Main public logs

Jump to navigation Jump to search

Combined display of all available logs of HackOps. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).

Logs
  • 05:37, 15 June 2025 Vegard talk contribs created page Password Attacks (Created page with "== Password Attacks == Password attacks target authentication systems by attempting to gain access using valid or guessed credentials. These techniques play a central role in assessing the strength of user access controls, exposing weak password hygiene, misconfigurations, or lack of rate-limiting. Password-based authentication remains the most common form of access control, making it a recurring target for security assessments and enumeration strategies. === Goals ==...")
  • 14:13, 14 June 2025 Vegard talk contribs created page Making HTTP Requests (Created page with "= Making HTTP Requests = == Introduction == HTTP requests are used to interact with web servers by requesting data, submitting forms, uploading files, or modifying resources. Understanding how each method works enables deeper interaction with web applications and can expose misconfigurations or unintended functionality. This page outlines how common HTTP methods are used in practice, with real-world examples suitable for exploration and testing. == GET == The GET me...")
  • 07:34, 14 June 2025 Vegard talk contribs created page HTTP Protocols (Created page with "= HTTP Protocols = == Introduction == The Hypertext Transfer Protocol (HTTP) is the application-layer protocol used for communication between clients and servers on the web. It enables retrieval of resources such as HTML, JSON, or binary content by defining a standardized format for request and response messages. HTTP is stateless, meaning each request is independent unless explicitly managed using sessions, cookies, or tokens. == HTTP vs HTTPS == {| class="wikitabl...")
  • 06:01, 14 June 2025 Anonymous Privacy policy created page DNS Resolution (Created page with "= DNS Resolution and record types (A Record, CNAME, MX, TXT) = == What is DNS? == DNS (Domain Name System) is the protocol responsible for resolving human-readable domain names (e.g., `example.com`) into machine-readable IP addresses (e.g., `93.184.216.34`). DNS acts as the naming infrastructure of the internet. == DNS Lookup Flow == The process of DNS resolution involves multiple steps from your device to authoritative servers. The system is designed hierarchically...")
  • 14:32, 13 June 2025 Vegard talk contribs created page Stateless vs Stateful Firewalls (Created page with "= Stateless vs Stateful Firewalls = ; Introduction : Firewalls control how traffic enters or leaves a network. : They inspect packets and decide to allow or block them based on rules. : There are two core types of firewalls — '''stateless''' and '''stateful'''. : Knowing the difference is key to understanding how filtering works in both simple and complex environments. == Visual Summary == {| class="wikitable" ! Firewall Type !! Tracks Sessions? !! Decision...")
  • 13:41, 13 June 2025 Vegard talk contribs created page UDP Protocol (Created page with "= UDP Protocols = ; Purpose : UDP (User Datagram Protocol) is one of the two main transport protocols in the TCP/IP suite, alongside TCP. : It provides a simple, fast way to send data over networks without establishing a connection or tracking session state. : Understanding how UDP behaves helps identify when it is used, how it differs from TCP, and what it means when analyzing or generating traffic. == 1. Key Characteristics of UDP == UDP is a connectionless an...")
  • 13:21, 13 June 2025 Vegard talk contribs created page TCP/IP Stack (Created page with "= TCP/IP Stack — For Learners Who Want Full Network Understanding = ; Purpose : The TCP/IP stack shows how data travels through a network, from a software application to the physical wire or Wi-Fi signal. : Understanding this structure is key to reading, analyzing, and shaping network traffic with intention. == 1. The Four TCP/IP Layers == Each layer plays a specific role. Together, they handle everything from human-readable data to raw electrical signals. {| cl...")
  • 11:21, 13 June 2025 User account NATREGTEGH2795786NEYHRTGE talk contribs was created
  • 17:32, 7 June 2025 Anonymous Privacy policy created page OSI Model (Created page with "= OSI Model = The OSI model explains how data travels through a network. It splits this process into **seven layers**. Each layer has its own job — from moving raw bits to showing a website. Understanding the OSI model helps break down complex systems, and shows where tools, attacks, or failures happen. == OSI Layer Overview == The OSI model goes from Layer 1 (bottom) to Layer 7 (top). Each layer works with the ones above and below it. {| class="wikitable" ! Layer...")
