PENTESTING IN 2021 (TIPS, TOOLS, USEFUL LINKS

Carder

Professional
Messages
2,635
Reaction score
2,055
Points
113
Pentesting = Basically Cracking

I'm cracking for a while, now I want to share with you how to check Accounts properly Included Screenshot, Tools and Useful Links to start Checking Today !
You gonna learn the basic of checking and how you can profit from it. Hope you enjoy my work

Table of contents:
What is Cracking?
Openbullet
Combo, Proxy, Config, RDP
Start Cracking
Make Profit
Conclusion

What is Cracking?
Basically said you download an account list use a software (checker) that tries to
log into the account with your ip or proxy and if its correct it shows as a hit.

Openbullet
Openbullet is one of the most popular program used for Cracking accounts nowday, very stable and up to date.
Its included many feature with GUI interface, easy to use.

Download Links:
- OB Standard (supported only .loli config): https://github.com/openbullet/openbullet/releases
- OB Anomaly version (ability to use .anom Config): https://github.com/PurityWasHere/Anomaly-Mod-Hosting
PS: run Anomaly Updater.exe to download the latest OB Anomaly
- OB v1.2.0 (ability to use encryped config .lolix):

Combo, Proxy, Config, RDP

Combo
Combo/ComboList: A list of Username:password or Email:password, mostly saved on a text file.
Where I can get combo?
- Using SQL injection methods.
- Paying for private combo or Editing service.
You can find a bunch of tool to edit your combo :https://cracked.to/Forum-Pentesting-Tools (run it on VM or Sandboxies)

Proxy
For cracking, its a list of IP:port / IP:port:User:pass, mostly saved on a text file.
There are three different main types of proxies: HTTP / SOCKS4 / SOCKS5
Proxies are important because without them you will be limited on how many attempts you can make while cracking accountss.
Where I can get proxy?
- FREE: https://proxyscrape.com/free-proxy-list (Socks4 are recommended)
- Paid: Fineproxy.org, proxiware.com, smartproxy.com
How to choose the best proxy? It depends on your budget and the targeted site.

Config
Simply explained, what you use to crack a specific site, for example if I want netflix accounts I use a netflix config.
Explain some words used for config:
- Proxyless: without proxy
- Capture: capture information about the account like type of the sub / date of expiration / amount of points
- Captchaless: a config that bypass captcha using a private API.

RDP
(Remote Desktop Protocol) RDP is a network communications protocol developed by Microsoft, which allows users to remotely connect to another computer.
It very important to use RDP when cracking for the speed.
You can still use your PC for cracking, but its better to buy one for cheap like only 5$

Start Cracking
If you use your PC, turn on the VPN.
First, save all your config on "Config" folder.
Run openbullet, and click on rescan to load your configs

Conclusion
Cracking still a profitable business that need time and work, dont expect high result at the first time but after gain reputation and customer u gonna make good cash easly in.

? Sites for Begginers to Learn Cyber Hacking and Security with links ?

#mostrequested

EnigmaGroup

Exploit Exercises

Google Gruyere

Gh0st Lab

Hack This Site

HackThis

HackQuest

Hack.me

Hacking-Lab

Hacker Challenge

Hacker Test

hACME Game

Hax.Tor

OverTheWire

pwn0

RootContest

Root Me

Security Treasure Hunt

Smash The Stack

TheBlackSheep and Erik

ThisIsLegal

Try2Hack

WabLab

XSS: Can You XSS This?

XSS: ProgPHP

DigitalCorpora

Digital Forensics Tool Testing Images

DFRWS 2014 Forensics Rodeo

Linux LEO Supplemental Files

volatility memory samples

ISFCE Sample Practical Exercise

ForGe Forensic test image generator

Network Forensics

Wireshark Sample Captures

Wireshark Network Analysis Book Supplements

pcapr

PacketLife Capture Collection

DigitalCorpora Packet Dumps

Evil Fingers PCAP Challenges

PCAPS Repository

Chris Sanders Packet Captures

Tcpreplay Sample Captures

Enron Email Dataset

MAWI Working Group Traffic Archive

LBNL-FTP-PKT

Malware Analysis

Open Malware / Offensive Computing

Contagio

VX Heaven

VirusShare.com / VXShare

VXVault

MalShare

Virusign

theZoo / Malware DB

malc0de

FakeAVs blog

malware_traffic

Georgia Tech malrec page

Kernelmode Forum

Malware Hub Forum

MalwareBlacklist.com

Joxean Koret’s List

Sucuri Research Labs

CLEAN MX realtime database

Contagio Mobile Malware

Android Sandbox

maltrieve

HoneyDrive

Online and CTFs
Honeynet Challenges

I Smell Packets

Network Forensics Puzzle contest

DEF CON CTF Archive

DFRWS
 
? Network Pentesting
- Wireshark Essentilals : https://github.com/cyberh3x/books/blob/master/9781783554638-WIRESHARK_ESSENTIALS.pdf
- Mastering Wireshark : https://github.com/cyberh3x/books/blob/master/9781783989522-MASTERING_WIRESHARK.pdf

