- Double tap the side of your headset for Passthrough Mode.
- Double tap the Meta button. Wait for an audio cue to know the headset is listening. Speak your command.
- Examples:
- Open VRChat
- Search the store for VRChat
- Open Settings | Open Store | Open Library
- Restart | Shut down | What’s my battery
- Capture screenshot | Capture video | Stop recording
- Tap your controllers gently together twice and the headset will immediately switch to hand-tracking. To switch back to controllers just pick them up.
Routing HexChat Through Tor
irssi or weechat.
sudo apt install tor hexchat- Run the
torcommand to start the tor service on 127.0.0.1:9050. - Keep this running in a background terminal.
- Start HexChat
- Connect to any IRC server.
- This is required in order to access the HexChat menus.
- In the new window, select Settings and then Preferences. Hit the option Network setup.
- Under the hostname field, type in: 127.0.0.1 and in port type in: 9050. Change the Type dropdown to SOCKS5
- Next, fully close and reopen HexChat. Ensure that it is PROPERLY closed, and then reopened.
Adblock for Twitch
Taken from https://github.com/pixeltris/TwitchAdSolutions.
- Navigate to the uBlock Origin Dashboard (the extension options).
- Under the
My filterstab addtwitch.tv##+js(twitch-videoad). - Under the
Settingstab, enableI am an advanced user, then click the cog that appears. Modify the value ofuserResourcesLocationfromunsetto the full url of the solution you wish to use (if a url is already in use, add a space after the existing url). e.g.userResourcesLocation https://github.com/pixeltris/TwitchAdSolutions/raw/master/vaft/vaft-ublock-origin.js - To ensure uBlock Origin loads the script I recommend that you disable/enable the uBlock Origin extension (or restart your browser).
Cleaning the RECYCLE.BIN Directory on Windows
The way Windows handles the recycle bin is by moving your “deleted” files to a secret directory called $RECYCLE.BIN on the root of whatever storage device you’re removing from. The problem starts when you move from one device to another after “deleting” something. Files accumulate, but you can’t see them normally, including sensitive ones. The only way you can is either by enabling View Protected Operating System Files in explorer.exe, or by using Everything which caches this directory.
The below command shows how to manually clear this directory:
rmdir /q /s C:\$RECYCLE.BIN
Change the drive letter to whatever mounted storage media you want to clear out.
Installing libnotify on Pop!_OS
sudo apt install libnotify
notify-send “Notification title” “This is the test notification!”
Basic Penetration Testing Tips
Disclaimer
As is with any Cybersecurity related information, it can be used to strengthen your systems, or potentially to harm them. Do not use this information to break any laws applicable in your country. If you misuse this information, I will not be held responsible.
Notes
- Do not use the default password.
- Some pen testing VMs have a non-random default password. This should always be changed. If you’re using Kali Linux, simply run
passwdas your kali user, then change the password. - Disable the root account, opting for a standard user with
sudoers/wheelaccess instead. - Encrypt your Virtual Machines.
- If you’re using bare metal, consider using encryption upon installation, or opt to use disposable VMs instead.
- I talk briefly about why you should be encrypting your VMs in another article.
- Force commands/programs to run over tor.
- Research torsocks, and check to see if your commands already support running over tor by default. Some do already, like sqlmap.
Note : torsocks doesn’t work on programs that use UDP. Only TCP.- Use a VPN.
- Self explanatory. Use a VPN in conjunction with Tor to induce extra obfuscation hops. In addition, don’t use just any VPN. Use a good one like Mullvad. There are clear reasons for this.
- Use a residential VPN.
- Useful if you’re looking to subvert IP bans on things like Protonmail, or others. Most mainstream VPNs are blocked on Protonmail (and other popular websites), but by being in a residential IP range you’re able to get around that. Frankly, these are hard to come by, and I won’t be talking in depth how to get them. One tip would be to look into Virtual Private Servers that have residential IPs…
- Use the Tor Browser.
- Besides its uses for accessing secured .onion websites, the Tor Browser is useful for simply obfuscating your traffic to a website. Learn when and when not to incorporate it into your life.
- Understand your target.
- Understand your target beyond just a reconnaissance perspective. Think about it like this: Would you expect a target to find high traffic at 2:00 AM, or at 3:00 PM in an afternoon?
- Think about peak network times, as well as timezones of people potentially accessing a system.
- Learn to script your VPN.
- This is used for the purpose of automatically switching every few hours or minutes. You can do this with Mullvad because it has a command line front end.
Installing Spice and QEMU Guest Tools on a Linux-based VM
Arch-based distros:
sudo apt install spice-vdagent qemu-guest-agent
Debian-based distros:
sudo pacman -Syu spice-vdagent qemu-guest-agent
Lastly, turn off completely – not restart – your VM. This means a complete power off. Then, turn it back on.
Tor issue: (Starting with guard context ‘default’) Fix
- Run
pkill tor, or simply closetor. - Run the following command:
rm -rf ~/.tor - Rerun
tor.
Activating Windows 10 LTSC
Disclaimer
This article is for research purposes. If you do this, I will not be held responsible for any license violations that may occur.
Activating
Simply run the following command in a PowerShell window running as Administrator:
irm https://massgrave.dev/get | iex
After an activation Windows appears with options, choose the first option by hitting the 1 key on your keyboard.
Once the activation finishes, you can hit any key to quit, then the 0 key on your keyboard to quit fully.
On The Importance Of Encrypting VMware Workstation VMs
Encrypting VMs is a best practice.
If you have any sensitive data, or something that needs to be hidden, encrypting your VMs is a necessity! Think about how vulnerable VMware files are to attackers. Instead of having to take your hard drive, they simply have to pull a file, then boot it up themselves, duplicate it, or who knows what.
In a day in age where VMs are so ubiquitous (especially VMware Workstation ones), this is extremely important.
Consider this: there are risks to not encrypting your VMs, but no risk to encrypting them. Why take the risk?
