- Private: How to Join the Infosec Community
- [ Hacker Night School ] :: Excellent, well-written hacking lessons: HackingTutorials.org
- Finding and Using Browser-saved Passwords: Another video from Starry Sky
- Private: Hacking for a digital marketer
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]
- [ Hacker Night School ] Being Anonymous: VPNs
- [ Hacker Night School ] :: TOR Browser Search Engines
- [ Bug Bounty ] :: Hack Facebook for Fun and Profit!
- [ Hacker Night School ] :: Learn Python in 43 Minutes (if you’re a really fast learner)
- [ Hacker Night School ] :: Hacking Practice: the Command Injection ISO
- [ Hacker Night School ] :: Got a foothold on a Windows target? Now enable Remote Desktop.
- [ Hacker Night School ] :: [ Using Git ]
- [ Hacker Night School ] :: Tsuki CTF Pwns Access on HackTheBox
- [ Hacker Night School ] :: Exploiting sudo: Altering your PATH
- [ Hacker Night School ] :: WEP Cracking Basics in Kali
- [ Hacker Night School ] :: CSRF
Sometimes you can go about your business out in the open, on the Internet and everywhere. But sometimes you don’t want to be seen. It’s a good thing there are lots of privacy apps and options. It’s a bad thing that most people don’t know when – and why – to use a particular tool.
VPNs are a great example. Your source traffic “submerges” and only re-emerges at the VPN endpoint, so your traffic looks like it’s coming from that endpoint, not from you. This can be anywhere from nice to life-saving, depending on your circumstances.
When would you use a VPN? When you want ALL of your traffic to pass through that VPN. Remember, if you’re running scans and testing remote systems, that traffic is (mostly) not HTTP, it’s various manipulations of IP and nearby protocols. Hiding your browser traffic, like a proxy will, doesn’t hide scanning traffic, or chat or video or torrenting or any number of things. (That’s why you don’t torrent or watch video in Torbrowser.)
Here’s a nice little piece about VPNs, with some intelligent questions in the comments below. It’s required reading for this course.