|
|
SlydexiaJoin Date: 2010-08-10 Post Count: 98517 |
i am pro |
|
|
i'd never do it tbh
"the worst feeling is feeling unwanted by the person you want the most" |
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
DNS traversals are mainly vulnerable through Binomial SQL injection through private subnets.
IIS Servers are commonly vulnerable to Remote client exploitation. |
|
|
Very good.
I commonly use the program known as Brutus to transfer the user-account information directly to a MySQL database I own. |
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
OH and LFI's and RFI's are the easiest ways to upload a Reverse TCP shell |
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
@Evasive
Script kiddie; Brutus has nothing to do with MySQL; however it's mainly used for bruteforcing user input fields through GET or POST methods |
|
|
"Script kiddie"
Quite the contrary, I am a highly-qualified self-taught professional.
You however, seem very unsure of advanced hacking prowess. I would suggest that you consider using Brutus to also access websites. You may enjoy it and become as skilled and knowledgeable as I am. |
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
@Evasive
Kid I bet you still use windows as your main bootup OS LOL!
Sit there and cry kid. |
|
|
"Kid I bet you still use windows as your main bootup OS LOL"
How pitiful. You are a hacker-aspiring adolescent schoolchild unfamiliar with the mechanisms of Linux or Metasploit.
When you become wiser and decide to learn about "efficient system hacking", you will be easily accepted into our community. |
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
Kid I've been using Metasploit to encode polymorphic thread numeric shellcode into x32 and x64 architectual programs to bypass AV's before you even touched your first keyboard. Be mad kid. |
|
elquijanoJoin Date: 2015-12-31 Post Count: 1383 |
you're both dumb |
|
|
>our community
by community you mean community consisting of mainly 12 year olds who think ce is still "hacking" and black hats who assert their "superiority" over everyone else because they can hack?
"the problem is not the problem. the problem is your attitude towards the problem."
|
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
@Iron I bet he goes to hackforums lmao |
|
|
|
"Kid I've been using Metasploit to encode polymorphic thread numeric shellcode into x32 and x64 architectual programs to bypass AV's before you even touched your first keyboard"
It would seem that reading Computer-Security magazines involving the experiences of qualified-professionals has allowed you to perfect your fantasies quite well.
Continue to boast about your fabricated knowledge of system security. It will certainly validate your ambitions. |
|
|
nerfdiablo and evasiveanon are both idiots
i've been using inspect element since before your daddies were born
|
|
|
>Continue to boast about your fabricated knowledge of system security. It will certainly validate your ambitions.
continue to boast about your hacking skills
maybe the neckbeard will grow a bit more
"the problem is not the problem. the problem is your attitude towards the problem."
|
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
Okay but the thing is I'm majoring in Computer Network Security
So you can just sit there and cry. You're just some harmless 13 year old that thinks he's a hacker because he can look up Metasploit tutorials on YT. |
|
elquijanoJoin Date: 2015-12-31 Post Count: 1383 |
"I'm majoring in Computer Network Security"
nice meme degree |
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
I doubt you even know the difference between x32 and x64 architects or how ARP poisoning works(hint: Look up DNS hijacking). |
|
elquijanoJoin Date: 2015-12-31 Post Count: 1383 |
"I doubt you even know the difference between x32 and x64 architects or how ARP poisoning works(hint: Look up DNS hijacking)."
i doubt you even know how to get a gf |
|
Red_TeamsJoin Date: 2012-09-11 Post Count: 520 |
@elqui
Ik it's a meme degree but it's something to put on a resume. |
|
|