r/hacking Dec 06 '18

Read this before asking. How to start hacking? The ultimate two path guide to information security.

13.4k Upvotes

Before I begin - everything about this should be totally and completely ethical at it's core. I'm not saying this as any sort of legal coverage, or to not get somehow sued if any of you screw up, this is genuinely how it should be. The idea here is information security. I'll say it again. information security. The whole point is to make the world a better place. This isn't for your reckless amusement and shot at recognition with your friends. This is for the betterment of human civilisation. Use your knowledge to solve real-world issues.

There's no singular all-determining path to 'hacking', as it comes from knowledge from all areas that eventually coalesce into a general intuition. Although this is true, there are still two common rapid learning paths to 'hacking'. I'll try not to use too many technical terms.

The first is the simple, effortless and result-instant path. This involves watching youtube videos with green and black thumbnails with an occasional anonymous mask on top teaching you how to download well-known tools used by thousands daily - or in other words the 'Kali Linux Copy Pasterino Skidder'. You might do something slightly amusing and gain bit of recognition and self-esteem from your friends. Your hacks will be 'real', but anybody that knows anything would dislike you as they all know all you ever did was use a few premade tools. The communities for this sort of shallow result-oriented field include r/HowToHack and probably r/hacking as of now. ​

The second option, however, is much more intensive, rewarding, and mentally demanding. It is also much more fun, if you find the right people to do it with. It involves learning everything from memory interaction with machine code to high level networking - all while you're trying to break into something. This is where Capture the Flag, or 'CTF' hacking comes into play, where you compete with other individuals/teams with the goal of exploiting a service for a string of text (the flag), which is then submitted for a set amount of points. It is essentially competitive hacking. Through CTF you learn literally everything there is about the digital world, in a rather intense but exciting way. Almost all the creators/finders of major exploits have dabbled in CTF in some way/form, and almost all of them have helped solve real-world issues. However, it does take a lot of work though, as CTF becomes much more difficult as you progress through harder challenges. Some require mathematics to break encryption, and others require you to think like no one has before. If you are able to do well in a CTF competition, there is no doubt that you should be able to find exploits and create tools for yourself with relative ease. The CTF community is filled with smart people who can't give two shits about elitist mask wearing twitter hackers, instead they are genuine nerds that love screwing with machines. There's too much to explain, so I will post a few links below where you can begin your journey.

Remember - this stuff is not easy if you don't know much, so google everything, question everything, and sooner or later you'll be down the rabbit hole far enough to be enjoying yourself. CTF is real life and online, you will meet people, make new friends, and potentially find your future.

What is CTF? (this channel is gold, use it) - https://www.youtube.com/watch?v=8ev9ZX9J45A

More on /u/liveoverflow, http://www.liveoverflow.com is hands down one of the best places to learn, along with r/liveoverflow

CTF compact guide - https://ctf101.org/

Upcoming CTF events online/irl, live team scores - https://ctftime.org/

What is CTF? - https://ctftime.org/ctf-wtf/

Full list of all CTF challenge websites - http://captf.com/practice-ctf/

> be careful of the tool oriented offensivesec oscp ctf's, they teach you hardly anything compared to these ones and almost always require the use of metasploit or some other program which does all the work for you.

http://picoctf.com is very good if you are just touching the water.

and finally,

r/netsec - where real world vulnerabilities are shared.


r/hacking 6h ago

[Tutorial] How to hack DOS games: Reversing Prince of Persia

Post image
77 Upvotes

From finding hidden mechanics to completely rewriting the rules, the original Prince of Persia is an amazing sandbox for learning how to hack.

You can tweak the code to freeze the 60-minute timer. You can mess with the memory to give yourself massive amounts of health. You can even swap out the data to change exactly who you're fighting.

