[ Hacker Night School ] :: Excellent, well-written hacking lessons: HackingTutorials.org

This entry is part 2 of 32 in the series [ Hacker Night School ]

It might seem funny for School for Hackers to like or endorse another hacking tutorial site, but the truth is that sites like Hacking Tutorials are terrific resources for all of us. This really excellent site features detailed, well-written step-by-step tutorials on up-to-the-minute vulnerabilities and exploits: The Top 10 Wifi Hacking Tools in Kali Linux …

Finding and Using Browser-saved Passwords: Another video from Starry Sky

This entry is part 3 of 32 in the series [ Hacker Night School ]

Yeah, we all do it, right? We let our browser store our passwords for all those sites we visit every day. It’s easy, it’s convenient, and it’s really easy to hack. Starry shows us how to reveal these passwords, swipe them and use them in another browser. Plus: he demos what you can do about …

[ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]

This entry is part 5 of 32 in the series [ Hacker Night School ]

Starry Sky and Glenn Norman discuss using a VPN or proxy server Now take the Quiz: 1. What of these statements is the most accurate description of a proxy. a. Hides your IP address b. Makes it look like you’re coming from a different IP address c. Makes your web traffic (ports 80 and 443) …

[ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]

Glenn Norman
This entry is part 6 of 32 in the series [ Hacker Night School ]

One of the trickiest things about hacking is knowing what kind of anonymity tool to use, when. If what you are doing involves only the Internet (i.e. web pages and web sites), the right anonymity tool is a proxy server. “Proxy” means “stand-in” or “intermediary” (look it up; research is your specialty, right?), and a …

[ Hacker Night School ] Being Anonymous: VPNs

Glenn Norman
This entry is part 7 of 32 in the series [ Hacker Night School ]

Sometimes you can go about your business out in the open, on the Internet and everywhere. But sometimes you don’t want to be seen. It’s a good thing there are lots of privacy apps and options. It’s a bad thing that most people don’t know when – and why – to use a particular tool. …

[ Hacker Night School ] :: TOR Browser Search Engines

This entry is part 8 of 32 in the series [ Hacker Night School ]

Tor search engines Disconnect.me Torch http://xmh57jrzrnw6insl.onion/ Ahmia http://Ahmia.fi AlphaBay http://pwoah7foa6au2pul.onion/ Candle http://gjobqjj7wyczbqie.onion/ Not Evil https://hss3uro2hsxfogfq.onion.to/ The Hidden Wiki http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page Grams http://grams7enufi7jmdl.onion/helix/light Helix http://grams7enufi7jmdl.onion/ StartPage https://startpage.com Duckduckgo.com!

[ Bug Bounty ] :: Hack Facebook for Fun and Profit!

Security Padlock
This entry is part 9 of 32 in the series [ Hacker Night School ]

Ashley King writes about an experience with bug bounty: “Whilst working on the Facebook Bug Bounty Program in June 2018 we had identified an issue with the webview component used in the Facebook for Android application. The vulnerability would allow an attacker to execute arbitrary javascript within the Android application by just clicking a single …