  • 15:32, 7 June 2025 Anonymous Privacy policy created page Subnetting (Created page with "= Subnetting = Subnetting divides an IP network into smaller logical sections called subnets. This structuring improves efficiency, isolates traffic, and defines boundaries between systems and functions. A deep understanding of subnetting reveals how internal environments are organized, and how access and visibility are controlled across segments. == What Subnetting Enables == Subnetting assigns defined IP ranges to roles, departments, or zones. It introduces: * Pre...")
  • 12:04, 7 June 2025 Vegard talk contribs created page Ping (Created page with "= Ping = '''Ping''' is a fundamental network utility used to test the reachability and responsiveness of a target device on a network. == What Ping Does == Ping sends a type of packet called an '''ICMP Echo Request''' to a specified IP address or hostname. If the target is online and reachable, it replies with an '''ICMP Echo Reply'''. This process measures both '''connectivity''' and '''latency''' between source and destination. == ICMP Protocol == Ping operates us...")
  • 11:55, 7 June 2025 Vegard talk contribs created page MAC Addressing (Created page with "= MAC Addressing = Every device on a network has a built-in network interface, and that interface is assigned a unique identifier called a '''MAC address''' (Media Access Control address). == What is a MAC Address? == A MAC address is a 48-bit identifier burned into the device’s network interface card (NIC) by the manufacturer. It's written as 12 hexadecimal digits, grouped in pairs, separated by colons. '''Example:''' <pre> a4:c3:f0:85:ac:2d </pre> === Breakdown...")
  • 11:47, 7 June 2025 Vegard talk contribs created page IP Addressing (Created page with "= IP Addressing = IP (Internet Protocol) addresses are numerical labels used to identify devices on a network. Without them, no device would know where to send or receive data. == What is an IP Address? == An IP address is a unique identifier for a device on a network. It works like a digital address so data knows where to go. === IPv4 Format === Most commonly, IP addresses appear in IPv4 format: four numbers (0–255) separated by dots. Example: * `192.168.1.10`...")
  • 18:35, 4 June 2025 Vegard talk contribs blocked Anonymous Privacy policy with an expiration time of 1 year (anonymous users only, account creation disabled) (Spam)
  • 22:37, 30 May 2025 Vegard talk contribs created page Maintaining Access (Created page with "== Maintaining Access == Once initial access is achieved, attackers often need to maintain persistent access to the compromised system without detection. This phase involves deploying tools and methods that ensure continued control while evading monitoring systems and incident response. Maintaining access is typically reserved for advanced engagements such as red teaming or adversary simulation, and focuses on stealth, resilience, and persistence. These techniques corr...")
  • 00:25, 30 May 2025 Vegard talk contribs created page Privilege Escalation (Created page with "= Privilege Escalation = Privilege escalation is the process of gaining higher-level permissions or access within a system after an initial foothold has been established. It plays a critical role in post-exploitation, allowing an attacker to move from a limited user account to administrative or root-level access — often enabling lateral movement, persistence, or full system compromise. Privilege escalation is typically divided into two categories: *vertical escalat...")
  • 23:32, 29 May 2025 Vegard talk contribs created page Dig (Created page with "= dig = '''dig''' (Domain Information Groper) is a powerful command-line DNS lookup tool used to query DNS name servers and retrieve resource records. It is commonly used in reconnaissance to resolve hostnames, enumerate DNS records, test custom name servers, and analyze DNS responses in detail. == <span id="options"></span>Common Options == === Basic Queries === {| class="wikitable" ! Option !! Description |- | <code>A</code> || Query IPv4 address record...")
  • 01:52, 29 May 2025 Vegard talk contribs created page Networking Concepts (Created page with "== Networking Concepts == Networking is the backbone of all digital communication. Understanding how systems connect, route data, and expose services is foundational for both attackers and defenders. === Core Concepts === * OSI Model and TCP/IP Stack * IP Addressing (IPv4 vs IPv6), CIDR Notation, Subnets * MAC Addressing and ARP Protocol * DNS Resolution and record types (A Record, CNAME, MX, TXT) * NAT, PAT, and...")
  • 00:26, 28 May 2025 Vegard talk contribs created page Operational Security (OPSEC) (Created page with "= Operational Security (OPSEC) = '''Operational Security (OPSEC)''' is the discipline of hiding intentions, infrastructure, and activity to avoid detection and attribution during an engagement. Good OPSEC keeps the operator, the tools, and the objective invisible until the mission is complete. == <span id="why-it-matters"></span>Why OPSEC Matters == * '''Stealth drives effectiveness:''' Undetected operators keep access longer and gather cleaner intelligence. * ''...")