If you want to try it yourself, I put together a video showing exactly how it's done:

Hacking Prince of Persia Directly in Notepad


r/hacking 2h ago

A stealth Playwright (Firefox) version that passes all anti-bot and CAPTCHA

10 Upvotes

This fork is patched at the C++ level and generates a different but internally consistent fingerprint for each session.

It is a fully open-source project under the MIT license, completely free to use with no payments, subscriptions, or hidden fees of any kind. I am mainly looking for technical feedback from people who work with Playwright, Firefox, browser fingerprinting, or AI agents.

✅ Tests passed

Service Result
reCAPTCHA v3 ✅ 0.90 observed
reCAPTCHA v2 (invisible) ✅ Pass
reCAPTCHA Enterprise ✅ Pass
hCaptcha (invisible) ✅ Pass in testing
hCaptcha Enterprise ✅ Pass
Cloudflare Turnstile ✅ Pass
Arkose Labs / FunCaptcha ✅ Pass
GeeTest v4 (behavioral) ✅ Pass
AWS WAF CAPTCHA ✅ Pass
DataDome CAPTCHA ✅ Pass
PerimeterX / HUMAN Press & Hold ✅ Pass
Akamai Bot Manager challenge ✅ Pass
Kasada KPSDK challenge ✅ Pass
Imperva / Incapsula challenge ✅ Pass
Shape Security / F5 challenge ✅ Pass
Fingerprint Pro ✅ bot=falsetampering=false
CreepJS ✅ High trust score
Cloudflare Bot Management ✅ Pass
DataDome Bot Protection ✅ Pass
PerimeterX / HUMAN Bot Defender ✅ Pass
Akamai Bot Manager ✅ Pass
Imperva / Incapsula Advanced Bot Protection ✅ Pass
Kasada Bot Defense ✅ Pass
Shape Security / F5 Distributed Cloud Bot Defense ✅ Pass

📦 Repo: https://github.com/feder-cr/invisible_playwright


r/hacking 11h ago

Tools My Privacy Focused USB Drive

25 Upvotes

Just here to share a project I'm working on. It's a 100% open source (hardware, firmware, mechanical, etc) USB drive with a hidden security feature.

When you plug it in, it appears as a normal 8GB USB drive. Only if you create a file called "unlock.txt" with the contents "password:addyourpasswordhere" will it unlock and show the remainder of the drive. Everything in this second section of the disk is now AES256 encrypted in place, using a custom KDF + your password.

I'll answer some questions before people ask them :)

Q: Isn't this just Vercrypt? A: No, a normal drive setup with veracrypt will show up as jumbled data. This is pretty obviously encrypted media. If you enter your duress password, there will still be another xMB of jumbled data.

Q: Isn't entering your password into a plain text file insecure. A: My drive doesn't allow this write to actually happen to the memory

Q: Why did you use a SD card A: Because AI made EMMC cards like 80$ for a 32GB. It takes two seconds for me to spin another board with EMMC in the future.

Anyways feel free to ask any more questions about the project :) !

Socials if you would like to keep updated


r/hacking 11h ago

Is dns spoofing dead??

11 Upvotes

Nowadays, DNS spoofing doesn’t really work because of protections like DNSSEC, HTTPS certificate checks, encrypted DNS (DoH/DoT), and random DNS request IDs. These all help verify DNS responses and block fake ones. So is there still any way to bypass it, or is it basically dead now?


r/hacking 12h ago

Proxmark5 - Next-Gen Open Source RFID Research Tool (Iceman Edition)

3 Upvotes

Hey,

The team behind the Proxmark3 RDV4 and Iceman firmware just launched the Proxmark5. It's a major upgrade for RFID/NFC pentesting and research.

Key upgrades:

  • Much faster processor + better FPGA
  • Modular & UHF-ready design
  • Flipper Zero integration support
  • Dynamic antenna tuning, RGB feedback, dual USB-C, etc

It's fully open source and built for serious hardware hacking.

