This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Ghastly

Pages: [1] 2
1
Hacking and Security / Re: Tunneling Software in Linux
« on: April 09, 2013, 05:07:13 AM »
Privateinternetaccess or Mullvad are my top favorites.

Both allow bitcoin purchasing and are cross-OS compatible.

2
Hacking and Security / Re: Target Hunting Tutorials...??
« on: April 09, 2013, 05:03:05 AM »
If you have money you can watch excellent courses at

thehackeracademy
or
Security Tube (MANY free videos here)

3
News and Announcements / Re: M33 X-7 Black Hole Archives - EZ Archives
« on: April 09, 2013, 04:54:57 AM »
I like it, thanks.

4
Tutorials / Re: (ARTeam)All You Need To Know About PE Files
« on: August 31, 2012, 01:13:00 AM »
Thanks mate, looks good.

5
Hacking and Security / Re: Question about TOR project
« on: August 31, 2012, 01:06:48 AM »
If you don't know this I am amazing you can 'hack' let alone in windows.

Tor changes your IP for the browser, and If your in a Linux distro, you could set all connections to route through it. Create a new network interface for that.

6
Hacking and Security / Re: A hacker is pissed off with me; I need help.
« on: August 31, 2012, 01:01:52 AM »
First of all, relax. You have nothing much to worry about.

If someone was badmouthing you and after getting banned threatens to "hack" you then judging from his actions and behavior it is very likely that he is just some kid trying to look like a bad ass, even though he is a complete noob who doesn't know anything about "hacking" (or what ever you call it).

Now, if he did "hack" you, then it is already too late, as he probably captured all your passwords and placed all kinds of backdoors to get access whenever he wants to. He would have sent fraudulent emails from your account to all your contacts asking them to transfer a little amount of cash to help "you" out in an "emergency". He might be even watching you right now through your webcam.

 ;)

Have a nice day!

P.S. Oh, and I see this is your first post so welcome to EZ. Room 32B is upstairs to the left (I have learned the hard way). Dr. m0rph will make this issue the last thing you worry about.

Edit: if you are still paranoid, then the quick and easy way is to just reinstall the router firmware and your operating systems to get rid of all the malware, backdoors and other junk that might have gotten into there.


This made me cry quite a bit.

"all kinds of backdoors"

Personally, disabling HTML access to your router will prevent a major weakness in it. (that goes for everyone)

7
Bit old but should still work.

8
Operating System / Re: Windows 8 Seriously, WTF?
« on: July 25, 2012, 11:22:58 PM »
They probably don't like it either... but they have to keep there shareholders happy.

With the whole tablet craze they have to make everything touch friendly.

Disgusts me.

9
Found it on the Webs / Re: Free online courses
« on: July 25, 2012, 11:15:09 PM »
udacity has a course on comp sci and crypto

10
Hacking and Security / Re: Most rewarding hack you've ever done?
« on: July 25, 2012, 09:44:35 PM »
Most rewarding? Hmm, well the most rewarding was when I hacked my school's wifi password. I guessed it then like 3 weeks later they changed it. After they changed it I got some of my friends to take me to my school. I booted up bt5 on my notebook with reaver. It normally takes about 4-6 hours to hack it, but this only took 12.3 seconds. Not even joking. From then on I was known as the l33t h4x0r of my school. Shit was so cash being invited to senior parties when I was in the 8th grade.

Wait.... BT5 is from 2012.. so your in 9th grade now?

11
General discussion / Re: WTF skiddies
« on: July 25, 2012, 09:20:43 PM »
Guys, I've found the most Über l33t tool on the site, notepad.

12
What I do is purchase cheap unix shell accounts from places like sh3lls net and set up the VPN myself. Stater shell accounts only cost 3 dollars a month so you can keep buying new ones whenever you want.


You know there are no logs being kept when your the one who installed the VPN. It's easy to get untraceable currency, most of these guys will take Western Union (preferable because there is no easy way for the authorities to get anything from them info wise) or by purchasing prepaid credit cards with cash while ensuring there is not any cameras getting a good picture of your face.


Could you tell me how to connect to a UNIX VPN? I have never used UNIX yet.

13
.NET Framework / Re: [Bubzuru C#] Melt File
« on: July 03, 2012, 04:48:17 PM »
Thank you it should help me soon.

14
When buying a VPN, I would recommend the following procedure:

1. Buy a prepaid visa card from the local convenience store with CASH (wear a hat and keep your head down).

2. Use prepaid visa card to buy Bitcoins.

3. Split bitcoins into three or more groups, send them to different bitcoin wallets and then all to one wallet so it looks like you received a donation from three different people.

4. Buy your VPN using Bitcoins.

Nice tutorial for beginners.


Thats a good idea, can you recommend and VPN sites?

15
That is my point. If the router your are hacking with gets found out, they go to the victims house and could see your MAC. Then all they have to do is check that with stores like BestBuy.

Pages: [1] 2


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.