  • 03:27, 27 May 2025 Vegard talk contribs created page Basic Windows Commands (Created page with "= Basic Windows Commands = '''Windows command-line tools''' are critical for navigating, enumerating, and gaining persistence on Windows-based systems. Most global infrastructure still runs on Windows. During real-world engagements or red teaming, a hacker will inevitably encounter a compromised Windows host — and must know how to operate within it. Understanding native Windows commands provides direct access to system behavior, user activity, networking, and privile...")
  • 17:14, 26 May 2025 Vegard talk contribs created page Ffuf (Created page with "= FFUF = '''FFUF''' (Fuzz Faster U Fool) is a fast and flexible web fuzzer used for discovering hidden files, directories, subdomains, GET and POST parameters, and more. It is widely used in web application testing, especially during active reconnaissance and content discovery phases. == <span id="options"></span>Common Options == === Target & Wordlist === {| class="wikitable" ! Option !! Description |- | -u [URL] || Target URL with the keyword FUZZ wher...")
  • 17:53, 24 May 2025 Vegard talk contribs created page Standards & References (Created page with "== Standards & References == This section provides foundational frameworks, official documentation, and widely recognized references in cybersecurity. These resources define best practices, guide security assessments, and offer authoritative structures for both offensive and defensive methodologies. === Security Frameworks === [https://attack.mitre.org MITRE ATT&CK] – A curated knowledge base of adversary tactics and techniques based on real-world observations....")
  • 04:47, 18 May 2025 Vegard talk contribs created page Dnsmap (Created page with "= dnsmap = '''dnsmap''' is an open-source C utility that performs fast **brute-force subdomain enumeration**. It resolves each candidate name against a chosen DNS resolver, stores live hosts, and outputs simple CSV or text reports. Unlike full-spectrum tools such as dnsenum, dnsmap focuses purely on word-list brute-forcing and wildcard detection. == <span id="options"></span>Common Options == === Enumeration === {| class="wikitable" ! Option !! Description |-...")
  • 03:10, 18 May 2025 Vegard talk contribs created page Dnsenum (Created page with "= dnsenum = '''dnsenum''' is an open-source Perl script that performs comprehensive DNS enumeration for penetration testing and security auditing. The tool discovers subdomains, attempts zone transfers, performs reverse lookups, harvests search-engine data, and exports results in multiple formats. == <span id="options"></span>Common Options == === Enumeration & Discovery === {| class="wikitable" ! Option !! Description |- | <code>--enum</code> || Full e...")
  • 02:44, 18 May 2025 Vegard talk contribs created page Vulnerability Analysis (Created page with "== Vulnerability Analysis == Vulnerability analysis identifies weaknesses in software, services, and configurations before an adversary exploits them. The process blends automated scanning with manual verification and references public knowledge bases for accurate risk assessment. == Automated Scanning == Automated scanners provide rapid coverage of large attack surfaces and deliver structured reports. === Common Techniques === * Service version detection through ba...")
  • 20:44, 17 May 2025 Vegard talk contribs created page Scripting Basics (Created page with "== Scripting Basics == Scripting automates repetitive tasks, accelerates testing, and glues tools together. A single script can gather data, transform output, launch exploits, and log results in seconds. The three core environments are Bash, Python, and PowerShell; each dominates a different operating system family yet follows the same logic: read input → process → act. === Common Techniques === Parsing tool output and extracting key fields with regular expression...")
  • 17:54, 17 May 2025 Vegard talk contribs created page Ip link set / `ifconfig (Created page with "= ip link set / ifconfig = == Introduction == The ip link set and ifconfig commands are used in Linux environments to manage network interfaces. These tools allow users to configure interface parameters, including the MAC (Media Access Control) address. On Windows systems, similar functionality can be accessed through network adapter settings or PowerShell. Changing a MAC address is commonly performed for testing, research, or evasion purposes. == What is a MAC Addres...")