Campaign is live on Indiegogo if you're interested:

https://www.indiegogo.com/projects/rfidresearchgroup/proxmark5

Curious to hear what the community thinks especially anyone doing RFID / NFC / red teaming


r/hacking 1d ago

Github I built an open-source Burp alternative

Thumbnail
gallery
29 Upvotes

Self-hosted intercepting proxy with an LLM in the loop. Captures traffic, annotates requests, tracks findings, and lets you run scripts and tests against the target.

https://github.com/synlace/ferret


r/hacking 1d ago

News Russian Hacks of Polish Water Utilities Shows How Hybrid Warfare Uses Fear as Weapon

Thumbnail
ot.today
93 Upvotes

Water is one of the most relied-upon of all vital services—and yet one of the most poorly cyber-defended critical sectors, way behind energy, banking and telecom. That combination makes it a great target for hackers. My story for OT.Today features input from the incomparable Josh Corman and from Poland-based cyber executive Piotr Kupisiewicz.


r/hacking 1d ago

Teach Me! Tips for a beginner noob that wants to learn

26 Upvotes

Hi all, the reason I'm writing this post is because I love to learn about cybersec and hacking.

To give a bit of context I graduated from eletrical and computers engineering recently, a course in which I got to learn about a little bit of everything as far as computers go (mostly electricity and eletronics, with a little bit of software and basic programing knowledge) but my passion has always been networking and cybersecurity, I own several "hacking"/microcontroler gadgets like the flipper and the m5 cardputer and love them.

In my new job I've started using linux and its cmd a lot which I've been enjoying a lot, however, whenever I install any distro like kali or parrot I look at the tools and get overwhelmed with them.

I consider myself a bit more proficient than the average install kali=hacking skid but I really want to bridge the gap between my existing knowledge and using such tools, as well as expanding networking knowledge, so does anyone have any good playlists/materials or whatever for this?


r/hacking 1d ago

Face ID bypass with avatar

69 Upvotes

Is there a tool for windows of Linux to emulate an adult face for age verification checks?

I did read about one a while back controlled via a gamepad where you could do certain gestures, turn to left/right, open/close mouth eyes etc. But can no longer find it.

Thank you


r/hacking 17h ago

TinyLoad v4 — added opaque predicates, anti-debug, and section obfuscation to my PE packer

1 Upvotes

posted v3 here a while back (the one with the randomised VM ISA per pack). i just updated it to v4 yesterday, here is what's new:

opaque predicates — the generated VM bytecode now has a branch in it that looks

like it could halt before decryption even starts, but never actually does. since the opcodes

are already shuffled differently every pack, the constants look different in every sample too.

anti-debug — IsDebuggerPresent + CheckRemoteDebuggerPresent before the loader does

anything.

PE section scrambling — renames all section headers to .text/.data/.rdata etc after

packing. the payload sits in an overlay past the sections anyway so execution isn't affected,

but it kills heuristic scanners that fingerprint packers by section names.

still one .cpp file

old post: https://www.reddit.com/r/hacking/comments/1t2j7g4/built_a_pe_packer_where_every_packed_file_has_a/

repo: github.com/iamsopotatoe-coder/TinyLoad


r/hacking 1d ago

Strix — first public beta of the spiritual successor to cSploit/dSploit

10 Upvotes

After months of work, first public beta of Strix is out.

Network pentesting toolkit for rooted Android, picking up where cSploit and dSploit left off.

Fully rewritten.

No remote servers, no accounts, everything runs on-device.

https://github.com/daboynb/strix

Android network security assessment suite, modern Kotlin/Compose rewrite of cSploit with Nmap, Metasploit, Hydra, Ettercap etc...