? Defensive Security
- Holistic Info-Sec for Web Developers - Fascicle 0 : https://f0.holisticinfosecforwebdevelopers.com/
- Holistic Info-Sec for Web Developers - Fascicle 1 : https://f1.holisticinfosecforwebdevelopers.com/
- OWASP Hacking Tutorials and Web App Protection : https://www.owasp.org/images/d/d0/Web_Services_Hacking_and_Hardening.pdf
- Threat Modeling - Designing for Security : https://news.asis.io/sites/default/files/Threat Modeling.pdf

? Offensive Security
- Backtrack
- Hack your Friend using Backtrack : http://hackerspace.cs.rutgers.edu/library/bt5tutorials/HackYourFriend.pdf
- Kali Linux
- Kali Linux Revealed Book : https://kali.training/
- Windows Pentesting with Kali Linux v2 : https://github.com/cyberh3x/books/b...-KALI_LINUX_2_WINDOWS_PENETRATION_TESTING.pdf
- Hacking
- Advanced SQL Injection Hacking and Guide : https://defcon.org/images/defcon-17...defcon-17-joseph_mccray-adv_sql_injection.pdf
- A Beginners Guide To Hacking Computer Systems : http://www.mediafire.com/download/dyewn6f3r3olnuw/A+Beginners+Guide+To+Hacking+Computer+Systems.zip
- Blind SQL Injection Discovery & Exploitation : http://blueinfy.com/wp/blindsql.pdf
- CEH – Hacking Database Secrets and Exploit : http://repo.thehackademy.net/depot_cehv6/
- Ethical Hacking Complete E-book for Beginners : http://pdf.textfiles.com/security/palmer.pdf
- Hackers High School 13 Complete Hacking Ebooks : http://www.mediafire.com/download/u...s+High+School+13+Complete+Hacking+E-books.rar
- Hacking attacks and Examples Test : http://www.mediafire.com/download/dpysbzboord42lo/Hacking+attacks+and+Examples+Test.zip
- Hacking into Computer Systems : http://www.academia.edu/1153769/Hacking_into_computer_systems_-_a_beginners_guide
- Hackers' Secrets : http://www.onlinepot.org/security/HackersSecrets.pdf
- Operating Systems
- Windows
- Modern Windows Exploit Development : https://userscloud.com/9ifscj08wllu
- Web & WebApp
- 501 Website Hacking Secrets : http://www.mediafire.com/download/da8nhq8oh5iddae/501+Website+Hacking+Secrets.zip
- Cross Site Scripting and Hacking Websites : http://www.objectif-securite.ch/research/xss_security_days.pdf
- Dangerous Google Hacking Database and Attacks : http://www.mediafire.com/download/s3535s2yg1w26u7/Dangerours+Google+Hacking+Database+and+Attacks.zip
- Hack any Website, Complete Web App Hacking : https://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Gentil/dc-11-gentil.pdf
- Hacking Website Database and owning systems : http://www.blackhat.com/presentations/bh-europe-07/Cerrudo/Whitepaper/bh-eu-07-cerrudo-WP-up.pdf
- Internet Advanced Denial of Service DDOS Attack : http://www.mediafire.com/download/b...+Advanced+Denial+of+Service+(DDOS)+Attack.zip
- Internet Security Technology and Hacking : http://www.mediafire.com/download/7tk860o8n777iqa/Internet+Security+Technology+and+Hacking.zip
- The Web Application Hacker's Handbook : https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf
- Vulnerability Exploit & website Hacking for Dummies : http://www.mediafire.com/download/j...xploitation+&+website+Hacking+for+Dummies.rar
- Web App Hacking Hackers Handbook : http://www.mediafire.com/download/c7b18vtpc77sysi/Web+App+Hacking+(Hackers+Handbook).zip
- XSS, Vulnerability Exploitation & Website Hacking : http://www.cis.syr.edu/~wedu/seed/Labs/Attacks_XSS/XSS.pdf

Reverse Engineering
- Reverse Engineering Hacking and Cracking : https://media.blackhat.com/bh-dc-11/Grand/BlackHat_DC_2011_Grand-Workshop.pdf
- Reverse Engineering for Beginners : http://www.t-gr.com/fotis/books/re.pdf

? Virus Botnet and Malware
- Black Book of Viruses and Hacking : http://www.mediafire.com/download/c8ilcobmyiqooyp/Black+Book+of+Viruses+and+Hacking.zip
- Computer Hacking & Malware Attacks for Dummies : http://www.mediafire.com/download/8...,+Hacking+and+Malware+attacks+for+Dummies.zip

?‍♂️ Misc
- Computer Hacking - Cyber Laws Harvard : https://cyber.harvard.edu/sites/cyber.law.harvard.edu/files/ComputerHacking.pdf
- Ethical Hacking Value and Penetration testing : https://www.certconf.org/presentations/2003/Wed/WM4.pdf
- Secrets of Super and Professional Hackers : http://www.mediafire.com/download/2sspb36u5gymd23/Secrets+of+Super+and+Professional+Hackers.zip
- Hackers High School 13Complete Hacking E-books : http://www.mediafire.com/download/u...s+High+School+13+Complete+Hacking+E-books.rar
- Network Hacking and Shadows Hacking Attacks : http://www.mediafire.com/download/utp50jqd25ngw3q/Network_Hacking_and_Shadows_Hacking_Attacks.zip

TUTORIAL : Pluralsight Getting Started with Reverse Engineering
 
Top