  • 17:45, 17 May 2025 Vegard talk contribs created page Sniffing & Spoofing (Created page with "== Sniffing & Spoofing == Sniffing inspects network traffic in real-time, extracting headers, payloads, and session metadata. It uncovers credentials, tokens, and protocol weaknesses, and establishes situational awareness before or during exploitation. === Common Techniques === Capturing raw packets with promiscuous or monitor mode interfaces Filtering traffic by IP, port, or protocol to isolate valuable data Reassembling TCP streams to read clear-text credentials Fol...")
  • 21:18, 16 May 2025 Vegard talk contribs created page Can hacking be learned? (Created page with "= Can Hacking Be Learned? = Hacking is a discipline that builds on structured knowledge, practical skills, and analytical thinking. It involves understanding how systems operate, how information flows, and how logic governs digital environments. Like any technical field, hacking follows principles that can be studied, practiced, and refined over time. Learning to hack involves both theoretical foundations and hands-on experience. Core concepts include system architectu...")
  • 21:16, 16 May 2025 Vegard talk contribs created page What tools do hackers use? (Created page with "= What Tools Do Hackers Use? = Hackers use a wide range of tools designed to analyze, manipulate, and interact with digital systems. These tools support various phases of hacking, including information gathering, vulnerability discovery, exploitation, privilege escalation, and persistence. Reconnaissance tools assist in collecting data about systems, networks, or users. This information helps form a clearer understanding of the target environment, revealing potential e...")
  • 21:12, 16 May 2025 Vegard talk contribs created page What are the types of hackers? (Created page with "= What Are the Types of Hackers? = Hackers are often categorized based on their intent, methods, and objectives. These categories help describe how individuals interact with digital systems and what outcomes they pursue. While the term "hacker" broadly refers to someone skilled in navigating and manipulating technology, distinctions arise from context and purpose. == White Hat == White hat hackers work with permission to identify and resolve security issues. Their acti...")
  • 21:09, 16 May 2025 Vegard talk contribs created page What makes hacking ethical? (Created page with "= What Makes Hacking Ethical? = Ethical hacking is defined by intention, consent, transparency, and respect for boundaries. It occurs when individuals use their technical skills to identify vulnerabilities, improve security, or support system resilience with the knowledge and approval of the system owner. Clear authorization is central to ethical hacking. When a system owner grants permission to examine digital infrastructure, the hacker operates within a structured ag...")
  • 21:07, 16 May 2025 Vegard talk contribs created page When does hacking become illegal? (Created page with "= When Does Hacking Become Illegal? = Hacking becomes subject to legal frameworks when actions involve unauthorized access, data manipulation, or disruption of services within systems protected by law. Legal definitions vary by jurisdiction, but common factors include intent, consent, and the impact of the activity on system integrity, confidentiality, or availability. In many legal systems, accessing a system without explicit permission is addressed through statutes r...")
  • 21:05, 16 May 2025 Vegard talk contribs created page Who becomes a hacker? (Created page with "= Who Becomes a Hacker? = A hacker is someone who develops the ability to understand, modify, or interact with systems in creative and unconventional ways. Individuals who become hackers often possess a strong curiosity for how things work, a desire to solve complex problems, and an interest in exploring the boundaries of technology. Hackers emerge from diverse backgrounds. Some gain early exposure to computers, networks, or code through self-initiated experimentation....")
  • 21:03, 16 May 2025 Vegard talk contribs created page Where does hacking happen? (Created page with "= Where Does Hacking Happen? = Hacking takes place across digital environments where information systems, networks, or software interact. These environments include public and private infrastructures, internet-connected devices, corporate systems, personal computers, and embedded platforms. Each environment presents different surfaces for exploration, depending on its structure, purpose, and exposure. In many cases, hacking occurs remotely through the internet. This in...")
  • 21:01, 16 May 2025 Vegard talk contribs created page Why do people hack? (Created page with "= Why Do People Hack? = People engage in hacking for a variety of reasons, often shaped by personal interests, technical curiosity, or broader motivations related to access, control, or influence. The act of hacking reflects an interaction between the individual and the system, where knowledge and action converge to create a specific outcome. Some view hacking as a challenge — a way to test the boundaries of technology and explore hidden mechanics. Others pursue it a...")
  • 20:58, 16 May 2025 Vegard talk contribs created page How is hacking done? (Created page with "= How is Hacking Done? = Hacking is carried out through a sequence of steps that involve reconnaissance, analysis, and system interaction. These actions are based on logic, precision, and an understanding of how digital systems function. The process begins by identifying a target system or component, followed by studying its behavior, structure, and surface-level responses. One common approach involves mapping exposed services or interfaces. This provides insight into...")
