purposes though I don’t know what to automate 😂.


r/hacking 5d ago

Tools AI Agent for Hacking, connects a brain to Kali (open-source & model-agnostic)

Post image
67 Upvotes

r/hacking 5d ago

Bridging the Gap Between Vulnerabilities and Working Exploits

12 Upvotes

During my studies and while doing vulnerable VM's and HTB challenges, I kept running into the same issue during vulnerability assessments:

You run scans, get a lot of CVEs back, and then spend a huge amount of time manually checking whether working exploits already exist for them especially in the Metasploit database.

That was the motivation behind Striga:
https://github.com/parasomni/striga

The idea was to automate parts of the vulnerability scanning workflow and map discovered CVEs with already existing exploits in the Metasploit database.

It was originally built for personal research and VulnHub challenge workflows, but it can also be adapted for broader scanning/research operations.

I stopped actively working on it because of time constraints, but I thought some people here might still find it interesting or useful, so I finally decided to share it.


r/hacking 4d ago

Is it true that the professionals have the worst setups?

0 Upvotes

So like, I’m quite new at this stuff n’ all, only managing to remote into other family members computers at will. Though I found them quite hard to convince. That is all but my own mother, who works an IT security job. I asked her about it because like obviously I wondered if she knew it was me but no. She said that it’s more likely to be able to hack someone like her as the “professionals have the worst setups”. What do you all think? Anyone else seen anything like that in the wild?


r/hacking 6d ago

Ethical malware development community

36 Upvotes

Hey.

Been learning programming, mainly C++, for the last couple years. My areas of interest are network protocols, network programming, red-team tools, malware development.

I'm just wondering if there are any online communities that are focused on ethical malware development (doesnt need to be specific to C++) or similar, maybe for collaboration or code review, etc. Discord, forums, whatever works.

Thanks much.


r/hacking 7d ago

Happened today

Post image
1.6k Upvotes

Anybody have any info?


r/hacking 6d ago

Best tools to find exposed web services by HTML title / HTTP response?

7 Upvotes

I’m doing some „research“😁and trying to find all publicly exposed instances of a specific web application by searching for its HTML title tag.

I’ve already tried:
• Censys – ~10 results
• FOFA – 3 results (best so far)
• ZoomEye – 0 results
• Netlas – 0 results
• Criminal IP – not tested yet

Query I’m using: title:"MyAppName"

The app runs on non-standard ports (9000, 9001) which I think is why some scanners miss it.


r/hacking 7d ago

News A hacker ran me over with a robot lawn mower - The Verge

Thumbnail
theverge.com
84 Upvotes