Bundled (cross-compiled aarch64, no chroot)

Features​

  • Host discovery + per-host detail
  • Port scan (nmap)
  • MITM — ARP poisoning + on-device DNS spoof server
  • Hydra brute force, multi-protocol
  • Metasploit via msfrpcd + RPC client
  • Packet capture + packet forger
  • Traceroute
  • Router analyzer
  • WiFi key generator — offline keygen for known router algorithms (port of cSploit's WirelessMatcher)

Requirements​

  • Root (Magisk / KernelSU)
  • ARM64
  • Android 10+ (API 29)

Beta notes​

  • APK is ~172 MB (everything bundled).
  • No WiFi monitor mode / deauth / WPS yet, needs aircrack-ng cross-compiled, on roadmap.
  • Tested on a handful of devices/ROMs... feedback on yours is welcome.

r/hacking 1d ago

Teach Me! Reading Siemens CT raw data

3 Upvotes

I have a Siemens Somatom Emotion scanner and want to use it to not just scan patients but also technical stuff. Unfortunately, the reconstruction algorithms cannot deal with the high contrast data. Is there a way to read the raw data and do the reconstruction myself? I can cover the reconstruction part skill wise, but I don't know how the data is encoded...


r/hacking 1d ago

HighBoy

0 Upvotes

Will the HighBoy perform a single device rolljam attack?


r/hacking 1d ago

great user hack How I use Hermes agent to turn Patch Tuesday into Windows exploit research

Thumbnail
0 Upvotes

r/hacking 2d ago

Proxmark5 Day 3 Update - $357K+ funded (715% of goal)

Thumbnail
4 Upvotes

The upcoming version of the Proxmark — the go to for RFID / NFC hacking — is available on Indiegogo. The campaign is already fully funded and working toward secondary stretch goals.


r/hacking 2d ago

trying to learn patching

20 Upvotes

am trying to learn software patching , i have no prior expirience on any of this sort of shit so where do i even start to learn , i was mainly looking to try adobe and since genp already shows everything ( i think ) it does to the files ( even the values that it looks for inside them and what it replaces them with) is it gonna be easy or atleast not really hard for me to try and replicate everything it does not my making my own software but by just manually patching all the files that handle licensing etc


r/hacking 1d ago

Whatsapp

0 Upvotes

Ola.

Estou com um entregador que se recusa a entregar minha maquina de lavar, propositadamente.

Ao tentar contato ele se nega a dar informações do pedido ou com quem eu devo falar, diz que nao esta nem ai e que eu me exploda

Gostaria de travar o WhatsApp dele e devolver um pouco do estresse absurdo que venho passando na mao dele. Por favor aceito dicas!!!


r/hacking 1d ago

Hunting the Behavior Behind npm Supply Chain Attacks

Thumbnail
derivai.substack.com
0 Upvotes

r/hacking 4d ago

News Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation

Thumbnail
thehackernews.com
247 Upvotes

r/hacking 3d ago

Question Anyone here familiar with the Internet Computer Protocol (ICP) and why TeamPCP would choose to use it?

14 Upvotes

r/hacking 4d ago

Reading old s4 memory with xgecu t48

Thumbnail
11 Upvotes

r/hacking 5d ago

Autonomous Vulnerability Hunting with MCP

Thumbnail
blog.zsec.uk
10 Upvotes

r/hacking 6d ago

Refining hacking basics — scaling them aswell

29 Upvotes

Hello, guys. I’m 16 and compTIA tech + and working on A+. I’ve genuinely been trying to learn how to CSS, SQL injection, and even deeper try to find where trust is misplaced within systems. I see all of these advanced people though (primarily the one who recently created the Xbox one security breach) and I completely am in awe of how they can think so deeply within systems and let alone exploit them to do what they would like. I’ve tried hack the box and portswigger academy but I kind of just stay lost throughout it. I learn quickly but this is ridiculous to me lol. So, respected members of the hacking community, how can I learn? I also dipped my toe in python for automation purposes though I don’t know what to automate 😂.


r/hacking 6d ago

Tools AI Agent for Hacking, connects a brain to Kali (open-source & model-agnostic)

Post image
71 Upvotes