  • 20:53, 16 May 2025 Vegard talk contribs created page What is hacking? (Created page with "= What is Hacking? = '''Hacking''' is the practice of exploring, understanding, and manipulating computer systems, networks, or digital technologies in ways that exceed or transcend their intended design. It involves deep knowledge of system internals, creative problem-solving, and an ability to see patterns, flaws, and logic beyond the surface. The concept originated in early computing cultures where individuals sought to push machines to their limits. Over time, hack...")
  • 18:48, 13 May 2025 Vegard talk contribs created page Dnsdumpster (Created page with "= Dnsdumpster = '''Dnsdumpster''' is an online and CLI-based reconnaissance tool for DNS enumeration. It maps a domain's external attack surface by collecting passive DNS records, subdomains, and network infrastructure using publicly available data sources. Dnsdumpster is commonly used in the reconnaissance phase of penetration testing. == <span id="features"></span>Core Features == === DNS Record Enumeration === {| class="wikitable" ! Output !! Description |- | A ||...")
  • 18:24, 13 May 2025 Vegard talk contribs created page Nslookup (Created page with "= Nslookup = '''Nslookup''' is a classic DNS‑query utility used to obtain hostnames, IP addresses, and DNS record details. It supports both interactive and non‑interactive modes, making it useful for troubleshooting, enumeration, and passive reconnaissance during the information‑gathering phase. == <span id="options"></span>Common Options == === Query Types === {| class="wikitable" ! Option !! Description |- | <code>-type=A</code> || Request an IPv...")
  • 17:56, 13 May 2025 Vegard talk contribs created page Whois (Created page with "= Whois = '''Whois''' is a passive reconnaissance tool used to gather public registration data about domain names, IP addresses, and ASNs. It queries public WHOIS databases to retrieve ownership, administrative contacts, creation/expiry dates, and registrar details — all without touching the target server directly. Whois is essential in early recon phases for identifying ownership chains, domain infrastructure, and legal responsibility. == <span id="options"></span>...")
  • 15:34, 12 May 2025 Vegard talk contribs created page Basic Linux Commands (Created page with "= Linux Commands = '''Linux command-line tools''' are the building blocks of interaction, enumeration, file manipulation, and system control during any hacking operation. This page breaks down commonly used Linux commands, their usage, categories, and real-world hacking relevance. == <span id="basics"></span>Essential Commands == === Navigation === {| class="wikitable" ! Command !! Description !! Example |- | <code>pwd</code> || Show current working directory || <code...")
  • 15:50, 11 May 2025 Vegard talk contribs created page MediaWiki:Sidebar (Created page with "* navigation")
  • 15:20, 11 May 2025 Anonymous Privacy policy created page Nmap (Created page with "= Nmap = '''Nmap''' (Network Mapper) is an open‑source utility for network discovery, security auditing, and host fingerprinting. It is one of the most widely used tools in active reconnaissance, offering port scanning, OS detection, service versioning, and a powerful scripting interface (Nmap Scripting Engine – NSE). == <span id="options"></span>Common Options == === Scan Types === {| class="wikitable" ! Option !! Description |- | <code>-sS</code> ||...")
  • 13:40, 11 May 2025 Anonymous Privacy policy created page Information Gathering (Created page with "[title]Information Gathering[/title] [txt] Information gathering is the initial phase of hacking and reconnaissance. It involves discovering the attack surface, identifying reachable hosts, and understanding the target environment — all without yet exploiting anything. This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data. Explore the key categories below: [/txt] [list] [li]DNS Reconnaissance...") Tag: Visual edit: Switched
  • 06:36, 8 May 2025 Vegard talk contribs created page MediaWiki:Common.css (Created page with "CSS placed here will be applied to all skins: body { background-color: #0f0f0f; color: #e0e0e0; font-family: "JetBrains Mono", monospace; } a { color: #ff5555; } a:visited { color: #ff9999; } div#content { background: #151515; border: 1px solid #333; padding: 1em; } h1, h2, h3 { color: #ff4444; } pre, code { background-color: #1a1a1a; color: #ffdd88; border: 1px solid #333; padding: 0.5em; }")
  • 06:09, 8 May 2025 MediaWiki default talk contribs created page Main Page