These are basic techniques but very useful when penetration testing any Windows based network, the techniques were discovered on WinNT but are still very valid on Windows2000 and in some cases Windows2003 due to backwards compatibility. This article is being written in a procedural manner. I have approached it much like an intruder would actually […]
Hacker Culture
How to get Ops and takeover a channel on IRC Hack Hacking
I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they […]
Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies
Introduction This tutorial is an attempt to help you re-route all internet winsock applications in ms windows trough a socks chain, thus making your connections much more anonymous. Theory The more different hops you make your data jump, the more difficult it will be to trace it back. take this route for example: you –> […]