I’m asking for your help to get me started. I work in backend, it’s just that i’ve never tried to find “exploit” and “do crimes” before, i guess, so i’m just asking here in case you can “get me up to speed” sort of. I use linux and i am fairly competent in linux and programming. I know basic networking but i could learn more. I’m leaning more on the programming side than the network or sysadmin. Because i’m just starting, so far i have automated the creation of vms on linode and configuring the vms with bash scripts and ssh. And that’s it. I’ve never been into vpns at home, but obviously im going to need a vpn because i dont want to leak my ip address, so im thinking about buying a vpn, looking into tor, or learning openvpn and rolling my own vpn.
please give me project ideas perhaps like a website with list of corrupt politicians from my country.
So… i’m asking for your help to get me started quicker if that make sense. i’m from cambodia btw
No.
Why?? 😭💔
deleted by creator
You’re asking how to set up c2 infrastructure. You’re asking this question on a programming community, not a cybersecurity community, which is an odd decision by itself. You have made it abundantly clear that you are not asking this bc you’re trying to start up some red team ae program at your work, you’re doing this to perform illegal activity.
Nobody is going to help you with this. No security professional is going to help you bc it’s completely unethical, and maintaining appropriate ethics is a huge part of maintaining employability in that sector. No one who does this stuff criminally will help you bc you’ve proven to have zero discretion and helping you will probably lead to the feds taking their front door off its hinges. Also you’re competition.
If you don’t know how to do this already, which you obviously don’t, you put in the work to learn this skill set. Once you’ve done that, doing it professionally is much more stable, and has a much better risk vs reward, than doing it illegally.