You shouldn’t learn hacking, you should learn lots upon lots about what you want to hack and think how to make it do what you want it to i.e give you shell. I would start with networking. There’s awesome book by Don Colton about it, and it’s free.
- 10 Posts
- 85 Comments
“At The Mountains of Madness”
montar@lemmy.mlto Ask Electronics@discuss.tchncs.de•self actuating toggle switch?English1·5 months agoDoes your common relay count? You would need to keep it powered tough.
montar@lemmy.mlto XMPP@slrpnk.net•Looking for client with XEP-0396: Jingle Encrypted Transports (OMEMO)2·8 months agoThere’s monocles chat on fdroid, honestly, it’s avesome.
Aside from reverse image search Yandex is wonderful for obscure things like software reverse engineering.
montar@lemmy.mlto Internet of Shit@suppo.fi•Mazda's $10 subscription for remote start sparks backlash after killing open source workaround via DMCA takedown3·9 months agoMy bet is that there will be a point where only russian cars (looking at UAZ) and cars made for busieness (delivery VANs and buses) would be only ones left.
montar@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•*Permanently Deleted*English21·9 months agoIf you aren’t strictly concerned with having it losless you can check out yt-dlp and download straight from youtube.
montar@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•PSA/HOWTO: Avoid fake mkv torrents. Avoid getting hackedEnglish4·9 months agoyep! I’ve found out browsing hacking/spamming site and i’ve found something too good to be true, it downloaded archive nested inside other archive and in it was silngle .lnk file leading to “the resource”. Peeking inside i’ve found powershell executing base64 (or base32?) encoded script (it’s got commandline option for that. if you want to ask wtf ask microsoft, and tell me), it dl’d some exe from some site and ran it, site was down alredy.
montar@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Signal Piracy groupEnglish3·9 months agoMastodon i guess.
montar@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•We should probably use upx to package executable in torrenting space (Discussion)English1·10 months agoJust putting all your stuff in one big .7z so you can unpack it to directory then scan them all w/ AV.
montar@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•DeCENC is yet another way to beat Amazon, Netflix video DRMEnglish12·10 months agohttp://phrack.org/issues/71/6.html#article here’s the original paper for the intrested.
montar@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•We should probably use upx to package executable in torrenting space (Discussion)English6·10 months agoHe didn’t, malware guys use UPX and it’s true that antiviruses scream bloody murder when they see it. It’s also true you can’t see what’s inside unless you have special tools to do so. UPX also has one huge downside, it’s its RAM usage, due to it’s inner workings it’s unable to use optimisations that normal binaries can like page sharing.
montar@lemmy.mlto New Communities@lemmy.world•[Meta] Any category of communities we haven't covered in the recent threads?English2·10 months agoTech? I would really love to join reverse engineering community or two.
montar@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•The big ISPs should band together and fight the studiosEnglish191·10 months agoThey will not because it wouldn’t be profitable to them.
If you log in w/ tor to account you’ve logged it w/o it you deanonymise yourself and it makes no sense.
montar@lemmy.mlto Bushcraft@lemmy.ml•Home made oilcloth. Slight disaster, advice appreciated1·10 months agoWas going to suggest this vid too!
montar@lemmy.mlto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Yams keeps giving out errors, and Lucida fails in the middle of the downloadEnglish2·10 months agoTidal and tidal-dl. You can ask me for stuff.
montar@lemmy.mlto Lemmy Scare You! A community for sharing short scary stories.@lemmy.world•You live in a beautiful but isolated area. This morning you saw this from your kitchen window...4·10 months agoGrab my hunting knife. Hide it under coat. Call my dogs. Go meet that thing. Knife has to be hidden in case it turns out peaceful like i am. (peaceful is not harmless)
Writing program that use “raw sockets” is fun, like your own ping program.